SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    ACTpro Updates To Version 2.14

    ACTpro Updates To Version 2.14

    ASSA ABLOY Incedo™ Business

    ASSA ABLOY Incedo™ Business

    Dahua Panoramic PTZ WizMind Network Camera

    Dahua Panoramic PTZ WizMind Network Camera

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • ASSA ABLOY Hands Over The Business Of Residential Doors Within Gardesa To Door Manufacturing Company Bertolotto
    • Interface Security Systems Completes $60 Million Equity Financing Transaction From SunTx Capital And Prudential Capital
    • HiveWatch, Security Fusion Startup Firm Secures Funding To Expand Technical Operations And R&D For Its Intelligent Physical Security Platform
    • AlgoSec Releases Latest A32 Version To Maximize Business Agility And Strengthen Cloud, SDN Security Management
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2020
    • Year in Review 2019
    Featured
    • Safety In Smart Cities: How Video Surveillance Keeps Security Front And Center
    • What Will Be The Security Industry’s Biggest Challenge In 2021?
    • Looking Back At 2020: AI Transitions From Buzzword To A Vital Tool
    • Retail Security In 2021 And Beyond
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker

    Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker

    Oliver Law Security Installs Vanderbilt ACT365 Security System To Protect One Of Doncaster’s Largest Gyms, The Fitness Village

    Oliver Law Security Installs Vanderbilt ACT365 Security System To Protect One Of Doncaster’s Largest Gyms, The Fitness Village

    Hikvision IP CCTV Systems Protect Visitors And Stores At Somerset Mall In South Africa

    Hikvision IP CCTV Systems Protect Visitors And Stores At Somerset Mall In South Africa

    CLIQ® Access Control Solution From ASSA ABLOY Helps Secure Museums, Shopping And Indoor Leisure Sites

    CLIQ® Access Control Solution From ASSA ABLOY Helps Secure Museums, Shopping And Indoor Leisure Sites

  • Virtual events
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Management Systems
    • Integrated Systems
    • Asset Management
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Capture New Opportunities With Computer Vision And Video Analytics

    Capture New Opportunities With Computer Vision And Video Analytics

    Maximizing 8K Resolution & LPR Solutions for Stadiums, Municipalities and Government

    Maximizing 8K Resolution & LPR Solutions for Stadiums, Municipalities and Government

    Vanderbilt ACT365 With Schlage ENGAGE Locks

    Vanderbilt ACT365 With Schlage ENGAGE Locks

    How Open Supervised Device Protocol (OSDP) is Revolutionizing Access Control Systems

    How Open Supervised Device Protocol (OSDP) is Revolutionizing Access Control Systems

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • Hanwha Techwin America
    • Eagle Eye Networks
    • Security & Safety Things
    • Gallagher Security (Europe) Ltd
    • Inner Range (Europe) Ltd
    Other Resources
    • eMagazines
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    2021 Trends in Video Surveillance

    2021 Trends in Video Surveillance

    5 Security Lessons For Navigating COVID-19

    5 Security Lessons For Navigating COVID-19

    Security Investments Retailers Should Consider For Their 2021 Budget

    Security Investments Retailers Should Consider For Their 2021 Budget

    Cyber Security and High Security in a Business Integrated World

    Cyber Security and High Security in a Business Integrated World

About us Advertise
  • Artificial intelligence (AI)
  • Counter Terror
  • Cyber security
  • Robotics
  • Thermal imaging
  • Intrusion detection
  • Body worn video cameras
  • ISC West
  • Video management software
  • Video analytics
  • COVID-19
  • View all

Intrusion detection

  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Hanwha Techwin Launches Wisenet Public View Monitors With Built-In Camera

Hanwha Techwin Launches Wisenet Public View Monitors With Built-In Camera

Product
Which New Buzzwords Reflect The Security Industry’s Trends?

Which New Buzzwords Reflect The Security Industry’s Trends?

Expert panel
Protege Group Selects Allison Transmission For A Fully Automatic Transmission

Protege Group Selects Allison Transmission For A Fully Automatic Transmission

Product
Johnson Controls And Alcatraz AI Collaborate To Provide AI-Powered Security Solutions And Services

Johnson Controls And Alcatraz AI Collaborate To Provide AI-Powered Security Solutions And Services

Corporate
LRG Inc Celebrates 20th Anniversary With $20,000 In Customer Appreciation Prizes

LRG Inc Celebrates 20th Anniversary With $20,000 In Customer Appreciation Prizes

Corporate

News

Check Point Research Shows A Massive 45% Spike In Cyber-Attacks Targeting Healthcare Organizations Worldwide
Check Point Research Shows A Massive 45% Spike In Cyber-Attacks Targeting Healthcare Organizations Worldwide

Researchers at internationally renowned cyber-security vendor, Check Point have reported a surge in cyber-attacks targeting healthcare organizations across the globe. Since the beginning of November 2020, researchers have documented a 45% increase in cyber-attacks targeting healthcare organizations worldwide, placing the healthcare sector at the top of the hit list for cyber criminals, when compared to all other industries. Surge in cyber-attacks on the healthcare sector The surge in cyber-attacks on the healthcare sector was double the increase in cyber-attacks on all other industries during the same time period, as researchers marked only a 22% increase in attacks on all other sectors outside of healthcare. The increase in cyber-attacks involves a range of attack vectors, including ransomware, botnets, remote code execution and DDoS attacks. Ransomware showed the largest increase and poses as the most significant malware threat to healthcare organizations, when compared to other industry sectors. Cyber-attacks in global regions Cyber-attacks on the global healthcare sector are simply getting out of control" The surges in cyber-attacks on healthcare organizations occurred mostly in Central Europe (+145%), followed by East Asia (+137%), Latin America (+112%), Europe (67%) and North America (37%). As for specific countries, Canada experienced the most dramatic increase with over a 250% uptick in attacks, followed by Germany with a 220% increase. Spain saw a doubling in ransomware attacks on its healthcare sector. Omer Dembinsky, Manager of data intelligence at Check Point said, “Cyber-attacks on the global healthcare sector are simply getting out of control. This is because targeting hospitals equates to fast money for cyber criminals. These criminals view hospitals as being more willing to meet their demands and actually pay ransoms. Hospitals are completely overwhelmed with rises in coronavirus (COVID-19) patients and recent vaccine programs, so any interruption in hospital operations would be catastrophic.” Rise in ransomware attacks Omer adds, “This past year, a number of hospital networks across the globe were successfully hit with ransomware attacks, making cyber criminals hungry for more. Furthermore, the usage of Ryuk ransomware emphasizes the trend of having more targeted and tailored ransomware attacks rather than using a massive spam campaign, which allows the attackers to make sure they hit the most critical parts of the organization and have a higher chance of getting their ransom paid.” Security tips for healthcare organizations to counter cyber-attacks: Look for Trojans – Ransomware attacks don’t start with ransomware. Ryuk and other types of ransomware exploits usually start with an initial infection with a Trojan. Often this Trojan infection occurs days or weeks before the ransomware attack starts, so security professionals should look out for Trickbot, Emotet, Dridex and Cobalt Strike infections within their networks and remove them using threat hunting solutions, as these can all open the door for Ryuk ransomware attacks. Raising guard on weekends and holidays – Most ransomware attacks over the past year have taken place over the weekends and during holidays, when IT and security staff are less likely to be working. Use anti-ransomware solutions – Although ransomware attacks are sophisticated, anti-ransomware solutions with a remediation feature are effective tools that enable organizations to revert back to normal operations in just a few minutes, if an infection takes place. Educate employees about malicious emails – Training users on how to identify and avoid potential ransomware attacks is crucial. As many of the current cyber-attacks start with a targeted phishing email that does not even contain malware, just a socially-engineered message that encourages the user to click on a malicious link, or to supply specific details. User education to help identify these types of malicious emails is often considered one of the most important defenses an organization can deploy. Patch virtually – The federal recommendation is to patch old versions of software or systems, which could be impossible for hospitals as in many cases, systems cannot be patched. Therefore, it is recommended using Intrusion Prevention System (IPS) with virtual patching capability to prevent attempts to exploit weaknesses in vulnerable systems or applications. An updated IPS helps organizations stay protected.

Safer Scotland Attracts Three More Senior Security Industry Professionals As It Continues Its Rapid Growth Trajectory
Safer Scotland Attracts Three More Senior Security Industry Professionals As It Continues Its Rapid Growth Trajectory

High-tech, Scottish-based site security company Safer Scotland has significantly enhanced its senior team as it continues to expand into the wider UK with the appointment of three security sector professionals. The Paisley-headquartered enterprise has secured the services of Peter Simpson as Head of Sales, Julian Free as Systems Specialist, and Paul McKenna as Business Development Executive. All three have chosen to join Safer Scotland from competitors within the industry. Head of sales Peter Simpson was Sales Director Northern UK and RoI for Prestwick-based PID Systems before teaming up with the innovative start-up, which was founded by security specialist Ryan Clark only in 2016. He said, “I have been very impressed with what Ryan has achieved in a relatively short time and it is clear that he has ambitious plans to take his technology-based business model to a much wider audience. I am very pleased to be a part of this journey.” Systems specialist Julian Free, who has an impressive track record in Technical & Sales roles within the Electronic Security industry, was Head of National Sales for Systems at the Kingdom Group and also worked previously for PID Systems. He said, “The security sector is evolving rapidly, and change is being driven by professionals such as Ryan Clark, who has helped transform the traditional manned guarding sectoral model by embracing technological advances. I am very happy to be part of the team and help drive the ongoing change.” Business development executive Paul McKenna joins Safer Scotland from security business, Fraoch Scotland, where he was a strategic business executive. He worked previously for both Arnold Clark and Capita. He said, “Safer Scotland’s reputation in the UK security market is already strong and as business development executive my intention is to enhance it yet further.” Contribution to the company Ryan Clark said, “We are delighted to have been able to attract three professionals of such a high caliber and we know that they will make a huge contribution as Safer Scotland continues to grow and expand.” Safer Scotland, which employs 14 staff in its senior management team, last year moved into new offices which also serve as a security demonstration center, illustrating how radically site safety and surveillance has changed in recent years. Branding The company also provides security guards, key holding and mobile response, and other security services. In the past year, it has made considerable inroads into markets in England and is branding its operations south of the border as Safer England.

Marks USA By NAPCO Security Technologies Announces The Launch Of LifeSaver Life-Safety Locks
Marks USA By NAPCO Security Technologies Announces The Launch Of LifeSaver Life-Safety Locks

Marks USA, a division of NAPCO Security Technologies, announces that its new anti-ligature slide models are gaining popularity. New to the LifeSaver series, the 5-Point Ligature-Resistant Slide Behavioral Health Models are Grade 1 anti-ligature locksets, available in cylindrical and mortise. The solid stainless steel handle slides down freely in the locked or unlocked position and is tamper-proof through-bolted for durability and easy-installation. They meet the latest BHMA 156.34 Anti-Ligature trim standard, accepted by OMH, NYS Office of Mental Health Patient Safety Standard and are JHACO approved. They are also available with GermAway anti-microbial finish, a built-in germ barrier and special antimicrobial finish that inhibits microbial growth of dangerous microorganisms, mold, mildew and fungi. Door locking systems Marks products are known for longevity, and are uniquely backed by the Lifetime Mechanical Warranty Used by leading institutions nationwide, LifeSaver Series of anti-ligature locksets, by Marks USA, meet or exceed today’s patient safety standards for managed liability, accident prevention and security in behavioral and health care institutions and correctional facilities. With products that meet or exceed top BHMA Grade 1 standards for durability, Marks products are known for longevity, and are uniquely backed by the Marks exclusive Lifetime Mechanical Warranty. NAPCO Security Technologies, Inc. is one of the world's renowned manufacturers of technologically advanced electronic security equipment including intrusion and fire alarm systems, access control and door locking systems. The company consists of NAPCO plus three wholly-owned subsidiaries: Alarm Lock, Continental Access, and Marks USA. The products are installed by security professionals worldwide in commercial, industrial, institutional, residential and government applications. Electronic security market NAPCO products have earned a reputation for technical excellence, reliability and innovation, poising the company for growth in the rapidly expanding electronic security market, a multi-billion dollar market.

Fotech Group: Turning Fiber Optics Into Smart Security Perimeter Systems
Fotech Group: Turning Fiber Optics Into Smart Security Perimeter Systems

Security breaches of borders, utility plants and airports can have catastrophic and devastating consequences, so protecting assets is vital. The global perimeter security market is expected to reach USD29.6 billion by 2025, driven by growing terrorist threats, increased awareness of illegal immigration, planned crimes, thefts and smuggling. Continuous monitoring system Existing perimeter intrusion detection technologies typically rely on point sensors such as cameras that are positioned along a perimeter or border at regular intervals. However, cameras have their limits. They can only provide line-of-sight coverage at specific points; they do not deliver continuous monitoring or provide full visibility of the entirety of the perimeter. Asset monitoring technology This is where LiveDETECT comes in. This real-time linear asset monitoring technology from Fotech, a bp Launchpad company, turns fiber optic cabels along a border or perimeter into an entire, continuous length of sensors, monitoring the asset at all times. “The sheer distance of some borders and perimeters means it is impossible to achieve true round-the-clock monitoring of the perimeter length with physical patrols or CCTV.” “The solution of positioning cameras every few metres is not feasible from an economic point of view yet leaving gaps in coverage is an open invitation for threats and intrusions,” says Ken Crowe, Security Industry Sector Manager for Fotech. Distributed Acoustic Sensing (DAS) technology Helios DAS analyzes the changes to identify and to categorize the disturbance eventLiveDETECT uses Distributed Acoustic Sensing (DAS) technology, which sends thousands of pulses of light along with fiber optic cables every second and monitors the pattern of light reflected back. The fiber optic cable picks up any acoustic or vibrational energy, which changes the light pattern that is reflected back to the hardware, Helios DAS, indicating a disturbance of some kind. Thanks to advanced algorithms and processing techniques, Helios DAS analyzes these changes to identify and to categorize the disturbance event, such as walking near or interfering with a boundary, placing a ladder on a fence, or digging near a perimeter. Each type of disturbance has its own signature, and the technology can tell an operator in real-time, what happened, exactly where it happened, and when it happened. More importantly, it can also filter out background noise, adapting its response for high-risk or low-risk zones along the perimeter. Perimeter security “If a perimeter is near a frequently-used track for runners, we can ensure that the normal activity doesn’t set off alarms.” “However, a personnel signature at 3 am or one that stops near the fence perimeter would be viewed as unusual. Any deviations from a normal pattern of behavior can be programmed and an alert raised,” says Crowe. If a security breach is detected and there is an attempted intrusion, the system alerts the Alarm Management Server and security personnel so they can take the most appropriate action. There are three levels of alert: green, amber, and red. Red is the highest alert level, usually when someone or something could imminently breach the inside of the perimeter. Easily integrated LiveDETECT should be part of a foundational security strategy. It is easily integrated into existing security systems, working in conjunction with cameras, sentry posts, and unmanned aerial vehicles (UAVs) also known as drones, to provide situational awareness and to enhance overall protection. “What LiveDETECT delivers is a perimeter with no security gaps. This increases the efficacy and accuracy of identifying potential breaches, as well as boosting the speed of response through the real-time detection of incidents anywhere on the perimeter,” Crowe adds. Active intrusion alert LiveDETECT is covert and intruders will be unaware of its existence With an active intrusion alert, LiveDETECT can provide information on where cameras should be pointing. Alternatively, LiveDETECT can send GPS coordinates of the on-going disturbance to a UAV, which automatically launches itself to investigate more fully. As fiber optic cables are typically buried in the ground, LiveDETECT is covert; intruders will be unaware of its existence. Furthermore, DAS is not affected by the weather, cameras would not be beneficial in a sandstorm or a snowstorm, whereas LiveDETECT can continue to operate reliably. Robust system “LiveDETECT is a robust system into which we can build extra safe-guards. The fiber optics can be configured in a dual-loop and run in parallel to provide redundancy, and maintain coverage if a sensing cable is maliciously or accidentally cut,” Crowe says. The monitoring system software can also be mirrored to a secondary site, so alerts are recorded in two locations, ensuring the responsibility does not lie with one person. Security for the future During the last decade, technological advances have helped increase the scope of perimeter security systems. Perimeter security systems have historically been used to detect and to deter intrusions in military facilities and critical infrastructure. Today, they are being adopted in commercial and transportation sites as well as residential gated communities in high-risk countries. LiveDETECT fills the gaps in the border and perimeter surveillance efforts, delivering continued monitoring compared to existing technologies, improved security, reduced human and drug trafficking, and detection of tunnel digging. Crowe concludes, “LiveDETECT’s ability to provide continuous monitoring of an entire perimeter and to raise alerts in real-time, gives security teams the comprehensive overview they need to manage their operations and respond to threats effectively.”

View all

Expert commentary

Building Security: How Audio Tells the Whole Story
Building Security: How Audio Tells the Whole Story

Every building starts with the entrance. A solid enterprise risk mitigation and security strategy include protecting that entrance. Often, risk mitigation strategies protecting the entrance have included high-resolution video surveillance cameras, video management systems, and access control solutions. But that strategy and set of security solutions only tells part of the story. Imagine a security guard who is protecting a facility after hours, when an individual approaches the entrance and seeks to gain access. The security guard can pull up the video surveillance feed and see the individual and his movements, which appear to be suspicious. But he also needs to hear him in order to decide the next decisions and actions. Does he escalate the situation, calling for backup and for first responders’ response, or does he allow the individual access to the building because he works there and is authorized to enter?   Meet high-definition voice What the security guard needs is to be able to hear and to communicate with that individual. All enterprise security systems need three primary components in order to successfully protect the entrance and to mitigate risk – access control, video surveillance, and the ability to hear and communicate. Each component plays an integral role in supporting a unified security system, and without all three, the security system is not complete. Access control can be thought of as the brains of a security system by holding data and permissions. It serves as the arms and hands of the system; it can either keep someone out or invite them in. IP video allows a security team to remotely position a set of eyes anywhere an IP camera can be placed on a network. With a video management system, security teams can see what is happening and decide how to respond. However, with remote viewing, the event may be over by the time security physically responds.  Audio adds interactivity That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides value. It also means that security is interactive. Security teams talk and listen to the person that’s seen on a video surveillance system, no matter where the location or how remote. If the person is lost or simply needs assistance, security personnel can talk to them and provide direction and reassurance. Even more, in an emergency, an interactive solution becomes a critical life-saving tool, as it provides data that can be shared between security, police, emergency services, and more. Audio can also detect voices, noises, breaking glass, or other sounds that are not within direct view of a video camera. An interactive security system creates an informed response, by providing real-time situation awareness management. Post-event, it supports forensics and investigations to mitigate future security incidents.  Audio and COVID-19 We are living in extraordinary times. As businesses begin to reopen and stay open, they are looking for any tools that can help them overcome the enormous challenges they face. In buildings and facilities, the COVID-19 pandemic has created a new security perimeter, one that demands contactless access with entry and exit, and that has also created a new duty of care for security professionals. Now more than ever is the need to interact and communicate with individuals moving in and out of doors and spaces without physical intervention. Intelligent communications, integrated with contactless access control, can help a business to comply with pandemic safety guidelines and ultimately, reopen for business and stay open.  COVID-19 has also increased the need for clean-room isolation and quarantine spaces, sometimes in areas not originally intended for that use, where risk of infection is high, and equipment must be easily disinfected between patients. Here, purpose-built cleanroom intercoms, providing clear touchless communications despite the noisy environment, have emerged as critical tools for enabling patient care while reducing the need to enter the contaminated space. For example, voice communication can enable hospital staff to verify identity and to communicate with patients without entering the isolated and infectious environment, which can save on personal protective equipment (PPE) and reduce the amount of exposure to the virus. In non-emergency healthcare facilities, such as medical centers, voice can effectively relay information to building occupants and visitors for screening purposes. Visitors can be seen and heard. For example, a patient who seeks access to a medical center for an appointment can hear important instructions from a nurse via the intercom solution. Seeing the person that you talk to is one thing but hearing them conveys a much better sense of closeness, making it possible to maintain a high level of security and customer service.  The whole story Today’s security systems should no longer simply involve video surveillance cameras generating feedback and images to a security guard. Instead, a new ecosystem for enterprise security and risk mitigation has emerged, and it’s one that involves video surveillance, access control, and high-definition voice. That ecosystem can ensure well-rounded and responsive information management and security platform, all communicating with each other and offering actionable insight into risks and potential physical breaches. Audio is the new value hub of the connected and intelligent school, campus, building, correctional facility, and more. Simply put, a silent security system cannot be an effective security system. In every situation, it is crucial for all security professionals to mitigate risk, no matter what they are protecting. This emphasizes the need to hear, be heard, and be understood in virtually any environment.  

Wireless Technology Is Transforming Motion Detection
Wireless Technology Is Transforming Motion Detection

Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.

Can CCTV Become A More Effective Tool?
Can CCTV Become A More Effective Tool?

We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be improved to become a more effective system so that you’re better protected, and can even deter a potential intruder without having to panic. In our world of ever-changing technology, we’re able to upgrade and enhance our CCTV systems so they can become a monitored system. Remote CCTV monitoring is an ideal way to protect everyone and everything whether you’re at home or at a workplace. What is remote CCTV monitoring? For a long time, CCTV was one of the best ways to keep your home, the office and people safe. But people started to notice that it would only deter people so much of the time and often the cameras were ignored by intruders. They would just cover their faces and hope for the best as they steal from a home, office or any other premises. Remote CCTV monitoring is a system that can loop into your existing CCTV, or come preinstalled with a new system. This technology sends a feed to a control room full of trained operators that are on call 24/7. Within this control room, operators are able to respond to any sort of distress call or unauthorised movement on the property line.  How does it work? Remote CCTV monitoring works by attaching to a live feed of your CCTV system, existing or new, so that the signal and images can be passed to a team of operators. These operators are on hand 24/7 so that if there is a problem, you know that you're safe in the hands of a specialist team. The specialist team has been trained to mitigate the chances of somebody breaking into your home when the system is triggered; similarly they call the local authorities instantly so that the potential intruder has less time to flee the scene. This is especially important if an intruder is already inside your property because they have less time to steal your items and leave. Without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process One of the biggest questions that revolve around remote CCTV monitoring is the idea of operators watching the CCTV at all times. Luckily most remote CCTV monitoring systems will incorporate a motion detection system to accompany your CCTV. Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line. These motion detection systems are state-of-the-art and so, depending on the system that you choose, they can watch over your property from a number of angles. Once the motion detection system has been triggered and the alert has been sent to the control room, then and only then will the operators get involved. This means that until the motion detection system has been triggered, nobody will watch your live CCTV feed. After one of the systems has been triggered, one of the specialist operators will instantly jump into action. This means that they can take different measures to deter any potential intruder and make sure that they do everything in their power to stop any damage or theft from the premises. In addition to the motion detection system and CCTV, you are able to opt for a public address (PA) system too. This means that an operator is able to shout commands through the PA system and potentially scare away any intruder. The intruder will also be warned about the fact that local authorities have already been called to the location.  Remote monitoring versus traditional CCTV Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line Having a monitored CCTV system means that you're able to better protect yourself, your business, employees and even your loved ones. Whether you're at home or in the office, having someone looking over your shoulder protecting your every move is something that can be appreciated by everybody. The biggest problem with just having traditional CCTV, is that it is a reactive system. This means that rather than stopping crime, a CCTV system just records it. While the thought is that having a CCTV camera visible can deter some intruders, there's no real evidence to suggest that it stops anybody; anyone can simply cover their face and carry on breaking into your home, office or even your car. As mentioned, remote CCTV monitoring is going to tackle that problem and make sure that someone is on hand to protect you at all times.

View all

Security beat

Looking Back At 2020: AI Transitions From Buzzword To A Vital Tool
Looking Back At 2020: AI Transitions From Buzzword To A Vital Tool

Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content. In the security market today, AI is expanding the use cases, making technologies more powerful and saving money on manpower costs - and today represents just the beginning of what AI can do for the industry. What it will never do, however, is completely take the place of humans in operating security systems. There is a limit to how much we are willing to turn over to machines - even the smartest ones. Beyond video analytics "Apply AI to security and now you have an incredibly powerful tool that allows you to operate proactively rather than reactively," said Jody Ross of AMAG Technology, one of our Expert Roundtable Panelists. AI made its initial splash in the physical security market by transforming the effectiveness of video analytics AI made its initial splash in the physical security market by transforming the effectiveness of video analytics. However, now there are many other applications, too, as addressed by our Expert Panel Roundtable in another article. Artificial intelligence (AI) and machine learning provide useful tools to make sense of massive amounts of Internet of Things (IoT) data. By helping to automate low-level decision-making, the technologies can make security operators more efficient. Biometrics with access control Intelligent capabilities can expand integration options such as increasing the use of biometrics with access control. AI can also help to monitor mechanics and processes. Intelligent systems can help end users understand building occupancy and traffic patterns and even to help enforce physical distancing. These are just a few of the possible uses of the technologies - in the end, the sky is the limit. AI is undoubtedly one of the bigger disrupters in the physical security industry, and adoption is growing at a rapid rate. And it’s not just about video analytics. Rather, it is data AI, which is completely untapped by the security industry. Bottom line: AI can change up your security game by automatically deciphering information to predict the future using a wide range of sources and data that have been collected, whether past, present, and future. That’s right. You can look into the future. Smarter perimeter protection Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognize a plethora of different object types, can distinguish objects of interest, thus significantly decreasing the false-positive intrusion rate. The more advanced AI-based systems enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customizable in particular systems, which allows for a range of detection options. Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Meeting urban needs Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. Newer edge computing will play an important role in capturing, collecting, and analyzing data. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyze it and deduce a lot of valuable information in real-time, instead of post-event. In smart cities applications, the challenge of identifying both physical and invisible threats to meet urban citizens’ needs will demand a security response that is proactive, adaptable and dynamic. Optimize security solutions As we look ahead to the future of public safety, it’s clear that new technologies, driven by artificial intelligence (AI), can dramatically improve the effectiveness of today’s physical security space. For smart cities, the use of innovative AI and machine learning technologies have already started to help optimize security solutions. In sports stadium applications, AI’s role in getting fans and spectators back after the COVID pandemic is huge, through capabilities such as social distance monitoring, crowd scanning/metrics, facial recognition, fever detection, track and trace and providing behavioral analytics. Technologies such as AI-powered collaboration platforms now work alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. AI surveillance software In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. AI surveillance software, when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. One of the biggest advantages of using AI technology is that it’s possible to integrate this intelligent software into building smarter, safer communities and cities. Essentially, this means developing a layered system that connects multiple sensors for the detection of visible and invisible threats. Integrated systems mean that threats can be detected and tracked, with onsite and law enforcement notified faster, and possibly before an assault begins to take place. In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI. Fighting illicit trade Using technology in this way means that thousands of people can be screened seamlessly and quickly, without invading their civil liberties or privacy. AI’s ability to detect visible or invisible threats or behavioral anomalies will prove enormously valuable to many sectors across our global economy. Revolutionary AI-driven technologies can help to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. AI can support the ongoing fight against illicit trade on a global scale in a tangible way. For financial transactions at risk of fraud and money laundering, for example, tracking has become an increasing headache if done manually. As a solution to this labor-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents - often billions of pages of documents - in a short period of time.

Looking Back At 2020: Cloud Systems Expand In Shadow Of COVID
Looking Back At 2020: Cloud Systems Expand In Shadow Of COVID

The cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft, or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realization of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets.  MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staffThe advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs, and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.

How Integrators And Their Customers Reacted To COVID-19 Pandemic
How Integrators And Their Customers Reacted To COVID-19 Pandemic

The COVID-19 pandemic has provided a double challenge to physical security systems integrators. For one thing, they have had to adapt their own businesses to survive and thrive during the pandemic. On the other hand, they have also been faced with new challenges to serve their customer’s changing needs. Global pandemic effects One integrator company, North American Video (NAV) took the now-familiar steps most companies confronted to adapt their business model to operations in a global pandemic – they suspended all non-essential travel and face-to-face meetings. At one point, NAV had a single employee in the New Jersey headquarters and another one in the Las Vegas office. The rest worked from home, with other offices opening as needed over the following weeks. Another integrator, Convergint Technologies, was able to adapt its approach to the pandemic, location by location, across the United States. The integrator benefitted from its leadership structure, with local managers in various regions who are autonomous and could react to what was happening in each region. Virtual workforce “We saw a dip in April and May, but since then, we have seen business pick back up,” said Mike Mathes, Executive Vice President, Convergint Technologies. The Business of Integration virtual conference sponsored by the Security Industry Association (SIA) “We already had tools and infrastructure deployed to support a virtual workforce. We had the software and the right equipment, and that has allowed us some flexibility to approach the repopulation of our offices in a gradual way.” The impact of COVID-19 on integrators and their customers was the main topic of discussion at a session on The Business of Integration at the Securing New Ground virtual conference sponsored by the Security Industry Association (SIA). Remote monitoring North American Video also benefitted from having technical personnel spread across the United States. By assigning work duties on the basis of geography, they could travel by car with less risk than air travel. They also increased their use of remote monitoring and support to avoid extra visits to customer sites. With 80% of the business in the gaming industry, North American Video saw a profound impact on their customers with the almost complete shutdown of casinos during the early days of the pandemic. Even though gaming was impacted particularly badly by the virus, NAV stayed engaged working on four or five large casino construction projects that continued throughout the shutdown. Revenue shortfalls State legislatures will approve more casinos to help plug the holes in their budgets Other casinos took advantage of empty facilities to make needed upgrades without worrying about disrupting casino operations. “A lot of our strong, long-term clients have sought to perform upgrades during the downtime, including needed service and maintenance,” said Jason Oakley, President and CEO, North American Video (NAV). “When gaming was closed, you were allowed in the facilities to work.” Oakley also sees long-term optimism for the casino business, which will offer a means for state and local governments to make up revenue shortfalls. “State legislatures will approve more casinos to help plug the holes in their budgets,” Oakley predicted. Demands for technology Oakley and NAV have seen an evolution in customer demands for technology in light of the pandemic. The trick is to differentiate between demand that is an immediate reaction versus technology trends that have more staying power.  Although customers were keen on purchasing thermal cameras, for example, NAV did the research and recommended against the use of the technology to some of their customers. Artificial Intelligence for social distancing The use of artificial intelligence (AI) for a variety of applications seems to have more staying power. “One area of interest at a high level is modification and repurposing of AI for face mask detection, social distancing and people tracing, including integration into existing cameras,” said Oakley. “If the hospitality industry comes to terms with the new normal with smaller restaurant capacities, there may be an opportunity to use AI for social distancing.” Contact tracing and visitor management technology Mathes of Convergint sees a massive change as customers move toward managed services, accelerating the change with new use cases. We have an entire group that focuses on new solutions and what customers are looking for" As offices seek to repopulate when the pandemic subsides, customers are looking for new uses of existing technologies, added Mathes. “We have an entire group that focuses on new solutions and what customers are looking for,” he said. “They need to understand who is in the building and where they go in the building. If we know someone was only in the cafeteria from 10 to 11 a.m., we can know who was in the cafeteria at that time.” Opportunity for vertical markets to move forward He predicts technologies for contact tracing and visitor management tracking who’s in the building and where will be around for a long time to come. "Various customers and vertical markets are looking at the slowdown differently," said Mathes. "For example, while airlines have slowed down, the view from the airport market is more long-term." “They have 15-year plans, and [the slowdown] is an opportunity to move forward. In the technology space, data centers are expanding. “We try to focus our resources on areas where the money is being spent,” said Mathes. “Our K-12 group has seen an 80% growth over 2019. The money is tied to bonds, so there hasn’t been a slowdown relative to revenue.” He said Convergint is cautiously optimist about 2021.”

View all

Case studies

MOBOTIX Releases A Description Of The Various Functions Of Their Intelligent Cyber Secure Camera Systems
MOBOTIX Releases A Description Of The Various Functions Of Their Intelligent Cyber Secure Camera Systems

Since the beginning of the Corona pandemic, MOBOTIX thermal cameras have been increasingly used in the healthcare sector, as well as airports, train stations, public authorities, and companies, to detect temperature anomalies in people without contact and thus contain the spread of the virus. However, this aspect is only one area for which MOBOTIX technology is currently providing special services. The MOBOTIX 7 Platform, with its intelligent and cyber secure camera systems M73 and S74, predestined MOBOTIX video technology even before the pandemic to ensure comprehensive, digital support in healthcare clinics and the care of the elderly and disabled. The reliable, high-quality video systems made in Germany reduce hospital and nursing staff's workload, provide digital care for patients and residents, and optimize care and workflow processes. Parking lot management Basic safety and pandemic protection in healthcare Also, during the pandemic, a special duty of care applies to employees, patients, and residents as a risk or high-risk group. MOBOTIX video technology is used in numerous clinics, retirement, and care facilities worldwide to ensure that patients, residents, and employees have a carefree stay and can work safely. Dangers and sources of risk are detected, and the intelligent systems warn, report, or directly initiate assistance and rescue measures. With the MOBOTIX 7 platform and the versatile apps, MOBOTIX offers exceptional application possibilities This allows staff to concentrate on their work, while hospital patients and nursing home residents can recover more quickly and get the rest they need. MOBOTIX video technology is also used for early fire detection and access control, mainly to protect sensitive areas such as sterile rooms, operating theaters, or medication depots. MOBOTIX also offers the right solutions for intrusion and theft protection, securing outdoor spaces, or access monitoring and parking lot management. With the MOBOTIX 7 platform and the versatile apps, MOBOTIX offers exceptional application possibilities: Temperature-sensitive people are detected as soon as they enter the facility and can be immediately sent for further examination. Crowding is avoided, and social distancing can be supported. MOBOTIX video systems detect when no mask is being worn and trigger an alarm or an information announcement. Cybersecurity and data protection Cybersecurity and data protection "Made in Germany” Particularly in the healthcare sector, cybersecurity and data protection must be given the highest priority. After all, it is a matter of protecting lives. But it is also about sensitive, personal data that must not fall into the wrong hands under any circumstances. MOBOTIX video systems consist of high-quality components. Developed, produced, and comprehensively tested at the company's German headquarters in Langmeil/Rhineland-Palatinate, the company creates products and solutions that are impressive not only because of their outstanding image quality - even in the most challenging lighting conditions. One hundred percent DSGV-compliant, the decentralized MOBOTIX systems stand for the highest possible cybersecurity and comprehensive data protection. Unauthorized persons cannot read the stored data. Intelligent video technology Relieving the workload of hospital and nursing staff with "digital care” Using intelligent video technology from MOBOTIX can significantly reduce the hospital and nursing staff's workload Hospital and nursing staff often work at the breaking point. Using intelligent video technology from MOBOTIX can significantly reduce the hospital and nursing staff's workload. For example, adequate video support can be used to carry out control rounds digitally. On the one hand, this creates free space that can be used for personal care and nursing, while on the other hand, emergencies are reported directly at the time they occur - and thus, the staff does not lose critical time. Effective signaling and calling systems targeted alarm differentiation, and the avoidance of false alarms keep staff motivation high and reduce alarm fatigue. Incorporating audio systems Digital and discreet care for patients and those in need of care MOBOTIX provides discreet video support for round-the-clock security without anyone feeling they are being watched. The video surveillance systems in healthcare facilities are discreetly and unobtrusively installed; they also detect and alert only when defined events occur to keep recordings to a minimum. At the same time, patients and residents can be sure that help will arrive quickly in an emergency. Even at night, helpless individuals are detected immediately, ensuring their safety and preserving their independence. By incorporating audio systems, MOBOTIX video solutions for healthcare also enable patients to be addressed and communicated directly with. license plate recognition Optimize hospital and care processes Smooth organization of routines helps hospitals and retirement and care facilities be efficient and profitable Smooth organization of important routines helps hospitals and retirement and care facilities be efficient and profitable. Numerous processes can be automated and optimized with MOBOTIX video technology, from the facility's journey to check-out. For example, professional parking management with license plate recognition can ensure that only authorized vehicles can access specified areas. In this way, ambulance access routes can be kept free, or parking fees can be billed in a straightforward, fast, and accurate manner. Queues in registration or examination areas can be avoided, and smooth administration and medical and care areas can be enabled. University hospitals or teaching institutions can use high-resolution camera systems, e.g., in operating theaters, to fulfill their teaching and training mission without disruptions. Customers can develop further apps that enable completely individual solutions themselves or have them created by MOBOTIX and its technology partners and certified concerning cybersecurity. Advanced video technology Comprehensive solutions with the best return on investment Healthcare is a market that is extremely important to MOBOTIX. The high level of solution expertise digitizes processes and work steps in everyday hospital and home life, using intelligent and future-proof video technology. Thus, simplifying work and making it safer also relieves the healthcare budgets' pressure and increases profitability (ROI).

OPTEX Selected By Harper Security Systems To Protect Private Residences And Property In Rural Environments
OPTEX Selected By Harper Security Systems To Protect Private Residences And Property In Rural Environments

Harper Security Systems, which specialises in specifying and installing smart security solutions for residential and private properties, has selected OPTEX’s range of Intelligent Passive Infrared (PIR) sensors for their reliability in detecting external threats, especially in rural environments. Three properties in the Home Counties and Lincolnshire are using a combination of OPTEX’s proven PIR sensors to protect property, people, and other important assets including horses from the dangers of vandalism and theft. OPTEX’s range includes sensors which offer panoramic 180-degree detection coverage and 12m/40ft radius to detect any intrusion around a residential or commercial building. Commercial business environments They are ideally suited for protecting larger residential grounds and flat roofs typical with outbuilding on farms and stables. “We have worked with OPTEX for a number of years and have found their range of PIR sensors to be extremely accurate and reliable, which is critical when specifying external detection,” says Alan Harper, Director at Harper Security Systems. The flexibility and versatility of the sensors is such that they are ideal for multiple environments" “The flexibility and versatility of the sensors is such that they are ideal for multiple environments,” Alan continues. “For example, we have recently installed them at a private stables in Lincolnshire to protect horses and valuable equestrian equipment, residences in rural villages in both Bedfordshire and Hertfordshire to protect property and personal items, as well as in commercial business environments.” Innovative security solutions Ben Linklater, Sales Director at OPTEX Europe, says that while the focus is often on towns and cities, crime in the countryside is a huge issue, costing the rural community in the UK more than £9 million this year alone: “Reliable external protection is becoming increasingly important not only to secure equipment and assets, but also livestock and other animals like horses. The earlier the detection the better chance there is to prevent intruders." "External intrusion detection is essential in rural environments as most assets, many of which are expensive to replace (and some are irreplaceable), are stored outside. We are very pleased to work with Harper Security who understand the benefits of early detection to keep premises, assets, people and animals secure, delivering innovative security solutions to their customers.”

Bosch Secures Granarolo Plant At Soliera With Their Intelligent Video Analytics System
Bosch Secures Granarolo Plant At Soliera With Their Intelligent Video Analytics System

Situated near the picturesque small town of Soliera in northern Italy, the dairy plant of Italian food company Granarolo is anything but small: More than 600 farmers, 70 trucks for the collection of milk and 720 vehicles handle 850,000 tons of milk every year. Its dairy products such as milk, yogurt, ice cream, cheese, and lately also ham and pasta, supply several million Italian families every day. The plant’s huge production capacity is reflected in the size of the perimeter: The Soliera facility stretches out over 45,000 square meters. Furthermore, it is located near a wooded land which is important when it comes to designing a security system aimed at protecting the plant against intrusion. Video surveillance system Granarolo wanted to replace an old analog video surveillance system by a digital one as its security challenges exceeded the limits of the old installation. The project posed several challenges. The most significant being the vast area of the factory itself, as well as the location of the perimeter near an area that can only be poorly overseen. Since the factory is located in a heavily wooded area, building an appropriate video security system is more challenging because it needs to be safeguarded against false alarms, triggered by ever-changing lights, shadows and the constant movement of trees and plants. Tackling these challenges, Naples-based Bosch partner Gruppo Sirio worked out the modernization of the plant’s security system, with Bosch cameras featuring built-in Intelligent Video Analytics (IVA) at the heart of the system. Detecting suspicious objects Bosch provided a video surveillance system with 48 cameras of the Dinion series With the help of the security cameras’ integrated video analytics, virtual lines were drawn around the area to be protected against intrusion. When these lines are crossed by intruders, the programmed rules automatically generate alarms, alerting on-site security personnel to intervene. Whether the cameras are tasked with detecting suspicious objects or unusual movements in daylight or night-time, constant surveillance with a special focus on sensitive areas ensures security. In total, Bosch provided a video surveillance system with 48 cameras of the Dinion series. The system, which is managed on one central platform, is completely autonomous and entirely separate from any other system or network in the plant. This ensures maximum security even in the event of potential failures of other systems on site. Perimeter protection solution As a result of the modernization process, Granarolo can now rely on a system specifically designed for its needs. The newly established, digital video surveillance and perimeter protection solution supports the security personnel in maintaining maximum levels of security through the entire area. It also guarantees that food safety standards in the protected facility are guarded against outside influences. Ultimately, the system allows the staff to fully focus on keeping the production running at all times, thereby contributing to secure the sensitive chain of the Italian food supply against interruptions.

Unified Approach With OPTEX sensors And Genetec RSA Surveillance Module To Enhance Airport Perimeter Security
Unified Approach With OPTEX sensors And Genetec RSA Surveillance Module To Enhance Airport Perimeter Security

One of the key problems in airport security is the sheer size of the perimeter and a large number of incidents are in fact linked to unauthorized access onto the airfield, either runways or where aircrafts are being loaded or refueled posing an extremely high risk. Most airports will combine multiple sensors and technologies to protect the actual perimeter fence and even beyond the perimeter fence, to warn of potential threats. OPTEX LiDAR sensor integration with RSA module Some airports have found the level of information generated by the perimeter security systems quite challenging to deal with and they wanted to decrease the number of events so operators could focus on what was critical. The Airport development team at Genetec integrated the OPTEX LiDAR sensor into their Restricted Security Area (RSA) Surveillance module, an extension of the Genetec Security Center platform with the purpose to unify data from the sensor and camera to present more meaningful information to the operators.  Restricted Security Area Surveillance module The RSA module has been designed specifically with a view to providing wide area protection The RSA module has been designed specifically with a view to providing wide area protection and integrating with wide area surveillance technology, including radar, fiber optic and laser detection devices. The solution allows security staff to determine the level of threat for each area, map them, and utilize OPTEX technologies to identify and locate quickly and precisely the point of intrusion. For instance, with Fiber optic fence sensor, zones can be 100m-200m long and will identify people cutting through a fence, crawling under or climbing over. Newer fiber technologies provide point location. Another way to pin-point exact intruder location is with OPTEX LiDAR technologies or with Radar. ‘Fuse’ data into a single event A particularly intelligent feature of the system is its ability to ‘fuse’ data (known as ‘target fusion’) coming from multiple sources and confirm an event as a single (i.e. the same) activity rather than a multiple threat. For instance, using the X&Y coordinates provided by OPTEX REDSCAN sensors, RSA allows to map exactly the path of the intruders or moving vehicles, fuses the path from one camera to the other and considers it as one event, one target and tracks it precisely on the map. Intelligent Tracking and event categorization This gives a more meaningful picture to the operator and presents events in a unified and intelligent way. This helps support the security team in making the right decisions. The deeper integration of OPTEX’s technologies into Genetec’s RSA platform enables intelligent tracking and event categorization, making it a very precise security system for airports.

View all

Round table discussion

What Is The Biggest Change In The Security Industry Since 2010?
What Is The Biggest Change In The Security Industry Since 2010?

Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?  

What’s New In Command-And-Control Systems?
What’s New In Command-And-Control Systems?

Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?

What Are The Mainstream Uses For Thermal Cameras?
What Are The Mainstream Uses For Thermal Cameras?

The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?

View all

Products

ReX — Intelligent radio signal range extender

ReX — Intelligent radio signal range extender

Vanderbilt SPC Intrusion Detection Platform

Vanderbilt SPC Intrusion Detection Platform

Hikvision DS-2DT6223-AELY 2 Megapixel Anti-Corrosion Network PTZ Dome Camera

Hikvision DS-2DT6223-AELY 2 Megapixel Anti-Corrosion Network PTZ Dome Camera

New Management Experience With VIVOTEK VAST 2

New Management Experience With VIVOTEK VAST 2

Vanderbilt SPCK521 Compact Keypad With Graphical Display, Card Reader And Audio

Vanderbilt SPCK521 Compact Keypad With Graphical Display, Card Reader And Audio

Vanderbilt (formerly known as Siemens Security Products) GT2 Glass Break Detector

Vanderbilt (formerly known as Siemens Security Products) GT2 Glass Break Detector

Vanderbilt (formerly known as Siemens Security Products) SPCS410.000 SPC Safe Software

Vanderbilt (formerly known as Siemens Security Products) SPCS410.000 SPC Safe Software

Vanderbilt (formerly known as Siemens Security Products) SPCS320.000 SPC Remote Maintenance Server

Vanderbilt (formerly known as Siemens Security Products) SPCS320.000 SPC Remote Maintenance Server

Vanderbilt (formerly known as Siemens Security Products) IRS272 Curtain Mirror Set For Intruder Detectors

Vanderbilt (formerly known as Siemens Security Products) IRS272 Curtain Mirror Set For Intruder Detectors

Check And Control Your Security System Wherever You Are

Check And Control Your Security System Wherever You Are

Vanderbilt (formerly known as Siemens Security Products) IRS164 - Pet Alley Mirror Set For IR200, 10 M Wide Angle

Vanderbilt (formerly known as Siemens Security Products) IRS164 - Pet Alley Mirror Set For IR200, 10 M Wide Angle

FLIR Saros DH-390 Dome Camera

FLIR Saros DH-390 Dome Camera

MOBOTIX MX-MULTISENSE1 Indoor Intruder Detector

MOBOTIX MX-MULTISENSE1 Indoor Intruder Detector

Siemens ASE5300-IN Intrusion Module

Siemens ASE5300-IN Intrusion Module

MOBOTIX MX-Info1-EXT-DG Info Module

MOBOTIX MX-Info1-EXT-DG Info Module

View all

White papers

Optimize Your Business with Analytics and AI

Optimize Your Business with Analytics and AI

Download
How End-to-End Video Security Solutions Can Help Your Organization With Social Distancing

How End-to-End Video Security Solutions Can Help Your Organization With Social Distancing

Download
Schooling the Market on Education Security

Schooling the Market on Education Security

Download
How To Catch Shoplifters With Thermal Imaging

How To Catch Shoplifters With Thermal Imaging

Download
What Do I Need To Know To Successfully Deploy Mobile Access?

What Do I Need To Know To Successfully Deploy Mobile Access?

Download
View all

Videos

Optex QX Infinity Series - Wide Angle Outdoor Detector

Optex QX Infinity Series - Wide Angle Outdoor Detector

Ajax Security Systems Display How Protecting A Property From Attacks Is An Art

Ajax Security Systems Display How Protecting A Property From Attacks Is An Art

Vaion Releases Virtual Booth Session On Federal Security In May 2020

Vaion Releases Virtual Booth Session On Federal Security In May 2020

Access Control and Security Solutions: '5 Minutes With' Video Interview with Tim Northwood from Inner Range

Access Control and Security Solutions: '5 Minutes With' Video Interview with Tim Northwood from Inner Range

View More

Intrusion detection: Manufacturers & Suppliers

  • DSC Intrusion detection
  • OPTEX Intrusion detection
  • Bosch Intrusion detection
  • Vanderbilt Intrusion detection
  • Dahua Technology Intrusion detection
  • NetworX Intrusion detection
  • RISCO Group Intrusion detection
  • Climax Technology Intrusion detection
  • Visonic Intrusion detection
  • Texecom Intrusion detection
  • Pyronix Intrusion detection
  • Honeywell Security Intrusion detection
  • Axis Communications Intrusion detection
  • Gallagher Intrusion detection
  • Senstar Intrusion detection
  • Enforcer Intrusion detection
  • CIVINTEC Intrusion detection

Follow us

Sections Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Virtual events Events White papers Videos
Topics Artificial intelligence (AI) Counter Terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras ISC West Video management software
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
About this page

In-depth coverage of Intrusion detection, featuring latest news and company announcements, products and solutions and case studies. Read insightful analysis of product, technology and business trends related to Intrusion detection from security industry experts and thought leaders.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Limited 2000 - 2021, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download SecurityInformed.com product tech spec