The Continental Access Division of NAPCO, announces the debut of its CA4K Access Manager App, available on iTunes and Google Play, for use with any smart device. The new CA4K Access Manager App adds another level of convenient intuitive mobile control to Continental Access’ flagship CA4K Enterprise Integrated Access Control Software, v1.1 or higher, which also supports push notifications or emails, in the event of an emergency, threat level escalation or lockdown events. Virtual Enterpri...
Johnson Controls announces that its Tyco Software House C•CURE 9000 v2.8 and Tyco American Dynamics victor 5.4.1 are the first platforms to be officially certified as meeting new third-party security standards from UL (Underwriters Laboratories) for on-premise commercial security systems. UL- 2610, which provides standards for Commercial Premises Security Alarm Units and Systems, updates the requirements for this technology to include cybersecurity provisions and cloud functionality. UL&rs...
After extensive cooperative research and development between the two companies, Point Blank Enterprises and First Tactical are pleased to announce the launch of the public safety industry’s first-ever fully integrated apparel and armor line, the V2 Pro Performance System. This innovative solution allows law enforcement agencies to purchase a fully-integrated system featuring the V2 Pro-Performance armor carrier with NIJ compliant ballistics, shirt and pants. The innovative V2 Pro-Performa...
The rise of DIY home security is driving traditional vendors to pursue new growth strategies. Recent activity at ADT exemplifies how firms that have historically focused their business on professional monitoring are expanding to offer their own branded security equipment that users can monitor themselves without having to sign a long-term contract – a key to competing with firms like Amazon, Nest, and SimpliSafe. Freedonia’s newly published Safety & Security Alarms explores the i...
Copp Systems, a Dayton, Ohio-based security and communications systems provider, is celebrating its 100th anniversary this year. Copp Systems (formerly Copp Integrated Systems) was founded in 1920 by Roy Stanley Copp, an engineer and member of the “Dayton Boys,” a group of young engineers and students interested in technology. Copp began selling and servicing RCA living room consoles from his Monument Avenue storefront to prominent Dayton families, including the Wrights, Deeds, and K...
Vidsys, a global developer of Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) technology solutions, announces the release of the latest version of its security software platform – Vidsys Enterprise 2020 R1.0. Vidsys Enterprise 2020 R1.0 is the first release of the product’s 2020 iteration, which focuses on continuing to provide security and performance optimizations to better support the user’s experience. Mapping and v...
Intersec 2020, a popular security, safety, and fire protection trade show, held under the patronage of HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, opened its doors to the latest security safety solutions and three days of agenda-setting discussion, as global industry sources tip the Middle East security sector for 10% annual growth over the next two years. With more than 1,100 exhibitors from 56 countries, Intersec was officially inaugurated by Major General Expert Rashid Thani Al Matrooshi, Director General of Dubai Civil Defense; Major General Abdullah Ali Al Ghaithi, Director of the General Department of Organizations Protective Security & Emergency at Dubai Police, and Major General Khalifa Ibrahim Al Sulais, CEO of the Security Industry Regulatory Agency (SIRA). Automated security solutions As the region’s premier show for commercial security, Intersec plays a crucial role in shaping the the industry" The delegation met top-level dignitaries and representatives from Dubai Police; Came, a provider of automated security solutions; Netherlands-based Nedap, a specialist in systems for long-range identification, smart parking and vehicle access control; Chinese technology giant Huawei, and Axis Communications, a Swedish manufacturer of network cameras for physical security and video surveillance industries. “As the region’s premier show for commercial security, fire protection and safety, Intersec plays a crucial role in shaping the future of these industries,” said HH Sheikh Mansoor. “Protecting our people and assets is a principal responsibility for the UAE and with the Expo 2020 fast-approaching, the implementation of new best practices and technology will solidify the UAE’s position as a leader in security.” Artificial intelligence and machine learning Andreas Rex, Show Director at Messe Frankfurt Middle East, which organises Intersec, added: “No sector is exempt from technological advancement. The emergence of automation, biometrics, artificial intelligence and machine learning is transforming the face of the security sector and helping to address growing concerns surrounding unmanned aerial, cyber and identity fraud risks. As security risks become more complex, so too must the solutions designed to combat them.” As Intersec 2020 welcomed the global security industry to Dubai, the bullish security sector growth forecast was issued by Business France, the French government organization charged with fostering French exports and promoting inward investment into the country. France, one of 15 international country pavilions at the three-day show at Dubai World Trade Center, is debuting the most advanced technology emerging across seven broad product sectors: commercial security, smart home, cybersecurity, fire and rescue, safety and health, homeland security and policing, as well as perimeter and physical security. Access control systems The Czech Republic pavilion is hosting a similar contingent of companies including COMINFO “The Middle East region represents a particularly attractive market for the safety and security sector, which is expected to grow around 10% per year to 2022,” said Frederic Szabo, Managing Director, Business France Middle East, which is hosting 15 French companies at Intersec – 11 of which specialize in fire and rescue. “Increasing the capabilities of infrastructure, securing power plants and oil complexes, protecting sites and people for major events to come are all excellent reasons for French experts to extend their presence in the region,” added Szabo. The Czech Republic pavilion is hosting a similar contingent of companies including COMINFO, a manufacturer of turnstiles, gates and access control systems, which is leveraging Intersec to launch EasyGate Superb – the world’s slimmest, fully-equipped speed gate for access control. Next-generation security risks COMINFO’s regional launch of EasyGate Superb is one in hundreds of major transformative technology breakthroughs at the fair, where the scale of next-generation security risks and the intelligent technology required to prevent and defend against security threats are being explored by local, regional and global industry leaders at Intersec’s comprehensive conference program. The four-pronged program, which includes the Intersec Arena, the Future Security Summit and Intersec Fire Conference, and the Security Industry Regulatory Agency (SIRA) forum, has drawn experts from more than 50 countries to Dubai. During a keynote address at the Intersec Arena on Sunday, Eng. Khalid Al Hammadi, Chairman of the Security Professionals Association (SPA), the first association for security professionals in the Middle East, announced the launch of SPA for SIRA, the Dubai agency tasked with ensuring the highest standards of security and safety in the emirate. AI and machine learning applications The event showcases the latest innovations and technologies in one of the most important years for the UAE SPA is a platform that allows security professionals to share and enhance their knowledge of industry best practices. “The industry is advancing towards technologies such as AI and machine learning applications, which will be used as part of the security protocols of Expo 2020,” said Eng Al Hammadi. “This is sure to create an array of job opportunities for individuals within the security sector, and SPA for SIRA will be there to act as a platform that bridges the gap between security professionals and regulators, as well as fostering a platform for knowledge exchange and development.” “Participating in Intersec enables our members to interact with a global network of security experts and learn about the latest security applications and trends within the industry. This event showcases the latest cutting-edge innovations and technologies in one of the most important years for the UAE, which will support the safe and secure logistics of Expo 2020 Dubai,” noted Al Hammadi. Digital and physical security At the conference, representatives from 35 governments, trade associations and non-profit institutions spanning the hydrocarbon, banking and finance, municipality, police, customs and healthcare sectors in the Middle East, Europe and the USA will map out the future security agenda over coming days. Digital security challenges, AI implementation, biometric innovations security loopholes in business ecosystems and the integration of digital and physical security to address critical threats are all key topics under the microscope. Held under the patronage of His Highness Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, Intersec is supported by Dubai Police, Dubai Police Academy, Dubai Civil Defense, SIRA and Dubai Municipality. Intersec is a trade exhibition and conference open to trade professionals only. The show is open from 10am – 6pm on 20 and 21 January and is held in Halls 2-8, Trade Center Arena and Sheikh Saeed Halls 1-3 at Dubai World Trade Center.
VIVOTEK, globally renowned IP surveillance solution provider, and CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, has announced they have entered into a strategic partnership, which will integrate CyberLink’s FaceMe AI facial recognition engine into VIVOTEK’s IP surveillance solutions. The initial collaboration will be showcased in VIVOTEK’s booth (#SAD37) at Intersec 2020 in Dubai, United Arab Emirates. VIVOTEK – CyberLink IP partnership We are honored to partner with CyberLink, also a Taiwanese company and to adopt CyberLink’s FaceMe" “Founded in 2000, VIVOTEK has been dedicated to the IP surveillance industry for 20 years. Entering the era of AIoT, we will continue global partnerships to accelerate and enhance video applications by joining force with top analytic software providers”, said Owen Chen, Chairman of VIVOTEK. Owen adds, “We are honored to partner with CyberLink, also a Taiwanese company and to adopt CyberLink’s FaceMe , which was ranked one of the most accurate AI facial recognition engines in the NIST Face Recognition Vendor Test (VISA and WILD tests.)” Facial recognition intelligence “Through this strengthened alliance, facial recognition intelligence will be integrated with VIVOTEK’s network cameras and backend video management software, enabling security operators to receive accurate facial recognition alerts based on both blacklists and whitelists. We are very pleased to see our partnership being elevated to a new chapter today, further enhancing our goal to provide advanced video value for users around the globe.” “The demand for facial recognition is booming, driven by the latest IoT and AIoT innovations, and enabling a wide array of scenarios across industries such as security, home and public safety, retail, banking and more,” said Dr. Jau Huang, CyberLink’s founder and CEO. “Each application is dependent on the performance of the cameras used to capture faces. CyberLink is pleased to partner with VIVOTEK, a world leader in surveillance cameras, and to integrate FaceMe into VIVOTEK devices to provide accurate and reliable solutions to the market.”
Connected Technologies LLC, based out of Monument, Colorado, USA wants dealers to have it their way—so it’s changing the landscape of manufacturer support by providing additional customization services tailored to the security dealer. Knowing that one size does not fit all when it comes to project demands, the Connect ONE management interface in its original state is already highly customizable. Now, and because of popular demand, dealers can request additional integrations or capabilities — allowing them to meet the user’s challenges, expand their scope of projects and gain profitability in every market vertical. Integration with Connect ONE interface Integrators have many different business strategies, so we work to give them a unique offering specific to their goals" “When dealers have the opportunity to integrate other products and provide functions the user specifically requests it creates a stronger relationship between the dealer and their customers,” said Dan Simon, co-founder and managing partner of Connected Technologies and creator of the integrations. He adds, “Integrators have many different business strategies, so we work to give them a unique offering specific to their goals. We invite dealers to contact us with their challenges, so we can work together to design a solution through the Connect ONE interface. Our goal is to help dealers reach their highest potential.” Panic buttons and card readers Jeff Kesterson, owner of Nightwatch Security & Telephone LLC in Sedalia, Mo., had programming requests turn into actual features to solve customer problems. “In one application, we have multiple schools programmed so door alarms, panic buttons and card readers trigger on-screen alerts at selected locations, while simultaneously sending email and text messages with embedded video to security officers,” said Kesterson. He said security personnel wanted a better way to assess threats proactively so they could respond accordingly during emergencies. In another example, Connected Technologies developed a software integration to a 2N (an Axis Company) IP intercom and door entry system to permit management and control of the 500+ user population through Connect ONE. Force Security Solutions LLC, Washington, D.C., contacted Connected Technologies to see if the integration was possible—and the necessary capabilities were delivered in a minimal timeframe. Simple and intuitive application For Ryan Christen of Corbeck Technologies LLC, in Raleigh N.C., Connected Technologies customization has allowed the company to tailor its projects and meet new demands. “Whether it’s a commercial office, retail, storage, or multifamily development, the incredibly versatile Connect ONE has allowed me to gain the flexibility needed to confidently meet the demands of those development markets”. Ryan adds, “By customizing the customer’s Connect ONE interface to the user’s operational needs, it gives them a simple and intuitive application that they can tell was customized specifically for them. This is a big reason why we have the customer retention and growth that we do.” Technical and customer support Connect ONE platform offers a lot of flexibility so we can design a system that works for each customer" Having a manufacturer partner who has your back is rare in this day and age, but something dealers look for to add value to their business and a contracting edge with customers. “The Connect ONE platform offers a lot of flexibility so we can design a system that works for each customer,” said James Lee, president and partner at Alarmguard Security, Greensboro, N.C. “We rely on Connected Technologies for technical and customer support. We have requested software and feature upgrades for our customers and if it’s possible it happens within 24 hours. We use Connect ONE in our own business and the reporting features are outstanding.” Security software solutions For Phoenix Security Systems Inc., Philadelphia, a national accounts dealer with security, surveillance and access control customers in 40 states, manufacturer support is critical to staying competitive and profitable. “Connect ONE was paramount in allowing Phoenix to offer a service that is truly connected across platforms,” according to Eric Burroughs, vice president. Eric adds, “The Company is unique in the respect that they operate with software solutions that can be edited and modified — without having to wait years to get it. They were the first company I thought of when my security software vendor could not accomplish a special mobile app for our national accounts, and Connected Technologies delivered on this request as well.” It’s uncommon to find a manufacturer who will work directly with the security dealer to fully customize software to meet the needs of their business and challenges of the customer; with this type of collaboration comes a sharp competitive edge.
Door and Hardware Federation (DHF) has announced that it will be launching a new safety seminar this year at the 2020 FIT Show at the NEC in May. The free seminar is specifically aimed at those with responsibility for automated gates and industrial doors and will take the form of a two-hour session. In addition, the pro-active federation has produced a free ‘owners guide’ entitled: Guidance for owners and managers of Industrial Doors, Garage Doors, Powered Gates and Traffic Barriers, which is based on DHF TS 011 and DHF TS 012, that attendees can take away with them following the talk. The seminar will be open to both DHF members and non-members. Educate a wider audience Both the seminar and owners guide will highlight the dangers of not taking maintenance seriously" “DHF will be exhibiting as part of FIT’s education and training program, and through our new seminar, we are hoping to inform and educate a wider audience on how to keep their products safe and compliant,” explains DHF’s Commercial Manager, Patricia Sowsbery-Stevens. “Both the seminar and owners guide will highlight the dangers of not taking maintenance seriously. As we know, in the past, owners have been prosecuted because they have not maintained their product in a legal and appropriate manner. With the seminar free and open to all, we are once again placing education at the heart of our activity.” Software solutions This year’s FIT show takes place from 12-14 May and continues to be the UK’s only dedicated event for the window, door, hardware, flat glass, and components market. It attracts annual audiences of approximately 10,000, from fabricators and installers through to architects and specifiers, all of whom come to explore the latest equipment and software solutions and enjoy networking opportunities. “FIT is a natural platform to attract local authorities to come along to the seminar and see what their responsibilities are with regards to their product,” concludes Patricia. “We look forward to welcoming attendees to our seminar, and our stand.”
Member companies and representatives of the Open Security & Safety Alliance (OSSA) will be present at the INTERSEC 2020 show in Dubai next month. OSSA – an industry body comprised of leaders, influencers and innovative organizations from all facets within the security, safety and surveillance space – formed to help the industry focus on creating new value by reducing market fragmentation and addressing common challenges. The aim is to bring together the industry to move forward together with one united, global approach to: Create harmony across security and safety solutions focused on common Operating Systems and Application Programming Interfaces (API); Drive the creation of one digital marketplace regardless of brand; Define hardware and software measures to increase the levels of data security and privacy protection across brands; Define specifications to ensure the right levels of performance OSSA Technology Stack specification In the first full year of existence, OSSA member companies by creating the first common Technology Stack specification In the first full year of existence, OSSA member companies achieved a major component of the organization’s vision by creating the first common Technology Stack specification including a vendor-agnostic Operating System (OS) hardened for the security and safety market. This first big step allows for installation and execution of third-party apps on video security devices. It enables app developers to develop one single software application that is suitable for all cameras leveraging OSSA’s Technology Stack, independent of brand. The next steps in early 2020 are firstly for the OSSA-driven digital marketplace to go live and secondly for camera manufacturers to introduce their first commercial versions of products leveraging OSSA’s Technology Stack. The marketplace will give integrators and users the ability to easily add customized functionality to their cameras and security systems by way of installing apps (already developed by the early adopters and available at the launch of the marketplace) on video security cameras. It’s expected additional app developers will soon contribute solutions downloadable across devices and brands. INTERSEC Dubai 2020 From INTERSEC, some OSSA member companies will showcase prototype cameras based on OSSA’s commonly defined Technology Stack. Visitors can learn more about the vision of OSSA, its progress and how involved companies are revolutionizing the market, by visiting the Hanwha Techwin booth and enquiring with one of the OSSA representatives.
Genea has announced that it has acquired cloud-based physical access control company, Sequr, Inc., thereby further expanding its portfolio of commercial real estate technology solutions. Submeter billing software solutions “Sequr is an ideal fit for us,” said Michael Wong, CEO of Genea. He stated, “Almost all of our customers who use our OTHVAC and/or submeter billing software solutions have been searching for help with access control. Similar to our other offerings, Sequr’s software typically integrates directly with properties’ existing hardware which allows for major enhancements in functionality of access control systems while being significantly more cost-effective than a complete rip and replace”. Sequr shares Genea’s philosophy of providing outstanding customer experiences to its clients" Michael adds,”Sequr also shares Genea’s philosophy of providing outstanding customer experiences to its clients. Adding the best cloud-based physical access control solution to our technology suite has been a priority for us and we have found the perfect complement.” On-premise access control software Sequr addresses the limitations and pain points related to using on-premise access control software with a cloud-based offering that improves convenience, transparency, security and safety. Their combination of enterprise-level security, management portal and limitless scalability means that customers can access features normally reserved for the Fortune 500 at an affordable price. Even more, Sequr turns everyone’s phones into their access card. No more retractable badges, no more getting locked out of the office. “Since its inception in 2014, Sequr was designed to automate physical access control to reduce the cost and time associated with managing access to your facilities,” said Mike Maxsenti, co-founder of Sequr. Cloud-based physical access control Mike further states, “When we evaluated strategic alternatives to accelerate our growth, Genea immediately stood out. Our similar customer-centric values and product alignment made us confident that this partnership would best position us as a leader in the fast-growing cloud-based physical access control market. The Genea team has earned the trust of its property management and engineering customers which make it an outstanding platform for Sequr.” This acquisition marks Genea’s second in less than a year. It acquired Moylan Energy Management, Inc. in July 2019.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analog with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cybersecurity requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available”“We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organizations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organizations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our healthcare mini series here and here.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
One of the common characteristics of trade shows is booths with walls and walls of new products. Sometimes exhibitors seem intent on displaying everything in their portfolio, even though the displays appear cluttered and may not be welcoming. In an age of system sales, in particular, the emphasis on products can seem off kilter. Discussions with exhibitors at this year’s GSX show reveal a new awareness of the need for less cluttered booths, but the equipment walls persist. Here’s a review of Day 2 from the show floor. Allegion embraces more open booth design At GSX 2019, Allegion is among the exhibitors embracing a new, more open booth design that encourages engagement with customers and puts less emphasis on product displays. Discussions at the Allegion booth have centered around the value proposition and lower complexity of network-connected access control systems. The approach has been gaining a higher profile at Allegion since the company acquired Isonas, whose system configuration involves a reader-controller connected to the network via power-over-Ethernet cable. “Customers are also asking about Bluetooth technology and mobile applications,” said Jonathan Mooney, Allegion sales leader. Allegion is looking to deploy the Isonas software in other products in their portfolio; it will be offered in the range of Schlage wireless locks by the middle of 2020.The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control" “The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control,” said Mooney. Bosch offers complete security solution Bosch is introducing 55 new products at GSX 2019, but when it comes down to it, the company’s overarching message is not about individual products but about how they can be combined into a larger system. “At the end of the day, the message from Bosch is ‘how do I create a complete security solution?’” said Paul Garms, Bosch Director, Regional Marketing Security. “That’s what we are trying to demonstrate: How do all these things integrate?” Most of interest to attendees are actual demonstrations, which are a unique aspect of the trade show experience. “It’s nice at a show where we can really demonstrate what we are talking about when we say ‘integrated solution,’” said Garms. “And people can say, ‘oh yeah, if I trip this video analytic, the speaker will warn me I am approaching a restricted area.’ Or, when the manager signs in on the intrusion panel, now the associate can access a door he wasn’t able to before. It’s that integration and the complete solution that resonates. People are also interested in new products. At a show, they like to see them in operation.” At the Bosch booth, there is a big wall that illustrates some integration possibilities. An array of cameras was among the 55 new products introduced by Bosch, which also emphasized systems. Machine learning and advanced video analytics One implementation featured on the wall is Bosch’s Camera Trainer machine learning system. The system can “train” a camera to recognize a car in a parking lot, for example. Among the new Bosch products is the Autodome 7000i, the next generation of a best-selling camera, now with H.265 encoding and analytics such as line crossing. There is also an outdoor panoramic camera that is adjustable to 180-degree or 360-degree views. The new, less expensive 3000i series cameras provide an affordable option with edge analytics and Bosch’s data security protection included. Integration from Honeywell as well as 'the big picture' At Honeywell Security Group, Senior Product Manager G. Eric Green said the show seems to be much better attended than last year, “and we have had a lot of interest in our products.” Even end-user attendees typical of the GSX show are interested in the details of technology, as well as “the bigger picture,” commented Green. “Some of our booth visitors want to get into the weeds,” he said. “They say they want this piece of hardware. But they also also interested in the big picture. How things are interacting is very important.”Honeywell announced the 30 Series IP cameras, which can be used as part of video systems that comply with National Defense Authorization Act Section 889" “Most customers have installed products from other vendors that they expect us to work with. So integration is always at the top of the list. Can you work with these guys? Do you have an API? Do you support this piece of equipment? We always hear that a lot,” said Green. “There are customers who want best-in-breed products, but they’re not necessarily concerned about that coming from one manufacturer,” he said. “Other customers want ‘one throat to choke.’ When something goes wrong, they don’t want any finger-pointing.” Web-based security console and frictionless access control Honeywell is showing a beta version of its Pro-Watch 5.0 product, which is coming out in Q1 next year. It is an integrated security console that provides a map view of access control, video management, intrusion and other third party systems. The web-based platform offers access to each element, all controlled by permissions. “We are also building in an incident workflow engine that allows an operator to see exactly what steps he should take when something occurs as defined by the supervisor or a security director,” said Green. “It can literally walk you through, and it is completely freeform. Whatever you want it to say, it will say. This works in conjunction with access control, video, and all the things we talk to.” The Honeywell booth was a busy place on day two of GSX 2019 Another new Honeywell product is the OmniAssure Touch reader, a “frictionless” device that can read a credential off a smart phone in a user’s pocket. The user merely touches the reader, and it scans the area for a nearby mobile device that is authorized, and you can walk through the door. Honeywell also announced the 30 Series IP cameras, which are encrypted and can be used as part of video systems that comply with National Defense Authorization Act Section 889. They are made in Taiwan. Arcules' cloud security solution “There are fewer people here at GSX 2019, but we have seen a lot of really big companies looking for a cloud service,” said Andreas Pettersson, CEO of cloud video company Arcules. At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive: They say “we want to move to the cloud.” Pettersson theorized that concerns about a possible weakening economy may prompt some companies to avoid the large capital expenditure of procuring a new on-premise system and instead opt for the minimal investment needed for a cloud system. Monthly operating expenses of a cloud system are also predictable and more easily managed, said Pettersson.At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive Arcules is proactive on the subject of cybersecurity and has a two-page handout that summarizes the cybersecurity advantages of their system. They are eager to talk about cybersecurity as it relates to cloud systems, said Pettersson. He said that, in his experience, on-premise systems tend to have more cybersecurity issues, whether because ports are left open or a firewall is implemented incorrectly. Users may also seek to bypass the firewall — a dangerous practice that is not an option with cloud systems. Security patches may not have been implemented; in a cloud system, such updates are pushed out automatically. The recurring monthly revenue (RMR) aspect of cloud systems are a windfall to integrators who embrace the cloud. “One integrator said he went on vacation for the first time in years because he had the extra money coming in,” said Pettersson. Control room integration from Vistacom "We're still fairly new to GSX, as our first show was 5 years ago, but what we have noticed is that the show continues to attract valuable attendees and drive critical conversations around what companies like ours must bring to the table in order to be successful in this space," said Dan Gundry, Director of Sales and Marketing, Vistacom. "We've had so many chances to learn from and share with potential customers and partners, and as a result, we continue to forge great relationships.” Vistacom is highlighting its control room integration and the value enterprise organizations can gain from implementing one in their facility. The company works alongside end-user customers and security integrators to build a command center space, taking into account video wall display technology, operator consoles and furniture, audio and lighting considerations, as well as temperature and more, in an effort to optimize these centers. Stay tuned for the full GSX 2019 show review.
Critical building management and security systems at one of the most advanced super-high-rise towers, the landmark Wasl Tower in Dubai, are to be integrated with Maxxess eFusion technology. The 302-meter multipurpose tower, which will be operated by the Mandarin Oriental Hospitality Group, incorporates offices, guest rooms, public areas and apartments, and is situated in a pivotal Dubai location. The Wasl Tower is designed with advanced sustainability features including natural shading and cooling, adaptive lighting, one of the world’s tallest natural ceramic facades, and a vertical boulevard. eFusion was selected for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. With a modular, building block approach, eFusion provides an umbrella management system and drives service efficiency by removing the need for operators to continually switch between systems. Visitor management system By keeping it simple and integrating with the widest choice of technologies, Maxxess removes the complexity A key use of the technology will be to integrate back-of-house operations at the Wasl guest apartments with front-of-house systems, for maximum ease of use and operational efficiency using the Maxxess unified platform. This eFusion solution comprises a 900-plus reader ASSA ABLOY VingCard access control system, a 1700 camera Hanwha surveillance system, and advanced key management with Deister ProxSafe, and it will use the BACnet protocol to integrate the building management system (BMS). The Tower will also benefit from Maxxess VisitorPoint visitor management system, a Zenitel intelligent communication system and disabled call-to-assist alarms. The VisitorPoint integration will improve the guest and resident experience, reduce administration and front-desk queuing, and ensure smooth running of functions from visitor and contractor management to collections and deliveries, and security. Streamline security, safety and facilities management “The challenge with projects of this scale is to find a simple, straightforward platform that communicates with everything and works with all the systems involved,” says Lee Copland, Managing Director EMEA, Maxxess. “By keeping it simple, and integrating with the widest choice of technologies, Maxxess removes the complexity.” The Wasl Tower project is the latest of a growing number of mixed-use developments, including hotels, retail, office and residential complexes to use eFusion to streamline security, safety and facilities management. Last year Maxxess won an Intersec Award for its major eFusion implementation at Bluewaters Island.
Videonetics has supported Nagpur in achieving the Smart City status, under the Smart City Mission of Government of India, by securing its roads with an AI & DL powered Intelligent Traffic Management Solution. The solution has helped the city to solve its traffic enforcement problems such as red light jumping, crosswalk/ stop line violations, over speeding violations, tracking of suspect/ stolen vehicle, and generating e- challan/ e ticket for violators as per the Motor Vehicles Act. It includes applications like Automatic Number Plate Recognition (ANPR), Red Light Violation Detection (RLVD), Integrated eChallan Management Software. With the successful implementation of the solution, Nagpur has witnessed greater traffic discipline and substantial decrease in traffic violations. More efficient traffic management has helped the city achieve its Smart City objectives. Intelligent Traffic Management System Nagpur has witnessed a rapid rise in the number of vehicles, and also in traffic violations and road accidents Over the last few years, Nagpur has witnessed a rapid rise in the number of vehicles, and also in traffic violations and road accidents. The city administration recognized the need to enhance road safety, and the traffic police department sought a solution that would act as a true decision support system to regulate and analyze vehicle movement on roads. In addition, the police expected the solution to assist them in maintaining law and order, to identify frequent offenders as well as stolen/ suspect vehicles, as and when they enter the city. With the city needing to enhance its road safety even as it was expanding, Videonetics designed a solution based on its Intelligent Traffic Management System that provides continuous monitoring of the traffic situation, records traffic violations at intersections, and triggers necessary penal action against violators. Manage real-time alerts 24x7 real-time monitoring: Today, the city has ANPR and RLVD systems spread across 120 traffic junctions, to track and record license plate of any type of vehicle, as well as detect red light or stop line violation at intersections. Nearly 1,300 IP cameras have been deployed, to monitor vehicle movement and detect suspect vehicles simultaneously. Violation prosecution: Videonetics’s Integrated e-Challan/e-Ticket Management Software has been assimilated with Regional Transport Office database, to fetch the details of a vehicle and its owner. Once a violation is detected, an e-challan is issued to the offender. The e-challan also maintains a record of all payments, both received and pending. A centralized security view: The solution provides the police a bird’s eye view of the traffic junctions and city’s roads, from the Command & Contro Center. From the unified interface, security operators can view, manage real-time alerts and respond them swiftly. City surveillance system Prior to the installation of Videonetics’s Smart City solution, Nagpur city relied on on-site traffic monitors/ police to catch offending vehicles. However, the recent implementation of the solution has eliminated the need for physical deployment of traffic police at each junction. Videonetics’s solution helps maintain the security on city’s roads by detecting and recording traffic violations with accuracy, resulting in irrefutable evidence for local authorities. In addition, citizens have started obeying traffic rules, resulting in an over 50% reduction in traffic violations. The open architecture of the solution not only allows the city to continue adding more applications to make its traffic management more robust, but also integrate with the city surveillance system in a single unified interface, to address security concerns with a holistic approach.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Cold winter temperature requires high-performance equipment capable of operating in extreme environments Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Access ANPR Camera The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. Built-in intelligent video analytics When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. IR Mini-Bullet Network Camera The camera uses a set of optical features to balance light throughout the sceneFor both approaching and departing vehicles, the access ANPR camera takes a snapshot of the license plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Smart residential solution Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. "We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases”, said Arman, General Manager of BI Group.
The experience of high-quality, high-performance automotive engineering and the sleek lines and signature beauty of luxury auto brands like Porsche, BMW, Mercedes, and more are investments worth protecting. When damage to these vehicles occurs and body work is required, only the work of attentive, highly trained, and craftsman technicians owners can trust, will do. Phoenix-area Autobahn Collision serves the region’s owners of luxury European automobiles with precisely such expertise they can trust, and when the time came to upgrade the premier body shop’s security infrastructure, they looked for a surveillance solution able to meet the same high standards of performance they meet every day. Seamless Integration Autobahn Collision provides customers with a service and repair experience, well-crafted to be as high-end, responsive, and trustworthy as the luxury vehicles they work on. The body shop’s expectations were no less for their surveillance solution, which needed to seamlessly integrate new and existing technologies in a way that was both easy to use and maintain, allowing for monitoring and documentation, as needed, without distracting from the team members core priority: optimising customer experiences and quality body work for their customers.Scottsdale based integrator SARC Monitoring answered Autobahn’s call with an upgraded virtual guarding solution DirectIP NVR Surveillance Solution Scottsdale based integrator SARC Monitoring answered Autobahn’s call with an upgraded virtual guarding solution with IDIS DirectIP network video recorders (NVRs) at the heart, addressing all issues of compatibility and operational concerns. IDIS NVRs, specifically designed to reduce (if not eliminate) compatibility issues, support multiple industry standards and 3rd party protocols. At Autobahn Collision, SARC integrated multiple IDIS DR-8364(F) NVRs in designing a user-friendly surveillance solution that enhanced and fully supporting the shop’s existing IP camera infrastructure. IDIS DR-8364(F) series of NVRs The IDIS DR-8364(F) series of NVRs have multiple features that enhance the overall ease-of-use and maintainability. The DR-8364(F) supports 64 IP channels of 4K UHD with a maximum incoming throughput of 900Mbps, which means fewer NVRs are needed to support a large installation of cameras. Fewer devices reduce the overall complexity of any solution, by definition, and mean less time spent on installation and maintenance. The intuitive DR-8364(F) NVR interface, common to all IDIS products, also means that training and transition investment is minimized. IDIS’s license free software model, which also includes free software updates, further minimizes the cost and complexity of owning and maintaining an IDIS solution. Enhanced protection for luxury vehicles The upgraded solution allows Autobahn Collision and a team of remote monitors to keep the premises—and the concentration of luxury vehicles, parts, and accessories—secure 24 hours a day / 7 days a week, enabled by the enhanced recording, storage, and failover benefits of the IDIS DirectIP NVRs and IDIS’s modular IDIS Solution Suite VMS. Data can be transferred on existing cabling and saved in existing storage space The IDIS DirectIP DR-8364 NVR’s support for H.265 with IDIS Intelligent Codec and Motion Adaptive Transmission (MAT) reduces the need for additional bandwidth and storage upgrades, providing up to a 90% reduction in both bandwidth and storage utilization. IDIS SmartFailover Additional data can be transferred on existing cabling and saved in existing storage space. Multi-layered data protection through IDIS SmartFailover features include RAID 5 storage redundancy, dual power supply redundancy, and NVR failover, which provides support for a standby NVR that continually monitors the primary NVR (taking over recording if the primary hardware fails). IDIS SmartFailover ensures that data integrity and system operation are automatically monitored and maintained, simplifying system support and maintenance tasks. Real-time monitoring, playback and review, high-quality imagery for reference and documentation purposes, and more are now seamlessly empowered by the new system, allowing Autobahn to continue doing what it does best of all, meeting and exceeding the needs of the region’s most discerning vehicle owners.
March Networks, a video security and video-based business intelligence provider, announces that the rapidly growing U.S. convenience store chain Yesway has selected its Searchlight for Retail solution for advanced video surveillance and analytics. Yesway is currently deploying March Networks Searchlight for Retail in 136 locations across Iowa, Kansas, Oklahoma, Missouri, Texas, Nebraska, New Mexico, South Dakota and Wyoming. The c-store chain, which is operated by an affiliate of Brookwood Financial Partners, LLC, is expanding across the U.S. and plans to standardize on March Networks as it moves forward. Asset protection investigations Brandon Pohlman, Yesway Safety & Asset Protection Manager, said the company selected Searchlight for its scalability and centralized management features as well as its powerful exception-based reporting capabilities. Through its combination of high-quality video surveillance, point-of-sale (POS) transaction data and analytics, Searchlight helps Yesway visually monitor operations at all of its sites and quickly analyze transaction data for anomalies. “Having our video surveillance, POS data and analytics together on one easy-to-use platform is a huge advantage for Yesway,” said Pohlman. Using the software, the c-store can rapidly search and sort all of its transactions and match them with corresponding video clips. The company can also group higher-risk transaction types like refunds and assign risk factors to its stores based on the number of these transactions. “The insights uncovered by Searchlight have helped Yesway reduce its shrink levels and improve the speed and efficiency of asset protection investigations,” Pohlman said. Advanced system management software Yesway is also deploying March Networks 8000 Series Hybrid NVRs for reliable video recording In addition to asset protection, Searchlight also delivers valuable business intelligence through the integration of video analytics including people counting, line length and dwell time. Several different Yesway departments use Searchlight’s information to monitor operations, merchandising and customer service across the organization. Iverify, a full-service interactive security company and March Networks certified partner, managed the Yesway installation. Marty Brakel, Iverify National Account Manager, said March Networks’ products are ideal for the c-store market. “March Networks Searchlight is a professional-grade solution for customers like Yesway that need robust loss prevention tools and the ability to manage hundreds of locations simultaneously,” said Brakel. In addition to Searchlight, Yesway is also deploying March Networks 8000 Series Hybrid NVRs for reliable video recording, and March Networks SE2 Series IP Cameras for high-quality video capture. It is managing the solution with March Networks Command Enterprise, advanced system management software that simplifies multi-site video management. Improve customer satisfaction “With March Networks’ complete solution for c-stores, organizations like Yesway can cut losses and improve customer satisfaction as well as operational efficiency,” said Net Payne, Chief Sales & Marketing Officer, March Networks. "Because Searchlight is also available as a hosted service, c-stores and other retailers can enjoy all the benefits of this powerful solution for a low monthly fee. They can have peace of mind knowing that March Networks’ trained professionals are monitoring and maintaining the health of the video system on their behalf.”
Device and application security solutions provider, Trustonic has announced that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities. Healthcare devices have become top targets for cybercriminals due to their critical nature, the valuable intellectual property they employ and the sensitive personal information that they collect and store. Research shows that there were 8.2 attempted cyber-attacks per connected healthcare endpoint in each month of 2018. Smart diagnostic platform OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform To ensure security, privacy and high performance, OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform, which integrates Trustonic’s Trusted Execution Environment (TEE). OPTOLANE’s in vitro diagnostic (IVD) platform, called LOAA (Lab on an Array) Analyzer, examines blood and tissue samples for multiple targets, including DNA, RNA, proteins and metabolites, in real-time. It was developed to satisfy market demand for ‘sample to answer’ IVD tools and enables sample extraction through to analysis with a single cartridge. “Investment in connected healthtech is increasing and IVD is an important segment in the global diagnostics industry,” comments Ben Cade, CEO of Trustonic. “These solutions add significant value to diagnosis and treatment, enhancing the well-being of the general public while increasing productivity and reducing costs. But, where personal data this sensitive is being captured, processed, and transmitted, the appropriate steps must be taken to protect it from malicious actors.” Trustonic security platform Trustonic’s hardware-backed security platform, TSP, enables secure and private data extraction, processing, storage and transmission. The technology: Enables a secure image processing channel from the sensor to the application processor; Provides cryptographic tools to protect individuals’ sensitive medical data; Ensures data integrity; Creates a secure environment to run algorithms analyzing raw data from the sensor; Encrypts sensitive data when being shared with the cloud. Do Young Lee, CEO of OPTOLANE, says “There is clear demand for innovative new diagnostics solutions that go from ‘sample-to-answer’ in real-time. Importantly, though, we fully understand our responsibility to protect patient data." Enhanced data security To deliver connectivity while protecting the sensitive personal data collected by diagnostic devices, we needed a proven hardware-backed security foundation. Trustonic’s experience protecting smartphones, wearables and IoT hardware, and securing critical mobile applications in the financial and automotive sectors, is assurance that our devices and patient data are secured to the highest standard.” OPTOLANE expects to receive FDA certification for the new device in the first quarter of 2020. Once certification is achieved the product will be available to clinicians in healthcare facilities around the world.
Round table discussion
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasizing systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?