The cloud is an enabling technology that brings new opportunity to security dealers and integrators and a way to provide popular services to customers in every market vertical. A seamless integration between Bosch B and G Series Control Panels and Connect ONE by Connected Technologies LLC makes it simple for dealers to add intrusion detection and access control services from a single panel while using one interface to manage every customer.
Bosch-Connected Tech Integration
“We’re excited to be working with Connected Technologies to offer this service to our dealers, whose feedback has been extremely positive as they continue to add customers,” said Tom Mechler, Regional Marketing Manager for Bosch. “This integration provides a complete intrusion and access control service along with mobile credentialing.”
Mike Simon, Managing Partner and Co-Founder of Connected Technologies said Connect ONE enhances the Bosch panels, which are great platforms for dealers to offer value add services and increase their monthly recurring revenue streams.
The integration between Bosch panels and Connect ONE allows dealers to customize services that meet their business goals and customer’s needs"
Bosch Panels And Connect ONE
“The integration between Bosch panels and Connect ONE allows dealers to customize services that meet their business goals and customer’s needs—from residential to both small and large commercial projects,” said Simon. “It’s a complete, robust platform for intrusion and access control, with no need for a separate access control panel or hardware. Given the industry’s ongoing challenge in finding skilled technicians, it also allows dealers to standardize with Bosch panels, which is extremely important for training and inventory control.”
Remote Connect Cloud Service
Connect ONE also works in conjunction with the Remote Connect Cloud Service from Bosch, offering cloud-based connectivity to its B and G Series intrusion panels for remote programming and end-user app connectivity. This capability makes it easier to connect and program control panels without extensive IT experience or dedicated IT personnel. Remote Connect Cloud Service eliminates the need to change customer router settings, incoming firewall rules or use Domain Name Service (DNS) to access the systems remotely.
Connect One customers can easily add and delete codes and multiple locations can be seamlessly managed, viewed and controlled all simultaneously on one screen.
Senstar announced that Senstar Symphony (formerly Aimetis Symphony) has received Lenel factory certification and joined the Lenel OpenAccess Alliance Program (OAAP). Senstar Symphony interfaces with the OnGuard access control system, providing customers with an enhanced platform for security monitoring.
Access Control Verification
“Senstar has completed required factory testing at Lenel to validate the functionality of its interface to the OnGuard system. Symphony allows users to verify access control events directly through the operator client,” said John Marchioli, OAAP product management, Lenel. “We look forward to their continued involvement in the Lenel OpenAccess Alliance Program.”
“Users can easily video-verify their OnGuard access control events inside Symphony, allowing them to use one interface for all of their security monitoring,” said Justin Schorn, vice-president, product management at Senstar.
Symphony is a software platform that allows control of an entire video surveillance system from one central location. Users can connect and configure cameras, monitor open spaces, utilize video analytics and use centralized cloud management for multi-site deployments.
Senstar acquired Aimetis, the creator of Symphony, in April 2016. Since that time, the two companies have worked in parallel to continue to provide advanced perimeter intrusion detection systems, video management systems and analytics solutions. Over the coming months, Senstar and Aimetis will become one company, resulting in reduced complexity, improved performance and unified support.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging.
Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets.
With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain
Technology Overview And Early Adoption
What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain.
Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced.
However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments.
Installations At Critical Infrastructure Sites
In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector.
Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics
In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite.
Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities.
Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks.
This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace.
In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away.
Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel
Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection.
Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses
Innovation And Advancements
Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance.
In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection.
Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI.
New Market Opportunities
Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras.
Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment
In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment.
The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity.
The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time.
Thermal cameras have gone from military defense devices to widespread commercial security cameras
Multi-Sensor Thermal Solutions
Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR).
With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so.
Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards.
In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Customers want services. Services that add convenience, simple control and easy management of all their security devices. With Connect ONE by Connected Technologies LLC, it’s easy to add the new services that one may not have thought about or assumed were too difficult to add. Connect ONE is a cloud-hosted integrated security management platform that bundles intrusion, access control, video surveillance, energy management and critical environmental monitoring in one single user interface that controls them all simply and conveniently.
CheckPoint Tours Tracks Tasks And Facility Activity
CheckPoint Tours, the latest service from Connect ONE, provides real-time recordkeeping that security guards have completed their rounds or employees have performed required or mandated tasks at the premises. As the user scans/swipes each checkpoint their access is logged and can be reviewed. Paired with ScanPass Mobile Credential, it makes tracking activities uncomplicated. ScanPass does not require any wiring and users affix a barcode sticker at the places they want to make sure are visited, using a smartphone to scan the barcode to determine if the tour is being performed properly.
Notifications can be sent if tours are not completed on designated time schedules. It can also be integrated with surveillance to take a snapshot of the person to identify authorized personnel conducting the tours. Multiple checkpoints can be added economically by using only ScanPass barcode stickers in place of card readers and additional hardware. Connect ONE services add tangible value for the end-user customer and the business in the way of new RMR streams.
With security and safety a major focus during the recent World Cup in Russia, IDIS surveillance technology was chosen for a surveillance upgrade at the 45,000 capacity Rostov Arena and the 35,000 capacity Kaliningrad Stadium.
At both locations an IDIS Total Solution was installed with a total of 3000 IP cameras comprising full HD and H.265 models and PTZ cameras featuring Smart UX Controls v2.0, a range of full HD, true wide dynamic range (WDR), IR bullet cameras and full HD box cameras with all external cameras equipped to withstand Russia’s often harsh weather conditions.
IDIS technology deployed at these response centers enabled security staff to rapidly detect and respond to any breach of health and safety, suspicious behavior or terrorist threat
IDIS Critical Failover To Prevent Data Loss
A centralized surveillance monitoring center utilising an IDIS ultra-thin bezel 55” video wall delivered command and control of the two stadiums and allowed security staff to access 60 days of archived footage from 50 remote IDIS DR-8364 NVRs implemented at situational centers. IDIS technology deployed at these response centers enabled security staff to rapidly detect and respond to any breach of health and safety, suspicious behavior or terrorist threat.
For complete protection, IDIS Critical Failover was installed in order to prevent loss of vital recorded data during a range of fault conditions. The system automatically steps in to ensure continued recording in the event of network instability, network failure, storage failure, recorder hardware failure and power supply failure, in each case ensuring that no data is lost.
Our advanced technology helped to ensure safety and security by preventing unauthorized intrusion"
Preventing Unauthorized Intrusion
"The IDIS surveillance system, installed inside and around the stadium gave security controllers a complete overview of the site and perimeter fences,” said Joon Jun, President of the Global Business Division of IDIS. “Our advanced technology helped to ensure safety and security by preventing unauthorized intrusion.
"We are proud that our brand credibility and product stability has been recognized on the global stage at an event which was the focus of world attention. To safeguard thousands of visitors at these key venues, it was essential to use the most reliable technology including high-resolution surveillance cameras with waterproof and dustproof functions and a solution that prevented data loss in the event of network instability."
As an innovator in airport security, Oakland International Airport (OAK) announced that it has installed the Evolv Edge, a physical threat detection and prevention system powered by artificial intelligence, to streamline its employee screening program. This installation enhances OAK’s security posture by protecting against metallic and non-metallic threats while simultaneously improving operational efficiency.
Physical Threat Detection System OAK is committed to applying advanced, innovative solutions to complex security operations
OAK is committed to applying advanced, innovative solutions to complex security operations. The TSA acknowledged this commitment by selecting OAK as a TSA Innovation Site, a prestigious distinction that promotes improved efficiency and allows the airport to try technologies to benefit its growing passenger and employee base.
As the second busiest airport in northern California, passenger travel at OAK is on pace to surpass the 13.2 million travelers that passed through the airport last year. To accommodate this growth, more and more employees are being hired to work at OAK. Therefore, OAK began researching innovative solutions related to employee inspection methods and equipment. Evolv Edge provides OAK with the ability to screen employees for metallic and non-metallic threats with a fast, non-invasive process. Designed with built-in wheels for portability, OAK can easily move the system throughout the airport allowing maximum efficiency for its employee inspection program.
Non-Invasive Employee Screening With Edge, organizations, such as OAK, can adapt a risk-based security approach while balancing security with positive experience
With this installation, OAK continues to be at the forefront of security through its use of modern technologies to combat today’s evolving threat landscape. By replacing traditional physical screenings with Evolv Edge’s precision, mobility and multi-threat detection capabilities, OAK can control access and respond to different threat scenarios quickly and efficiently. With Edge, organizations, such as OAK, can adapt a risk-based security approach while balancing security with positive experience.
“With today’s threat landscape, the security perimeter has expanded beyond traditional checkpoints,” said Mike Ellenbogen, CEO of Evolv Technology and a 20-year veteran in aviation security. “Evolv Edge’s flexibility and portability provides Oakland International Airport with an added layer of security when it comes to employee screening. Oakland International Airport is always at the forefront of innovation, and we will continue working closely with their team to ensure success and safety.”
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced that Panda Restaurant Group, Inc. (parent of Panda Express, Panda Inn, and Hibachi-San) has completed deployment of 3xLOGIC’s VIGIL Trends Business Intelligence software to all of its North American locations. Interface Security Systems, headquartered in St. Louis, Missouri, is the integrator and overall project manager for this ambitious endeavor.
Panda Express is the largest family-owned restaurant in America, with more than 2,000 stores globally, 35,000 associates and $3 billion in sales. Since it was established in 1983, Panda has steadily grown with roughly 125 stores opening each year. Privately owned and operated, the restaurant is guided by the core values of its co-founders and co-CEO, Andrew and Peggy Cherng and is dedicated to developing its team members and giving back to the community.
As of today, Trends is deployed at 1,960 locations and has been integrated with existing Interface video surveillance and alarm systems
Business Intelligence Solution
“As an industry leader, Panda Express’s culture sets an expectation of best-in-class results,” explained Lyle Forcum, executive director of asset protection at Panda Express. “Accordingly, we needed a state-of-the-art business intelligence solution to provide us with truly actionable information. Intelligence we can act on is central to Panda’s business strategy, which focuses on meeting high standards through continuous operational improvement.”
Starting in August 2017, 3xLOGIC and Interface Systems worked with Panda Express to customize Trends to meet the company’s unique, comprehensive needs. Interface began system deployment in QI 2018 with the first location going live in March 2018. As of today, Trends is deployed at 1,960 locations and has been integrated with existing Interface video surveillance and alarm systems.
Integration With Intrusion And Video Systems
“It was impressive that we were able to integrate Trends so seamlessly with existing intrusion and video systems,” said Sean Foley, senior vice president of national accounts at Interface Systems, “and the entire solution was rolled out without a single technician visiting any store.”
Unlike many retail BI implementations, the focus at Panda Restaurant Group is not solely on loss prevention, but also on tracking and improving all operations at every store. Here are some of the key elements of store operations that Trends enables Panda to monitor, track, and improve:
Trends provides intrusion data, which shows when stores are opened and closed, deliveries are made, and whether the store is being remotely armed and disarmed
People Development. To set its people up for success, store managers are able to review all transactional behavior and address opportunity areas with employees within two days.
Comparing Store Performance. The store managers’ Trends dashboard shows very clearly how the restaurant is performing compared to other stores in the region and to their prior month’s performance.
Optimising Store Efficiency. Trends visually displays how many people are working per hour, what job they are facilitating, and the revenue generated per hour.
Monitoring Intrusion Data. Trends provides intrusion data, which shows in a very simple display when stores are opened and closed, deliveries are made, cleaning is done, and whether the store is being remotely armed and disarmed.
Tracking Cash. Panda Express can track currency, how much is in the safe and when it was last counted, as well as petty cash spend along with scanned receipts for purchases.
Custom Dashboards. The system provides an array of dashboards for all levels in the organization that give an at-a-glance or drilled-down overview of an employee’s priorities and responsibilities.
“At Panda, safety and loss prevention are key priorities in executing great operations,” said Lyle Forcum, executive director of asset protection at Panda Express. “We worked with 3xLOGIC and Interface for over a year to implement a highly-customized solution to meet these priorities. Now, we have a cutting-edge tool deployed across the entire enterprise that we can all be proud of.”
Derwent London, a FTSE 250 Index British-based property development and investment firm with a property portfolio worth £4.9 billion, acquired the White Chapel Building in central London in December 2015. The firm is renowned for using design-led approaches to create inspiring office space and began a two-phase project to regenerate the eight-storey commercial building.
The White Chapel Building
Derwent London’s complete refurbishment of the building meant they required a new security system Situated on an acre of land opposite Aldgate East Tube station, the White Chapel Building is valued between £100million and £200million and is home to various well-known brands including international mobile call company, Lebara, and global architecture and design firm, Perkins+Will. The lower floors, which are still being completed, are due to become home to a major new photography museum, Fotografiska. Derwent London’s complete refurbishment of the building meant they required a new security system that delivered solutions for all their own and potential tenants’ needs.
Intelligent IP-based access control system.
Tenant access to assigned floor/s and approved areas only.
Efficient system to manage visitors.
Ability to restrict unapproved visitors to lobby area.
Installation of 35 CCTV cameras with remote monitoring facilities.
Panic button and lock-down facilities in case of emergency.
Latest Industry Standards
Antron Security is an installer of bespoke security solutions and provides security installations for past 28 years Antron Security project managed the design and installation of the access control and security system for the White Chapel Building and acted as the ‘go to’ contact for client, Derwent London. Antron Security is an installer of bespoke security solutions and has been providing security installations to organizations for the past 28 years.
Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved - meaning all staff and systems installed need to comply with the latest industry standards and are regularly inspected. Inner Range provided the core access control and intruder detection system that enabled Antron Security and Derwent London to build the bespoke solutions they needed. Inner Range is a pioneer of integrated access control and intruder detection systems.
It’s been a world leader in the design and manufacture of intelligent security solutions since it was established in 1988. More than 130,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award winning integrated security systems offer smart building management at local, national and global levels.
“The flexibility of the Integriti system makes it future-proof as we can continue to meet the ever-changing requirements of the landlord and tenants via Inner Range’s ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.” Jamie Crane, Commercial Director at Antron Security.
Provides Core Security
Integriti allows around 2,000 people troublefree access to their approved parts of the building Inner Range’s award-winning access control system, Integriti, provides the core security solution for the White Chapel Building. The intelligent system integrates with a host of thirdparty products to become a PSIM system, managing not only security and building automation but also people and business continuity processes.
In this instance, Integriti allows around 2,000 people troublefree access to their approved parts of the building, as well as managing visitors efficiently and allowing security managers to monitor events easily and remotely.
35 CCTV cameras to allow security managers to view live and recorded events across the site. This includes remote monitoring, if security managers are off site.
Access via four IDL Fastlane lobby turnstiles to ensure only permitted persons can access areas beyond the reception and lobby area.
Lift integration – Tenants and visitors can only access approved floors using security credentials on their access card or smartphone.
Central Security Team
Smartphone access - Tenants and staff were set up to use their smartphones to open doors and other smart devices with the HID Mobile Access ‘Twist and Go’ mobile app. The Integriti system can read and check security credentials from users’ mobile phones to determine whether they are allowed access.
BluePoint passes can be read by Integriti at entrance turnstiles and lifts to ensure visitors can access areas agreed by the ‘host’
A BluePoint visitor pass system was installed and integrated with Integriti to ensure a secure, reliable and trusted method of managing visitors. It allows ‘hosts’, such as tenants, to issue temporary passes for their visitors without needing to pass every request through a central security team. The passes can be issued on paper or via email.
They can also be issued as Apple Wallet or Google Pass credentials. These appear on the visitor’s smartphone with a QR code without the visitor having to search their phone for them.
Location and time-based information included in the pass ensure it appears when and where it is needed. The BluePoint passes can be read by Integriti at entrance turnstiles and lifts to ensure visitors can access areas agreed by the ‘host’.
Easy to use Smartcard entry system integrated for access via doors, lifts and entrance turnstiles. Cards issued to 500 users initially.
Panic button and lock down procedures for emergency situations.
Gigabytes of on-board memory at controller hardware level to ensure the system maintains complete functionality even if offline.
Seamless IP-based multi-controller system architecture options.
Easy plug-and-play in UniBus, an innovative in-cabinet bus which allows the connection of expansion modules, communications modules, and door and reader modules to extend the range and scope of the Integriti system.
Productive And Efficient Staff
Trouble-free tenant access to their approved parts of the building.
The improvements in access and security means reception staff are more productive and efficient.
Security managers are able to monitor events easily and remotely.
More accurate reporting on who is where in the building helps with health and safety as well as security activities.
The Integriti system allows the landlord to manage operational costs more effectively while providing tenants with a more secure working environment.
Video systems today offer more capabilities than ever. Consequently, the systems can be used in new ways. For a variety of reasons, however, many customers don’t take full advantage of the capabilities of their video systems and therefore are leaving value on the table. Education and training are tools to alleviate the situation, but the first step is to identify the new ways that video can be used. We asked this week’s Expert Panel Roundtable: How do customers under-utilize their video systems, and what should they do differently?
Companies in fast-moving industries tend to want half or more of their revenue to come from products released in the last three or so years. The logical extension of that philosophy is the demise of product "cash cows" that remain in a company's portfolio for many years. Where better to witness the shortening life cycles of technology products than in the smart phone market, where most of us buy into the hype of the "latest and greatest?" But does acceleration of new product introductions translate into shorter product life cycles in the field? We asked this week's Expert Panel Roundtable: What is an acceptable life cycle for a physical security system? Is there a trend toward systems being replaced more, or less, often?
As the new school term begins, awareness of security at all levels of educational institutions is higher than ever. Technology plays an important role in protecting educational facilities and their students, faculty, staff and visitors. Specific security challenges drive which technologies and other measures are used, and those challenges are evolving, along with the dynamic institutions security is tasked with protecting. We asked this week’s Expert Panel Roundtable: What are the security challenges for schools and colleges?