By joining forces with Nelysis, MOBOTIX has, for the first time, entered into a partnership with a company that is one of the world’s leading providers of cybersecurity solutions. Nelysis solutions protect customers’ network infrastructures and systems to ensure physical security and protect control systems. For instance, the ‘Vanguard’ complete solution from Nelysis minimizes customers’ risks of external and internal hacker attacks as well as operational downtimes....
Matrox Graphics Inc. is pleased to announce a series of major updates to its award-winning Matrox Maevex 6100 Series of multi-channel 4K enterprise encoders. Supporting all of today’s most widely-used streaming protocols, the Maevex 6100 Series enterprise encoder appliances and cards now include built-in HLS support that allows enterprises to deliver multiple, dynamically-optimized streams to a broad range of devices over the internet. Maevex 6100 encoders now also support IPv6 addressing...
VuWall, the provider of video wall and AV network management, and TBC Consoles — a world-class technical furniture designer, manufacturer, and installer— announced a partnership to provide customers with an affordable and efficient control room kit that addresses the specific requirements of small to midsize control rooms — and fully complements VuWall solutions. Engineered to simplify the design, quoting and purchasing, and installation process for small and medium size contr...
The Canadian technology company Genetec offers a broad solutions portfolio that encompasses security, intelligence, and operations. With the integration of the Dallmeier Panomera systems in Genetec Security Center, the proven Panomera functionality is now available to the users of one of the most widely used unified security platform for the first time. This gives users completely new possibilities for observing and monitoring expansive areas and large spatial contexts. The Panomera multifocal...
Radiflow, global provider of industrial cybersecurity solutions for industrial automation networks, has announced that the company has launched a partner program for MSSPs to offer OT cybersecurity services. OT MSSP partner program Radiflow’s new OT MSSP partner program provides the framework for MSSPs to offer new cybersecurity services dedicated to ICS/SCADA networks to their industrial enterprise and critical infrastructure customers. Radiflow is aiming this offering at MSSPs that alr...
While most security teams are focused on preventing malicious outsider attacks, recent data suggests that close to 30 percent of confirmed breaches today involve insiders. Today’s increasingly complex networks across physical, information technology (IT) and operational technology (OT) systems make it difficult for security teams to detect and prevent insider threats. This is compounded by the proliferation of data, devices, applications, and users accessing networked resources. Rising i...
Advancis is a pioneer in the PSIM industry and helps protect critical infrastructure and high security sites around the globe with its leading-edge control room solution. This year at IFSEC, Southwest Microwave and TKH Security will be exhibiting in partnership with Advancis on its stand as part of the Advancis community of technology partners. For security system buyers and decision makers IFSEC International in London is an important event in the calendar with over 27,000 international visitors from more than 113 countries expected to attend on 18-20 June 2019. Excellent technology integration Advancis works very closely with its technology partners in a community approach to ensure that end clients experience excellent technology integration and seamless unification of disparate systems into the WinGuard PSIM software. Our mission is to offer the most stable and innovative PSIM solution on the market that provides the benefits of open architecture, cost efficiency and scalability as well as to provide high levels of support throughout a project’s life cycle. This unique and innovative community demonstration at IFSEC will be located at stand IF 2414, close to a main entrance and is expected to generate a great deal of interest amongst buyers who will be able to see an integrated security control room with the latest WinGuard X4 features with live integration of perimeter protection systems from Southwest Microwave as well as access control, security and video management from TKH Security.
Sepio Systems, which is disrupting the cyber-security industry by uncovering hidden hardware attacks, is gaining momentum in the U.S. after adding an important new customer and channel partner – the Integrated Security Solutions business unit of Johnson Controls, and strengthening its advisory board. Mitigating hardware-based attacks Sepio offers the world's first end-to-end solution that detects and mitigates hardware-based attacks, including rogue peripherals, invisible network devices, and manipulated firmware. The company’s Sepio Prime, which is a software-only solution, has been successfully deployed in over 20 mid-sized to large banks, insurance, and telecom companies in the U.S., Singapore, Brazil and Israel. The deal with Johnson Controls is bringing the technology to additional sectors. Sepio offers the world's first end-to-end solution that detects and mitigates hardware-based attacks Over the past months Tyco Integrated Security, now part of Johnson Controls, has been installing Sepio’s Rogue Device Mitigation solution on the premises of its customers. Sepio Prime helps Johnson Controls’ customers utilize sophisticated intelligence and hardware fingerprinting technology that is capable of rapidly and accurately detecting manipulated peripherals, transparent network devices and firmware vulnerabilities. Importance of cyber and data security The growing interest in Sepio’s product is the result of an unprecedented rise in cyber-attacks and data breaches caused by the ease of obtaining attacks tools that were until recently only available to governments. “Johnson Controls is a leading systems integrator in the security field and our connection with them will open up a new market for us,” predicts Yossi Appleboum, CEO of Sepio Systems Inc. Until recently Sepio had mainly focused on the finance and telecom sectors, but Appleboum notes that the “partnership with Johnson Controls and their network now exposes Sepio’s technology to hundreds of new clients in the North American market.” Intelligent solutions major Tyco Integrated Security was acquired and integrated into Johnson Controls Tyco Integrated Security was acquired and integrated into Johnson Controls, a global leader in the field of intelligent buildings, efficient energy solutions and integrated infrastructure. As part of Sepio’s effort to expand its U.S. presence, Suzan Zimmerman has joined the company’s advisory board. Zimmerman has worked in senior positions for numerous companies in the IT field including CACI International Inc., QinetiO North America Inc. and Science Applications International. “It is an honor to be part of an organization whose focus is protecting our mission critical systems. As our cyber threats become more complex, we must become more vigilant in evaluating the severity of the consequences, should we not be able to detect the intrusion at the source.” said Zimmerman. “With Sepio's technology implemented into corporate and governmental cyber tool kits, the protection of the agencies’ information will increase exponentially.” Suzan Zimmerman is the President and CEO of Strategic Capture Group, which focuses on helping companies to market, capture and win business in the government sector.
Radiflow, a provider of industrial cybersecurity solutions for industrial automation networks, announced the availability of its iSID Industrial Cybersecurity App on Cortex by Palo Alto Networks – the industry’s only open and integrated AI-based continuous security platform. Building on Cortex allows partners to use normalized and stitched together data from customers’ entire enterprises to build cloud-based apps that constantly deliver innovative cybersecurity capabilities to joint customers. The Radiflow iSID industrial cybersecurity app on Cortex provides critical infrastructure and industrial cybersecurity through non-intrusive monitoring of distributed production networks. The app utilizes data from Cortex Data Lake for added context to create a unique risk score for each device based on proprietary attacker models and defined defense strategies. Security analysts and risk managers can prioritise their actions based on the specific context of the OT network and the potential impact on the business if an attack occurred. AI innovations for accurate security outcomes Cortex is enabled by the Cortex Data Lake, where customers can securely and privately store and analyze large amounts of data“We are excited to continue our work with Palo Alto Networks and supply OT specific analytics on data collected by Palo Alto Networks,” said Rani Kehat, Vice President for Business Development at Radiflow. “This app enables customers to leverage their Palo Alto Networks investment and subscribe to value-added OT specific risk scoring and threat detection services provided by Radiflow.” “Cortex partners can leverage the vast amount of rich data available from across the enterprise to create AI-based innovations that provide more automated and accurate security outcomes to our joint customers,” said Karan Gupta, SVP of Engineering for Cortex at Palo Alto Networks. “We’re proud to welcome Radiflow to our expanding ecosystem of developers building innovative apps.” Cortex is designed to radically simplify and significantly improve security outcomes. Deployed on a global, scalable public cloud platform, Cortex allows security teams to speed the analysis of massive data sets. Cortex is enabled by the Cortex Data Lake, where customers can securely and privately store and analyze large amounts of data, normalized for advanced artificial intelligence and machine learning to find threats and orchestrate responses quickly.
LifeSafety Power Inc. continues to expand its popular rack mount solutions, now adding the integration of Honeywell ProWatch to the FlexPower Gemini line. The Gemini RGH rack mount power management system supports seamless hardware integration of Honeywell ProWatch door controllers and centralized power in a single, space-saving design. Rack mount power management Gemini RGH is a compact, 19-inch rack-mounted enclosure engineered for data centers, IT closets, server rooms or other areas where space is limited. It integrates ProWatch door controllers and power controller boards in a pull-out, easy-to-access mechanical housing, giving systems integrators the convenience of a tiered drawer configuration for their Honeywell access control specifications. RGH is the continuation of LifeSafety Power’s award-winning Gemini line. Gemini covers the most widely specified access controller configurations, with rack mount designs for Mercury, SWH, AMAG, HID and Honeywell controllers, as well as ‘power-only’ rack mount footprints recently made available with the newly released RGL. Gemini Series carry UL and ULC listings, as well as other certifications. Compact housing for door controllers “The Gemini line continues to expand in response to our customer’s requests for compact, integrated housings for the most popular door controllers along with power,” said Larry Ye, President and CEO of LifeSafety Power. “As space for technology and equipment becomes increasingly limited, Gemini meets the need for access control and power integration in an abbreviated, yet easy-to-service footprint.”
Delivering another high-value benefit to users, the Maxxess eFusion security management platform now integrates off-the-shelf and seamlessly with the widely used range of deister electronic key management systems. With this latest off-the-shelf integration, eFusion users can now manage all their keys from their centralized security management platform, reducing the risk of security breaches and streamlining their day-to-day operations. Modular and scalable, the deister electronic systems encompass a range of cabinets which can store anything from 8 keys to thousands. They can be used stand-alone or as part of a global corporate solution, in applications ranging from hotels and leisure settings to retail and up-scale residential developments. Reduces criminal activity Knowing who has a particular key at any given moment significantly reduces the risk of losses and criminal activity"“Knowing who has a particular key at any given moment significantly reduces the risk of losses and criminal activity,” says Lee Copland, Managing Director, Maxxess EMEA. “The deister electronic systems make that task much simpler. And with real-time reports logging all system usage, users can be held accountable for any misuse, theft of loss of keys – better protecting buildings and assets.” The integration with deister electronic systems is just the latest example of how the eFusion platform gives users the freedom to integrate, customize and adapt their security systems to meet both current needs and emerging risks. eFusion’s open technology software supports more than 60 off-the-shelf integrations from leading vendors, providing complete freedom to customize solutions combining surveillance, access control, fire and intruder systems with back-office processes. Making premises more secure Off-the-shelf integration between our key management systems and eFusion will deliver major benefits to customers"Crucially, integration with Maxxess eFusion also reduces complexity for installers and their customers and offers unlimited future scalability at affordable price points. “Off-the-shelf integration between our key management systems and eFusion will deliver major benefits to our customers,” says Darren Harrold, Head of UK Operations at deister electronics. “This means they can now link their essential systems together – including their surveillance, intruder, access and fire detection systems – making a wide range of premises easier to manage and more secure.” Visitors to IFSEC International can see Maxxess eFusion and deister key management in action, where both companies will be exhibiting on stand IF2120 and IF410 respectively from 18th to 20 June at London’s ExCel.
Eagle Eye Networks, globally renowned cloud video surveillance solutions company, has announced the introduction of an open, public domain, secure, plug and play communications framework that enables video manufacturers to connect cameras, DVRs and encoders to the cloud. Eagle Eye Networks’ Cloud Camera Specification has been developed with 10 years’ experience gained from practical integrations with camera manufacturers and cloud technology partnerships. Eagle Eye is providing an open source SDK and an open public domain specification that can be used across the industry. “Our primary objective is to make video surveillance easier for the integrator, the installer, and the customer. Open systems have been proven to do that better than closed systems,” said Dean Drako, CEO of Eagle Eye Networks. “We have extensive experience integrating cameras and recorders from the top manufacturers in the world. Now we are packaging our experience and cyber security expertise into this open solution by introducing EE Connect.” EE Connect EE Connect is available to any and all camera manufacturers, end users, and VMS makers EE Connect is available to any and all camera manufacturers, end users, and VMS makers. Camera manufacturers that embed EE Connect can have their cameras operate with any cloud system that implements EE Connect, including the Eagle Eye CameraManager and Eagle Eye Cloud VMS platforms. Eagle Eye provides certification and testing tools for the specification. “Eagle Eye Networks has always been at the forefront of innovation to create cloud-enabled cameras with maximum focus on cybersecurity. The new EE Connect specification enables the industry to keep focusing on supporting physical security and relying on Eagle Eye Networks to guarantee cybersecurity,” says Jeremy Howard, Vice President of Business Development for Hikvision USA. Open Source Secure Camera “What Eagle Eye is doing here is truly unique in the security market,” said Steve Van Till, Chairman of the Security Industry Association Standards Committee. “We have seen many standards come and go, but the open source approach that has been so successful in every other industry has never before surfaced in the security ecosystem. The availability of EE Connect source code and SDKs could spell an end to the closed system approach that has made it tough for integrators and end users to choose systems without fear of obsolescence.”
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola Acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security Buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies Acquires Arecont Vision After Bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion Acquires Access Control Company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilize power over ethernet, making them easy to install and cost effective as they utilize existing customer infrastructures. The company is based in Boulder, Colo. 5. HID Buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam Announces Acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal Acquires U.S. Security Associates Allied Universal, a security and facility services company, finalized its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls Acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT Acquires Red Hawk Fire & Security (and Others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies Continues to Acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
The focus of the global security industry will shift to London this month for IFSEC International, Europe’s ‘integrated’ security event focusing on the latest technologies and the opportunity to learn from the industry’s top leaders and experts. IFSEC will be held from 18-20 June, 2019, at ExCel London, welcoming 27,000 security directors and managers, installers, integrators and distributors. The exhibition at IFSEC may not be as large as previous years, and several big players are conspicuously absent. Even so, there will be plenty of innovation on display, including big exhibitors such as Avigilon, Axis, Dahua, dormakaba, FLIR, Genetec, Hanwha Techwin, HID Global, Hikvision, IDIS, and Uniview. Exhibitions will likely reflect a continuing shift in emphasis away from individual products and toward integrated solutions, including some end-to-end solutions provided by single manufacturers. Also, likely to be abundantly evident at IFSEC will be a trend toward manufacturers who partner together to provide integrated solutions. For example, look for some manufacturers to host other manufacturers at kiosks within their stands. Texecom will explain the value of training and digital services and their impact on the future of the industryValue of security training Emphasis will continue to be on the practical aspects of using technology: Throughout the show floor, designated technicians wearing ‘Show Me How’ badges will provide demonstrations of products and solutions on display at the various stands. Texecom will explain the value of training and digital services and their impact on the future of the industry. The Loss Prevention Certification Board (LPCB) Attack Testing Zone features LPCB’s security experts conducting live attack tests on a range of perimeter and façade security products, as well as safes, security enclosures and padlocks. More than 35 hours of seminar sessions will cover timely topics such as ‘Future Proof your CCTV Networks’, ‘Social Media and Internet Security’ and ‘AI and Machine Learning for Security’. Security topics at the Keynote Arena This year, topics will include video analytics, AI, machine learning, GDPR, Brexit and security in smart citiesThe new program will replicate last year’s successful changes. The Keynote Arena will again be placed at the heart of IFSEC, sponsored by Western Digital. The Keynote Arena will host influential speakers and real-life case studies to inspire attendees. Topical issues will take front and center, from cybersecurity to ethical and legal challenges to extremism. This year, topics will also include video analytics, AI, machine learning, GDPR, Brexit and security in smart cities. The Future of Security Theatre will present CPD-accredited sessions and presentations that share a vision of the industry’s future and answer burning questions about critical topics, technologies and issues. Education partner Tavcom will present the program of education dedicated to the ideas, products and innovations driving the industry’s development. The Converged Security Theatre will highlight new approaches that combine cyber and physical defences to tackle dangerous security threats. Included will be real-time technical solutions enhanced by artificial intelligence, powered by Vidsys and partners. Participation by government organizations The Government Pavilion will feature representatives from government bodies such as JSaRC, DIT, and DSOFor the third consecutive year, The Government Pavilion will feature representatives from government bodies such as JSaRC (Home Office & Counter Terror Unit), the Department of International Trade (DIT), and the Defense & Security Organization (DSO). New this year will be participation by the British Transport Police. IFSEC 2019 will again present a snapshot of how manufacturers from across video, access control and intrusion detection are continuing to innovate and collaborate to stay competitive in the challenging market. Innovations first unveiled in the spring at the ISC West 2019 show in the United States will be promoted anew for the European and global markets. IFSEC will be co-locating with FIREX International, a dedicated fire safety event that attracts 18,000 fire prevention and protection professionals; the FACILITIES Show highlighting building management and workplace technologies; and the Safety & Health Expo, dedicated to innovative health and safety products. IFSEC attendees can access the Smart Buildings Expo, the Workplace Wellbeing Show, and the Sprinkler & Suppression Presentation Area within the co-located events.
Coming off a successful ISC West show, Honeywell is sharply focused on product development, with an emphasis on advanced software. “We have a strong new product pipeline this year – more than two times the number of products than we’ve released in the past several years,” says Luis Rodriguez, Director of Product Marketing, Honeywell Commercial Security. “At ISC West, we received a lot of interest in how AI and new security systems are changing the market.” Although uses for AI are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. As more data is processed over time, AI will continue to build on its learnings to help deliver a more accurate assessment of potential threats each time. Machine Learning-Based Analytics End users should explore the use of machine learning-based analytics as machine learning is more advanced than AI-based systems, says Rodriguez. “When speaking to dealers and integrators, end users should also inquire about the detection accuracy of systems that use AI or machine learning technology, particularly around false positives and negatives.” Honeywell seeks to develop integrated security systems that provide the earliest detection “Additionally, end users should always ask to conduct site testing so to understand how well-suited the machine learning-based system is to the particular user’s native environment,” adds Rodriguez. “The testing will help identify the exact needs of their site.” Honeywell is reinvesting in its video portfolio, both in hardware and software innovation, as well as partnering with the top experts in the IT and education industries to stay ahead of customer demand. Honeywell seeks to develop integrated security systems that provide the earliest detection, enable the fastest response, centralize decision making, and allow customers to manage it all from anywhere. Solutions For Vertical Markets Honeywell Commercial Security is focused on supporting vertical markets that have specific security needs such as education, banking and finance, and pharma. Each has unique nuances that call for tailored security approaches. “As Honeywell continues to develop its suite of security solutions for the future and identify personalized systems for each vertical, AI such as analytics, deep learning and facial recognition will play an integral role during research and testing,” says Rodriguez. Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots An example is the education market, where eliminating human delay in reporting potential threats to law enforcement and creating faster systems that help omit single-point failures are key to protecting schools and ensuring students’ safety. To address those challenges, Honeywell is developing video and audio analytics technology capable of studying crowd behavior as well as detecting guns, gunshots and fights, says Bruce Montgomery, Business Development Manager, Honeywell Commercial Security. Testing Technology For Sports Security The software is able to visualize, automate planning, design and efficiency analysis of a video surveillance system"A partnership with University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4) is testing technology such as MaxPro Video, Pro-Watch Access Control and UNP Mass Notification in the National Sport Security Laboratory and in connected real-world environments. “The analytics data gathered from these environments will help inform future security innovations,” says Montgomery. Another Honeywell partnership is with JVSG, whose CCTV Design Software offers a new way to design more affordable and higher quality video surveillance systems. Integrators and distributors are now able to add a range of models from Honeywell’s portfolio of Performance Series IP Cameras into their system design from the software’s database. “The software is able to visualize, automate planning, design and efficiency analysis of a video surveillance system,” says Jeremy Kimber, Director of Enterprise Global Product Management, Honeywell Security and Fire. The program is used by more than 7,000 CCTV designers in more than 130 countries around the world and is downloaded more than 60,000 times every year.
Deploying security robots at a company is about more than providing and programming the hardware. There is also an element of “change management” involved in smoothing the way for robots to play a security role working side-by-side with human counterparts. Rising Popularity Of Security Robots As security robots increase in popularity, more companies are adapting to such cultural challenges "As security robots increase in popularity, more companies are adapting to such cultural challenges. Many Fortune 100, technology, finance and defense companies have begun using security robots, and some are asking to expand their implementation", says Travis Deyle, CEO and co-founder of Cobalt Robotics. "It is a complex solution that involves merging technology with people." “More people are looking at how they can deploy and test this technology, dipping their toes in the water,” says Deyle. “Financially the risk is low, but culturally it is pretty acute. It is a very visible piece of technology moving through your most sensitive spaces and interacting with employees.” Change Management “Doing change management and addressing the cultural implications inside the company are the biggest challenges we face,” Deyle adds. “We have to make sure that people know what the robot is there for, what it does and how it helps them. There is a social contract between companies and employees about what information is being collected and how is it being used.” The technical onboarding of a robot is the easy part, says Deyle. “The robot goes in, maps out the space; it takes about an hour. The bigger part is the cultural onboarding.” The process involves working closely with the company’s communications team to manage how the use of robots is messaged throughout the company. Deyle suggests doing a Q&A event where employees can touch and feel the robot and get comfortable. “We tailor the interaction to the individual company,” he says. Importance Of Communication Communication with employees, tenants, clients, law enforcement, etc. is very important Communication with employees, tenants, clients, law enforcement, etc. is very important and, if done well, all goes smoothly, agrees William Santana Li, Knightscope Chairman and CEO. “Showing up with a 400-pound, 5-foot-tall autonomous robot, deploying it and not telling anyone what is happening is ill advised!” Knightscope also advises potential end users to identify clearly the areas of improvement needed in a security program to guide the deployment of robots. Beware of “Science Fiction Disease,” whose symptoms include unrealistic expectations or fears emanating from Hollywood depictions of robots over the years. Expectations should be spelled out: Keep ongoing and clear communications between the provider and the client, continuing to make improvements together. Future Of Robotics And AI Users should also think clearly through their source of funding, including the second and future years of an implementation. Communication is key, involving stakeholders from the CSO to facilities, purchasing to human resources, finance to the CEO. The future of robotics in corporate America is more than the development of the technology. Given advances in artificial intelligence (AI), sensors and software, the technology is the easy part. Thinking more broadly about how robotics can excel in the corporate environment – and make companies safer – is the next big obstacle on the path to effectively using the powerful technology.
The Norpass access control system from Nortech using its Norpass3 software is providing secure access control at the BBFC (British Board of Film Classification) building in central London. Norpass3 software solution Chosen for its ability to provide a secure access control solution, Nortech’s Norpass system was installed on 16 doors around the Soho Square offices to support a range of access levels according to staff responsibilities and include a management system with a user-friendly interface. This allows staff movements to be monitored, ID cards to be issued and access rights to be changed according to ongoing requirements. Nortech’s Norpass system was installed on 16 doors around the Soho Square offices The BBFC is independent and not-for-profit and is in place to help everyone in the UK choose age appropriate films, videos and websites, wherever and however they watch or use them. Founded in 1912, they have been responsible for classifying films released in UK cinemas and on DVD and Blu-ray, and classifying content for Video on Demand services, such as Netflix and Amazon, as well as helping mobile phone operators set parental controls at the right level. Norpass access control modules Bradley Thomas, Facilities Manager at the British Board of Film Certification (BBFC) commented, “We have had the Nortech system in place for many years, we find it reliable and easy to use and their customer service team has always been helpful and informative to any queries.” The flexibility of Norpass access control modules and the user-friendly PC-based Norpass3 software together with Nortech’s elegant card readers made the Norpass access control system the ideal choice for BBFC. Since the installation, the system has provided secure access control throughout the building and, with Nortech’s support, BBFC has been able to keep the system up with changing requirements. Easy-to-use access control system Benefits of using the Norpass system include easy to use software offering a range of access levels Benefits of using the Norpass system include easy to use software offering a range of access levels, security that can be matched to an organization’s needs, a flexible structure for easy expansion and a system that has been developed in the UK and is supported by a UK based team. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Since renovation began in the 1990s, the Custard Factory in central Birmingham has grown into an important center for the creative and digital industries, as well as a destination for leisure, retail and cultural activities. The 15-acre site, which in Victorian days was a pioneering center for food and ingredients production, has been transformed into a thriving working community for hundreds of small businesses, benefiting from several phases of development. The Custard Factory now comprises multiple buildings in a vibrant city center location, so the risks of petty crime must be planned for and the safety of users ensured. Upgrading to IP and wireless technology An ageing analog video system at the Custard Factory was proving expensive to maintain and, without enough cameras, it was giving only limited coverage. An upgrade was needed but installation work had to take place without disruption to the many businesses at the site, so specialist integrator Unison Integrated Technology was asked to find the most suitable solution. Latest video tech from IDIS was selected because it provided the best image quality The latest video tech from IDIS was selected because it provided the best image quality, unrivalled usability and trouble-free installation with the ability to mix and match equipment. It also allowed existing infrastructure such as coax cabling to be incorporated, and by combining HD-TVI with the latest IP and wireless technology it enabled real-time monitoring in the control room without the need for complex and expensive civil works. IDIS IP cameras More than 60 new high-performance cameras have now been integrated into a leading-edge solution giving complete coverage of this diverse estate made up of the main Custard Factory Buildings, an open-air carpark, neighbouring external areas and the Fazeley studios. To protect the carpark and external areas, including historic archways, a mix of cameras has been used, including dome cameras with IR LED and wide dynamic range giving coverage in all lighting conditions. All IDIS IP cameras also benefit from IDIS Smart Failover technology which ensures continued video capture in the event of network instability or failure. DR-6316 H.265 NVR Video is streamed to the control room via a SilverNet wireless link, yet crucially there is no latency or lag on the images. These cameras are connected to a DR-6316 H.265 NVR, supporting 16 channels that utilizes IDIS Intelligent Codec to minimize bandwidth and storage requirements. Thanks to IDIS true plug-and-play technology, Unison Integrated Technology installed new cameras without disruption At the Fazeley studios, which includes both indoor and outdoor facilities, a combination of IP and analog bullet cameras, PTZs and domes are used. And at the Custard Factory main buildings, four PTZ cameras, two fixed domes and 25 bullet cameras are connected to IDIS’s powerful DR-8364D recorder, which supports up to 64 channels with a super-fast 900Mps throughput. IDIS true plug-and-play technology Thanks to IDIS true plug-and-play technology, Unison Integrated Technology installed the new cameras without disruption or any need to stop trading during the work, which included working around operational restaurants and shops. At the purpose-built security control, room operators now have a complete view of the site, allowing them to replace inefficient patrols on foot with more frequent video tours. And the free IDIS Center video management system (VMS) makes it easy to operate the new, enhanced system incorporating third-party cameras, the HD-TVI analog devices and the latest IDIS IP tech. High-resolution video surveillance With the new surveillance system and improved lighting in place visitors feel safer, particularly walking to and from the car park after evening events. The ability of the security team to monitor events real-time and respond to health & safety incidents is appreciated by event organisers using the Fazely venue. And police have been able to tackle petty theft more effectively thanks to the high-resolution video evidence which is now easily and quickly retrieved in order to tackle crime. The IDIS technology fully delivered on our requirements for an affordable, high-quality surveillance solution" The solution is flexible and scalable, with more cameras easily added as the Digbeth estate continues to evolve and expand. Custard Factory estate manager Simon Dunn says the upgrade has far exceeded expectations. IDIS video security system Simon says, “The IDIS technology fully delivered on our requirements for an affordable, high-quality surveillance solution covering our complete estate. The Unison engineering team delivered the project to the highest standard and they were considerate and respectful of our busy, live environment. I am very pleased with the result, both in terms of the quality of the images and the operation of the system, which is simple and effective.”
The client is a prestigious purpose-built skin, laser and cosmetic surgery clinic based in central Birmingham. In 2018, they relocated to a Georgian building following an expansion of the practice to welcome new professional associates and provide a greater range of patient services. Their upgraded and refurbished building includes a larger operating room with dedicated recovery areas, treatments rooms, consultation rooms and waiting areas. At this clinic, plastic, reconstructive and aesthetic experts carry out surgical and non-surgical procedures for the face and body as well as cosmetic dentistry, IV nutritional therapy and advanced spa treatments. IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham As well as a team of renowned doctors and practitioners and their administration team, the new premise is also accessed by numerous patients and their families visiting the clinic for pre-treatment and post-treatment consultations, as well as for the procedures themselves. Access Control And Intruder Detection System In their new premises, the practice required an access control and intruder detection system that delivered: Hassle-free access for staff with various levels of authority, from surgeons to administrators, for e.g. restricted access to consultation/treatment rooms and post-procedure recovery areas Limited access to patient information, drugs, high value surgical equipment and other high-risk assets Simple and reliable off-site management by permitted personnel, at any time and via their own computer, tablet or smartphone A secure yet serene and private experience for patients and visitors, for e.g. easy entry and exit for visitors to/from the main reception area Safety Of Staff And Visitors IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham. With nearly 100 years of combined experience installing security systems, the IGNIS team delivers on its reputation for quality of service, knowledge, reliability and honesty. An integrated system gives the client reassurance, simplicity and ease of use IGNIS works with integrated access control and intruder detection manufacturer Inner Range to deliver a cost effective, reliable service every time, with safety of staff, customers and visitors of paramount importance. Inner Range provided Inception, the core access control and intruder detection system used by IGNIS Fire Protection Services on this site. Inception was the perfect choice for this customer because it hangs off the same infrastructure with a single user interface. An integrated system gives the client reassurance, simplicity and ease of use. Offers Smart Building Management A pioneer of integrated access control and intruder detection systems, Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award-winning integrated security systems offer smart building management at local, national and global levels. Inception is Inner Range’s powerful yet affordable access control and intruder detection system, now featuring a range of extra reporting functions, anti-pass back protocols and interlocking doors. The system provides this dynamic clinic with the integrated access control they need to run their business with the utmost efficiency, safety and security. Key Features Available With Inception: A web-based interface that can be controlled by authorized staff using existing smartphones, tablets or computers Various entry points starting at 2 or 4 doors and 16 users and can be expanded if required up to 32 doors and 512 users Universal inputs and outputs that can be used independently of each other, to directly control door locks and powered sirens modules Secured alarm communication is using 128Bit AES encryption to ensure data privacy Interactive Commissioning Checklist IGNIS installed the Inception system using its interactive Commissioning Checklist that ensures no steps are missedIGNIS installed the Inception system using its industry-first interactive Commissioning Checklist that ensures no steps are missed. That process includes core programming, custom automation, changing default credentials, backing up the database and downloading commissioning reports. Inception’s wireless adaptability not only gives users flexibility, it means technicians don’t need to find an IP address or connect to the user’s local network. They can also use an adaptor as a service tool to perform maintenance on site. Benefits For Client: Peace of mind – 24/7/365 access and intruder detection solutions to keep patients, staff, visitors and assets safe and secure Convenience – the system can be controlled at all times via any mobile device No forgotten codes to interrupt the sensitive day to day running of the business or cause issues out of hours Value for money - no costly additional hardware and no need for a set on-site administrator or security guard Easy access and security means reception and support staff can focus on other responsibilities such as patient care
Brian Ishikawa has always kept tight control over his video surveillance system, allowing only authorized personnel within his corporate security division to access video footage. So it was a change for Ishikawa, Senior Vice President and Director of Corporate Security for the Bank of Hawaii, to get used to the idea of authorized staff from the bank’s branch division being able to review video for operational, compliance and marketing-related purposes. The insights collected from the video are helping the bank make more strategic decisions about staffing, customer service and even future branch design. Business Intelligence Our March Networks surveillance platform is providing us with some significant business and non-security-related uses" “Our March Networks surveillance platform is providing us with some significant business and non-security-related uses,” Ishikawa explained. Bank of Hawaii, which operates 69 branches and 373 ATMs across Hawaii, American Samoa and the West Pacific, is currently using March Networks Searchlight for Banking software to gather business intelligence at its branches. Searchlight’s mix of surveillance video, teller/ATM transaction data and analytics delivers valuable insights into the bank’s operations, as well as helping to enhance security and uncover fraud. “Our branch division folks look at the data to get ideas on how we should do our branch operations or staffing differently,” he said. People counting data — collected by FLIR Brickstream3D sensors integrated with the Searchlight software — tells them which entrances and exits are most used so they can place marketing materials in high-traffic areas. Video Surveillance Products The information is also being used to help determine future branch layouts. Queue length and dwell time data, meanwhile, help them understand their busiest time of day, and day of the week, so they can staff branches appropriately. “It’s a huge plus for us,” said Ishikawa. “Our executive management team can see the benefits of the video solution, and the future possibilities for this data.” A forward-thinking bank that’s keen to try new technology, Bank of Hawaii began exploring Searchlight after its success with March Networks’ other video surveillance products. The bank first started using March Networks systems in 2015, when it was time to upgrade its legacy DVRs. At the time, Bank of Hawaii was relying on two different video platforms, and it wasn’t happy with their performance. After enlisting the help of a consultant, and doing his own research at security tradeshows, Ishikawa says the decision to go with March Networks was clear. Network Video Recorders 'March Networks’ products are really engineered for the banking environment" “I remember asking some of my banking counterparts, ‘Hey what are you guys using?’ And they strongly recommended March Networks,” he recalled. The consultant came to a similar conclusion. He said, "March Networks’ products are really engineered for the banking environment,’ so that helped us make the decision.” Bank of Hawaii is currently using March Networks 8000 Series Hybrid Network Video Recorders (NVRs) in about half of its banking branches. The Linux-based devices provide reliable video surveillance recording and management, and are also easy to service, which is a huge bonus for Ishikawa and his team. In addition, the 8000 Series rack mount units feature an innovative ‘dock and lock’ station that allows technicians to easily remove and service the recorder while leaving all rear connections clean and organized in place. Existing Analog Cameras “With other companies, you have to power down the recorder for several minutes to service it, and that means unplugging and re-plugging all the inputs. You miss a number of minutes of recording during that time. With March Networks, we’re able to just pull out the hard drive and pop in another one without taking the NVR offline,” he said. “That’s huge for us.” According to Ishikawa, Bank of Hawaii also appreciates the 8000 Series’ hybrid support, which allowed the bank to continue using its existing analog cameras, and the motion histograms in March Networks Command video management software, which show Ishikawa and his team where motion occurred and helps them rapidly locate video evidence. “Command’s modern interface is really user-friendly, and it’s very easy to find video,” said Ishikawa. Dynamic Range Technology Bank of Hawaii has installed MegaPX ATM Cameras, which are purpose-built for ATMs “When someone is telling you, ‘Hey we had a problem at this branch this morning, I don’t know what happened, but it must have been around this time’, we’re able to find that video much more quickly on a March Networks platform.” The bank’s high resolution cameras also make it easy to discern important details. In its newer branches, Bank of Hawaii is using March Networks ME4 Series IP cameras, which capture 4MP images and feature high dynamic range technology to optimize image quality in both low and bright light. The bank is also using Oncam 360° cameras for high-resolution panoramic views. For security at its bank machines, Bank of Hawaii has installed MegaPX ATM Cameras, which are purpose-built for ATMs. Video is integrated with the bank’s ATM transaction data in the Searchlight software for rapid investigations into customer complaints and potential fraud. More Comprehensive Oversight “It’s so easy to search,” said Ishikawa. “It takes us exactly to that transaction and the associated video so we can figure out what transpired.” The bank is also integrating its teller transaction data with video in Searchlight for more comprehensive oversight of its branches. The combination of video, transactions and analytics helps it get a more holistic view of its services. “Transaction data is not always indicative of how busy a branch is,” Ishikawa said, noting that lengthier conversations at the teller counter often create value because the customer returns later to access another bank product or service. Having video and analytics is an added layer of information. Being able to remotely access video also helps Ishikawa’s security team conduct virtual patrols. This saves them both time and money. Uniformed Security Member Capturing video of the incident helped underscore the serious nature of the situation “In the past, whenever there was an issue, we had a uniformed security member head out and physically check the branch. But with virtual patrols, we can do fewer physical visits and, when we do visit, it’s a more meaningful visit.” The security team, for example, can keep an eye on issues with vagrancy and loitering by simply logging into the Command software. March Networks video has helped the bank successfully address some of these issues. In one case, a person was routinely visiting a branch and causing disruptions by yelling and throwing deposit slips on the floor. “We don’t always know the situation, but if a person is yelling or displaying erratic behavior, they pose a risk,” said Ishikawa. Capturing video of the incident helped underscore the serious nature of the situation. Investigating A Fraud “We were able to show police that this was not a minor disruptive party. It was a very concerning issue for us. And it wasn’t just our bank, it was occurring in other banks, too.” Going forward, Bank of Hawaii is planning to migrate its remaining retail branches to March Networks. Given the widespread benefits of intelligent video, Ishikawa predicts that, like him, more bank security managers will receive requests to share their video surveillance securely with other departments. “In the future, it won’t just be security that’s asking for a video upgrade,” he said. “It’s going to be other parts of the business saying, ‘We want a piece of the pie too.’ Because surveillance is more than just investigating a fraud or robbery incident. Now, video surveillance is a lot more than that.”
Bath and North East Somerset Council (B&NES Council) is extending its Videalert CCTV enforcement platform with the installation of additional cameras for its approved class C clean air zone (CAZ) that gives exemptions to private cars but charges higher polluting buses, coaches, HGVs, LGVs/vans, private hire vehicles and taxis. Videalert was awarded the contract to ensure full and seamless integration with the council’s existing hosted digital video platform which is already being used to enforce a wide range of restrictions including bus lanes, bus gates and permit parking. Videalert CCTV Enforcement Platform B&NES Council was one of 28 councils directed by the government to prepare an action plan to urgently reduce high levels of nitrogen dioxide (caused by vehicle emissions) to within EU and national limits by 2021 at the latest. The authority had originally proposed a Class D CAZ, charging all higher emission vehicles, including cars, to drive in the city center. However, following further ongoing technical work and a public consultation in December - which garnered an unprecedented 8,421 responses - a class C option with additional traffic management, was agreed. According to Chris Major, group manager for Transport and Parking at B&NES Council: “The new charging class C CAZ will achieve compliance by 2021 apart from a single exceedance caused by localised traffic issues. We believe this will be resolved by installing traffic signals at two junctions.” HD ANPR Cameras Videalert will be installing HD ANPR cameras to enforce the new CAZ scheme at key road junctions across the designated boundary Videalert will be installing HD ANPR cameras to enforce the new CAZ scheme at key road junctions across the designated boundary. The hosted Videalert platform will automate the management and enforcement of this new zone, providing real-time identification including vehicle make, model, color and euro standard rating for pre-filtering and updating the whitelist of compliant vehicles held at the edge to minimize transmission costs. Information on non-compliant vehicles will then interface with the UK government’s new national clean air zone database for vehicle validation and payment. The system will also provide detailed analytics and impact analysis highlighting the reduction in non-compliant vehicles entering the zone over time. Support Multiple Applications Tim Daniels, Sales and Marketing Director at Videalert, added: “The award of this high-profile contract confirms Videalert’s ability to handle the evolving requirements of clean air and low emission zones. It also demonstrates how a single video data platform can support multiple applications, enabling councils to address the challenges of improving traffic congestion and air quality simultaneously.” The CAZ should commence operation at the end of 2020. The daily charge will be £9 for non-compliant taxis, private hire vehicles and light goods vehicles (the minimum standard being euro 6 for diesel and Euro 4 for petrol), and £100 for buses, coaches and HGVs (the minimum standard being euro 6).
Kunsthalle Mannheim is a museum in Germany which contains a major collection of important art. Reliable technology, integrated in a networked solution from Bosch, ensures all-round protection on a total of 3,600 square meters of exhibition and storage space. A special focus of this is optimally safeguarding people and property without interfering with visitors’ encounters with priceless works of art. Customized Security Solution And Integration Since its inauguration in 1909 over a century ago, Kunsthalle Mannheim has acquired a global reputation as a very special place to experience modern art. The complex comprises a building in Art Nouveau style dating from 1907, underground storage rooms, a main building, and the newer Hector Building, completed in 2018. Coinciding with the opening of the Hector Building, a customized security solution installed and integrated by Bosch experts also debuted. The system’s components are almost invisibly connected with the various exhibition areas. The modular alarm system UGM 2040 and around 260 state-of-the-art video cameras monitor the interiors of Kunsthalle Mannheim as well as the open areas around. Fire Protection All of the security equipment is controlled by the Building Integration System from Bosch Comprehensive fire protection is provided by a fire alarm system spanning 700 detection points. There are 330 speakers in case it should ever be necessary to evacuate visitors and employees. All of the security equipment is controlled by the Building Integration System from Bosch. Modular Alarm System Thanks to this new solution, Kunsthalle Mannheim is facing the future with confidence. The modularity of the alarm system UGM 2040 allows fast, cost-effective implementation of modifications and extensions. Professional service technicians from Bosch regularly maintain it and perform any required repairs to ensure highly reliable operation and low overhead.
Round table discussion
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?