Zenitel, a provider of intelligent critical communication solutions, is pursuing its growth strategy in the EMEA region and specifically in Southern Europe through the launch of a new Center of Excellence (CoE) in Spain. Zenitel has appointed its longtime partner in Spain, COINTEL SL, to this role in the Iberian market. Partnership with Cointel COINTEL SL, based in Bilbao, will consolidate Zenitel’s presence and will continue to build a strong and sound ecosystem network. Cointel b...
VdS 2540 for reliable CIE comprehensively revised guidelines, includes precise performance characteristics for risk minimization in the control and activation of alarm valve stations, and in fault monitoring. The ‘brain’ of every fire alarm system is the Control and Indicating Equipment (CIE). This is where all information from the monitored areas comes together, where processes such as alarming, clearing an object and, above all, the triggering of connected extinguishing systems ar...
ComNet, Communication Networks of Danbury, Connecticut, an ACRE company and a USA-based manufacturer of fiber optic transmission and networking equipment, has announced the introduction of its Generation 4 line of NetWave wireless products that offer greater performance and increased stability, in applications where throughput and increased bandwidth is increasingly important. NW1 Gen 4 wireless products The NW1 Gen 4 can exceed 500 Mbps throughput under ideal conditions and accommodates 10/10...
As part of its 2021 Cyber Protection Week activities, Acronis, a global company in cyber protection unveiled a new, no-cost version of Acronis Cyber Protect Cloud, its award-winning service provider solution. The new licensing makes it more profitable for service providers to design and offer a comprehensive cyber protection services portfolio with little to no upfront costs. With this announcement, the company’s current Acronis Cyber Backup Cloud will be extended with cyber protecti...
Videonetics, the globally renowned AI & DL powered Unified Video Computing Platform (UVCP) strengthens its technology partnership with Axis Communications, the globally renowned company in IP surveillance, by co-creating and delivering numerous integrated solutions under Axis Application Development Partner (ADP) program, to meet growing demands of different market segments. Axis ADP Program The Axis Application Development Partner (ADP) Program is designed to help software vendors streaml...
Though many office workers across the globe have found themselves working remotely for the past year, we are seeing a bit of a silver lining, as vaccine rollouts hint at a return to some pre-pandemic sense of normalcy. However, while some of us might opt for a fully-remote work life, others are anticipating a hybrid solution. Even before the pandemic, offices were taking a new, more open layout approach—moving past the days of cubicles and small office configurations. Going forward, offi...
FUJIFILM Recording Media U.S.A., Inc. (Fujifilm USA) has announced the release of an online calculator designed to help video surveillance (VS) industry professionals assess the Total Cost of Ownership (TCO) for long-term retention of video surveillance content. Modern low-cost, high-resolution cameras, combined with longer-term retention requirements, are driving video content storage costs upwards, across the video surveillance industry and leading many to take a new look at their storage strategy. Online calculator tool Developed by storage economics experts, Brad Johns Consulting and sponsored by Fujifilm, the decision-making tool allows users to input the specifications of their system, such as number of cameras, camera type, frame rate, resolution, retention period requirements, motion percentage, and duration of time, for keeping footage in ‘tier 1’ HDD storage or ‘tier 2’ tape storage. With these inputs, the calculator instantly weighs the variables and projects a 5-year cost comparison of using HDD only, or a combination of HDD with an integrated LTO tape technology tier. Data storage tape with LTO technology Using the real world parameters of their surveillance systems, they can quickly and easily see the direct results" “Fujifilm is excited about this opportunity to help video surveillance professionals calculate the real savings they can achieve by implementing a second tier of storage based on tape with LTO technology,” said Rich Gadomski, Head of Tape Evangelism, FUJIFILM Recording Media U.S.A., Inc. Rich Gadomski adds, “Using the real world parameters of their surveillance systems, they can quickly and easily see the direct results on their bottom line.” Establishing a strong cost-savings case for integrating high-capacity tape (12TB LTO Generation 8 cartridges), users with even modest retention requirements will typically find a 50% potential annual savings, when compared to disk alone. Those savings only increase with higher data volumes and longer retention times. Moving footage from disk to the tape tier sooner also drives costs down. Low energy use and carbon footprint reduction “In addition to lower cost, other quality and environmental factors are driving more surveillance industry professionals to consider data storage tape with LTO technology,” said Rich Gadomski. He adds, “Tape leads all storage media in reliability, with a bit error rate significantly better than disk. And when compared to constantly-spinning HDDs, tape’s low energy consumption not only drives costs down, but reduces carbon footprint as well.” LTO technology LTO technology is also becoming more operator-friendly. New video management software solutions, such as Cozaint Corporation’s askALICE, are designed to easily playback video from either tier-1 disk storage or tier-2 tape, without any additional steps needed by the surveillance timeline operator.
Zenitel, the supplier of intelligent and interoperable communication solutions, announces the release of its Cybersecurity Hardening Guide. The Zenitel Cybersecurity Hardening Guide follows controls outlined by the Center for Internet Security (CIS) SecureSuite, of which Zenitel has been a member for many years. CIS harnesses the power of the global IT community to safeguard private and public organizations against cyber threats. Its CIS Controls Version 7.1 and CIS Benchmarks are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. The CIS Controls align with all the major compliance frameworks, such as the NIST Cybersecurity Framework, NIST guidelines, and the ISO 27000 series, as well as regulations including PCI, DSS, HIPAA, NERC CIP, and FISMA. Creating safe cyber-environment “We are proud to provide this updated Guide to help our partners and customers to continue to keep their networks and IP intercom solutions secure,” says Peter McKeag, Product Manager, Safety and Security for Zenitel. “Network access provides many benefits, but it has to be implemented securely. Continuous review and improvement of your cybersecurity measures are key to ensuring a safe, stable, and resilient cyber environment.” The Zenitel Cybersecurity Hardening Guide begins with information about the CIS controls, and then follows with steps that a company should take, including assessing risk and security levels, managing credentials and passwords, and more. A cybersecurity checklist outlines specific tasks and expectations linked to relevant CIS controls that a company follows and implements to ensure that its networked IP intercom devices are cybersecure. Risk management of cybersecurity “At Zenitel, cybersecurity is embedded in all that we do,” adds Dan Rothrock, president of Zenitel Americas. “Cybersecurity controls are essential with all networked devices, and with this Guide, we hope to educate, increase awareness, and provide best practices in order to ensure cyber-secure security solutions.” “As cyberattacks continue to increase in frequency and sophistication, cybersecurity risk management has risen in importance,” says Wim Van Winghe, VP of Sales for EMEA Onshore. “All enterprises need a thoughtful approach to mitigating cybersecurity risk, and this new Guide will assist them in their efforts.”
Hanwha Techwin, a global supplier of IP and analog video surveillance solutions, has expanded and updated its line-up of multi-sensor cameras featuring its Wisenet 7 chipset. Enhanced Image Quality With Wisenet 7 at their core, the new multi-sensor cameras support Hanwha Techwin’s ‘extreme’ Wide Dynamic Range (WDR) technology which utilizes advanced Local Contrast Enhancement and Scene Analysis technology. This enables the cameras to capture ultra-clear images from scenes containing a challenging mix of bright and dark areas. Wisenet 7’s enhanced noise reduction technology minimizes motion blur and image artifacts while increasing object sharpness and definition. Cybersecure and NDAA Compliance Wisenet 7 offers the highest level of cybersecurity possible by embedding unique certificates and encryption keys into every camera during manufacturing. The new multi-sensor cameras are fully NDAA compliant and UL CAP certified and consume only a single license in a VSM. They also include a suite of built-in video analytics such as motion and directional detection, enter/exit, line crossing, and tampering detection. All cameras include H.265 and WiseStream II compression technology and a suite of built-in Wisenet 7 analytics. Multi-Sensor PNM-8082VT Each sensor captures 2MP HD images in lighting as low as .04 Lux with motorised varifocal lenses The new 3-channel PNM-8082VT offers excellent coverage around corners and either down or straight ahead while offering significant cost savings over deploying three separate fixed cameras. Each sensor captures 2MP HD images in lighting as low as .04 Lux with motorized varifocal lenses and a maximum FoV of 320°. Perfect for indoor or outdoor use, the PNM-8082VT features IP66, IK10, and NEMA4X ratings for protection against water, dust, impact, and corrosion. PNM-9322VQP Multi-Directional plus PTZ Camera The new PNM-9322VQP contains four multi-sensors and an additional fifth PTZ camera with 32x optical zoom. The four-head multi-sensor array accepts a choice of 2MP and 5MP modules at varying fields of view to suit the unique coverage and resolution requirements of any job. The PTZ camera can be configured to automatically zoom in and track moving objects detected by the multi-directional camera array when tracking moving objects over wide-open areas. PNM-9022V Panoramic Camera The camera includes heatmap video analytics which provides business intelligence on customer density The new 4-channel PNM-9022V utilizes alpha blending technology to stitch the overlapping images captured by its four HD sensors into a seamless 8.3MP 209° image. The camera can also be configured to capture 180° images with digital PTZ functionality across two of the camera’s channels. The PNM-9022V has low-light performance enabling color images to be rendered in light levels as low as .03 Lux. The camera includes heatmap video analytics which provides business intelligence on customer density and buying behavior. PNM-9002VQS Camera The new PNM-9002VQS is a stainless-steel version of the PNM-9002VQ 4 head multi-sensor camera. Designed for harsh environments such as food and pharmaceutical manufacturing, water treatment, and marine locations, the PNM-9002VQS has IP6K9K, IP66, IK10 ratings. It supports a range of 2MP and 5MP lens modules for precise coverage in any environment. PNM-9000QB Camera Module The device is compatible with multiple lens modules for discretely mounting in door jams The new Wisenet PNM-9000QB camera module is designed for banks, retail, offices, and anywhere covert fraud and theft detection is required. The device is compatible with multiple lens modules for discretely mounting in door jams, mullions, and pinhole locations where space is severely restricted. The PNM-9000QB supports up to four simultaneous 2MP HD channels and provides Wisenet 7 built-in analytics such as motion and directional detection, tampering, loitering, fog, and audio detection. Cost-Effective Cameras “Having a range of NDAA compliant and UL CAP certified multi-sensor cameras with our powerful Wisenet 7 SoC provides integrators and end-users the highest possible value and performance for any video surveillance project,” said Ray Cooke, Vice President, Products, Solutions, and Integration, Hanwha Techwin America. “The savings potential extends far beyond the costs of installing individual cameras to also include significantly lower installation, network infrastructure, and license costs as well.”
Reliance High-Tech, the globally renowned independent security technology integrator, has formed a new partnership with Secure Logiq. Over the last 10 years, Secure Logiq has become established as the world’s renowned and advanced manufacturer of state-of-the-art high definition (HD) servers that are purpose-built for surveillance-based applications. This announcement means that Reliance High-Tech’s customers will now have access to technology that can process up to three times as many cameras, as some of the most commonly used servers. Secure Logiq – Reliance High-Tech partnership Secure Logiq’s longstanding experience in both the IT and security sectors sits well with Reliance High-Tech’s own background and as such, both companies aim to change the perception of server technology, highlight its fundamental role and make it a key consideration when designing a system. Not only does this benefit the end-user in terms of enhanced functionality, but it also means less time specifying, configuring, installing and commissioning. Working with Secure Logiq means we can add more value and give our customers an unrivaled level of service" “Reliance High-Tech only works with best in class technology providers, so I’m delighted to have formed this partnership with Secure Logiq,” said Tom Clarke, Sales Director at Reliance High-Tech, adding “The worlds of security and IT are closer than ever before and we share the view that only servers that have been specially designed for surveillance purposes can create a system that is fully optimized, energy efficient, reliable and secure. Working with Secure Logiq means we can add more value and give our customers an unrivaled level of service.” Off-the-shelf devices Secure Logiq offers a range of off-the-shelf devices, alongside a custom build service. Its UK-manufactured servers are specifically optimized to efficiently handle multiple streams of HD video data, with a range comprising 1U, 2U, 3U and 4U devices that enable the recording of more channels at a faster rate and the ability to store data for extended periods. For example, the top-of-the-range HPS-4U-XL series offers over one Petabyte of storage, three advanced RAID 6 arrays, and dual redundant hotswap power supplies for total peace of mind in mission critical applications. Leveraging Logiqal Healthcheck utility For Reliance High-Tech’s customers uptime is everything and their surveillance technology must be fully operational on a 24/7 basis. Leveraging Secure Logiq’s Logiqal Healthcheck utility, coupled with Reliance’s extensive IT monitoring capability, enables users to avail an unprecedented level of proactive support. In the unlikely event of malfunction, the combination of Secure Logiq’s detailed design configuration and Reliance’s ISO27001 and ISO22301 experience results in fast, effective, secure and robust systems that are proactively monitored. Enhanced IT and information security Reliance High-Tech’s teams have all the information they need to address any issue proactively and securely This means that Reliance High-Tech’s teams have all the information they need to address any issue immediately, proactively, securely, and with information security at the heart of every action. “Many installers still specify traditional IT servers that simply do not offer the level of processing, storage density, resilience, throughput, and overall performance required by modern surveillance systems,” explained Robin Hughes, Secure Logiq’s Co-Founder. Delivering advanced surveillance services Robin adds, “We provide the missing piece of the HD surveillance jigsaw, with servers that are specifically designed for this purpose. Our dedication to innovation and the highest standards of customer service and support are shared by Reliance High-Tech, and together we will ensure that end-users get the best value and maximum return from their surveillance investment.” Reliance High-Tech’s Tom Clarke concludes, “The marriage of Secure Logiq’s standards of excellence with Reliance High-Tech’s IT capability, service capability and advanced monitoring services delivers a new level of system performance, integrity and pre-emptive maintenance and support, which we are excited to introduce to our customers.”
Video wall and visual display experts, Ultimate Visual Solutions (UVS) is to continue with its remote access and online demonstration policy, after the new way of working saw the business grow, during the lockdown. The innovative methods will combine with more traditional meetings and demos when required, once the UK Government’s COVID-19 roadmap allows. Full suite of remote access services UVS launched a full suite of remote access and online demonstration services to help security sector clients Ultimate Video Solutions (UVS) launched a full suite of remote access and online demonstration services to help security sector clients, at the start of the coronavirus (COVID-19) outbreak. As a result, UVS saw a 10 per cent rise in the official quotations and detailed system proposals it was being asked to supply. UVS Managing Director Steve Murphy said, “We are actually performing better year-on-year, the business that we are getting through online demos is incredible and we have secured some of the biggest contracts in the company’s history.” Adapting and finding new ways of working Steve stated, “There will always be a place for face-to-face meetings and demos when it suits the client, but it goes without saying that the technology sector should be at the forefront of adapting and finding new ways of working.” He further said, “There is no doubt that the coronavirus (COVID-19) outbreak changed the way we worked in the short term, but many of these changes have worked so well that they will now become part of the norm for the long term.” Facilitating more remote working and monitoring Steve adds, “What we are now seeing in our control room installations is the need to make data that is available for display on video walls in one location also available to share with other associated locations.” We have seen a huge increase in the number of online demonstrations of our video wall technology" “We believe there will be an increased demand for this functionality post COVID-19, to facilitate more remote working and monitoring. We have seen a huge increase in the number of online demonstrations of our video wall technology. The clients have agreed it provides a very powerful evaluation of the benefits it provides.” Support for key operational video wall technology The services, based from the UVS HQ in the Burnley First – Burnley Business Center, are designed to provide peace of mind and support for key operational video wall technology. The suite of remote services offered by UVS includes: Remote diagnostics and remote maintenance for UVS video wall technology, which can offer quick analysis and resolution for most issues. UVS engineers using remote connection software, which is fully encrypted and which the client has control over, to carry out maintenance. For sites where the video wall controller does not normally have an internet connection, UVS is offering to supply a 4G data dongle, as part of the contract (managed and paid for by UVS) to allow clients to give internet access as required. Assisting clients with reduced cost annual maintenance contracts. A live online demonstration facility to provide full video wall technology evaluations for partners and their clients, who are in lockdown or self-isolation. Video wall displays and AV solutions Technology which visitors can see in operation includes video wall solutions, displays, video wall controllers, control software, integrated VMS (video management systems for security applications) AV over IP and KVM remote access options. Ultimate Video Solutions (UVS) provides video wall displays and audio visual solutions to a range of clients across the United Kingdom and the rest of the world. It is led by four senior colleagues who, between them, have more than 70 years’ combined experience in the fields of Audio Visual, Control Room and Visual Solutions.
‘Communication is the key’ - probably, to a lot of things, including the efficient and productive growth at a firm. If managed accurately, it is the dart that can single-handedly target most of the business pain areas. Each time one blinks, a crisp development occurs that aims to revolutionize the corporate world. A vital victim of this phenomenon is communication, regardless of scale, sector or industry. SOHO industry issues with tech advancements The SOHO (Small Office Home Office) industry is observed to be majorly affected by the turmoil of being burdened with keeping up with these technological advancements. Such enterprises depend largely on strong communication, as it is one of the selling factors. The business outlook of a SOHO can be impacted through its communication to the market it survives in The business outlook of a SOHO can be impacted through its communication to the market it survives in. Different markets require different tools for conveyance. It could be a cumbersome job to manually switch between such tools and networks while maintaining methods to keep it low cost and reliable. To rescue the SOHO sphere from these obstacles, while complementing it with a disciplined work ambience, Matrix presents ETERNITY NENXIP50 - The Complete IP PBX Solution for a minimal enterprise. ETERNITY NENXIP50 IP PBX solution ETERNITY NENXIP50 is a tailor-made IP-PBX for the SOHO market segment. It is a small yet powerful integration supportive IP-PBX, with seamless mobility that provides all business class telephony features to be productive, look professional and enhances customer services. It is a true convergence of communication technologies with integrated interfaces for FXO (CO), GSM/3G and VoIP networks. ETERNITY NENXIP50 intelligently selects the most cost-effective route to place local, mobile, or long-distance calls and reduces telephony costs. Software-hardware solution with VoIP capabilities This exclusive variant of the NENX range, allows customers to access features that are now built-in, along with offering IP users up to 50. If elaborated in 3 easy points, it is: Software-hardware solution package equipped with VoIP facilities IP-PBX gives privacy and control over workspace conveyance One-stop tool for network management, security and transparency Key features of ETERNITY NENXIP50 include: Built-In 50 IP Users and Mobile/Desktop IP Users Built-In VoIP Channels and 4 Channel Voice Mail Built-In 4 CO Ports and 2 SLT Ports Built-In CTI Interface Support Built-In SMS Server and Gateway Support On-Board IP User Support LDAP Client Support Support of 4G VoLTE ports COSEC Door Integration Auto Sign-in for Softphones Screen and Application sharing through VARTA WIN200 Intuitive and Easy Web GUI Scheduled Backup of Voice Messages/Recordings
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers.Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option Now, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their readers which use smart phones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option with many more features to be leveraged. Handsets deliver biometric capture and comparison as well as an array of communication capabilities from cellular and Wi-Fi to Bluetooth LE and NFC. As far as security goes, the soft credential, by definition, is already a multi-factor solution. Types Of Access Control Authentication Access control authenticates you by following three things: Recognises something you have (RFID tag/card/key), Recognises something you know (PIN) or Recognises something you are (biometrics). Your smart phone has all three authentication parameters. This soft credential, by definition, is already a multi-factor solution. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs. Organizations want to use smart phones in their upcoming access control implementations Once a biometric, PIN or password is entered to access the phone, the user automatically has set up 2-factor access control verification - what you know and what you have or what you have and a second form of what you have. To emphasize, one cannot have access to the credential without having access to the phone. If the phone doesn’t work, the credential doesn’t work. The credential operates just like any other app on the phone. The phone must be “on and unlocked.” These two factors – availability and built-in multi-factor verification – are why organizations want to use smart phones in their upcoming access control implementations. Smart Phone Access Control Is Secure Plus, once a mobile credential is installed on a smart phone, it cannot be re-installed on another smart phone. You can think of a soft credential as being securely linked to a specific smart phone. Similar to a card, if a smart phone is lost, damaged or stolen, the process should be the same as with a traditional physical access credential. It should be immediately deactivated in the access control management software - with a new credential issued as a replacement. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs Leading readers additionally use AES encryption when transferring data. Since the Certified Common Criteria EAS5+ Computer Interface Standard provides increased hardware cybersecurity, these readers resist skimming, eavesdropping and replay attacks. When the new mobile system leverages the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), it also will interface easily with control panels or other security management systems, fostering interoperability among security devices. Likewise, new soft systems do not require the disclosure of any sensitive end-user personal data. All that should be needed to activate newer systems is simply the phone number of the smart phone.All that should be needed to activate newer systems is simply the phone number of the smart phone Bluetooth And NFC The Safer Options Bottom line - both Bluetooth and NFC credentials are safer than hard credentials. Read range difference yields a very practical result from a security aspect. First of all, when it comes to cybersecurity, there are advantages to a closer read range. NFC eliminates any chances of having the smart phone unknowingly getting read such as can happen with a longer read range. There are also those applications where multiple access readers are installed very near to one-another due to many doors being close. One reader could open multiple doors simultaneously. The shorter read range or tap of an NFC enabled device would stop such problems. However, with this said in defense of NFC, it must also be understood that Bluetooth-enabled readers can provide various read ranges, including those of no longer than a tap as well. One needs to understand that there are also advantages to a longer reader range capability. Since NFC readers have such a short and limited read range, they must be mounted on the unsecure side of the door and encounter all the problems such exposure can breed. Conversely, Bluetooth readers mount on the secure sides of doors and can be kept protected out of sight. Aging Systems Could Cause Problems Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions With that said, be aware. Some older Bluetooth-enabled systems force the user to register themselves and their integrators for every application. Door access – register. Parking access – register again. Data access – register again, etc. Newer solutions provide an easier way to distribute credentials with features that allow the user to register only once and need no other portal accounts or activation features. By removing these additional information disclosures, vendors have eliminated privacy concerns that have been slowing down acceptance of mobile access systems. In addition, you don’t want hackers listening to your Bluetooth transmissions, replaying them and getting into your building, so make very sure that the system is immunised against such replays. That’s simple to do. Your manufacturer will show you which system will be best for each application. Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions. They are unquestionably going to be a major component in physical and logical access control. Gartner suggests that, by 2020, 20 percent of organizations will use mobile credentials for physical access in place of traditional ID cards. Let’s rephrase that last sentence. In less than 18 months, one-fifth of all organizations will use the smart phone as the focal point of their electronic access control systems. Not proximity. Not smart cards. Phones!
In the state of the residential security market today, we see many who are offering home security packages that rely on numerous sensors and multiple devices to provide a comprehensive coverage of the home and provide peace of mind. Each individual sensor or device within the package provides a specific functionality, and the user finds himself burdened by an overwhelming amount of sensors and devices. This overload is intensified by the penetration of additional IoT and smart devices into the home, such as pet-cams or smart speakers that add to the burden of installation and maintenance. In addition, we are witnessing the rise in popularity of DIY security devices, indicating that users are looking for models and technologies that provide both contract flexibility and simplicity of use. The past years have seen major advancements in radar technology, which have brought the formerly military technology into the consumer space. Radars provide interesting prospects for home security and smart homes due to several inherent characteristics which give it an advantage over existing technologies. The resolution of an advanced radar sensor enables not only presence detection, but also provides advanced features for security, automation and well-being Advanced Security And Automation Features Of primary importance, a consumer designed radar sensor provides the user with full privacy, but the use of radar is also beneficial because it is indifferent to environmental, temperature and lighting conditions. In addition, radar signals (at certain frequencies) are capable of penetrating through almost any type of material, enabling concealed installation, robust monitoring in cluttered spaces and even the coverage of several separate rooms with only one device. In terms of capabilities, simple time of flight 2-antenna radar sensors, which have been around for a while, do not provide much additional value in comparison to existing solutions and are not necessarily competitive in terms of pricing. However, the new generation of radar sensors are also opening up new capabilities previously achieved with optics only. Today, the resolution of an advanced radar sensor is high enough to enable not only presence detection, but also to provide advanced features for security, automation and well-being, all in one. Imagine for example, that the security sensor installed in your elderly parent’s home could also detect a fall having occurred, monitor the breathing of a baby or even leaks in your wall. Due to the unique field of view that radar provides as well as the multi-functional potential, this technology will be the key to the awaited convergence of smart home functionalities and minimization of home devices. The security sensor installed in your elderly parent’s home could also detect a fall having occurred Secret Of The Consumer Radar A radar sensor’s accuracy and its ability to support wide functionality and applications is determined initially by its resolution, which is based on two key factors: bandwidth and number of channels. The wider the bandwidth and the more channels the radar supports, the more accurate the data received. Imagine the difference between a 1990s television model and a 4K 2018 television model - As the resolution is ever improving, the sharper and more detailed is the image. When looking at the short-range radar sensor market, prominent companies such as Texas Instruments and NXP are offering radar-on-chip solutions supporting 2\3 transmitters (Tx) and 3\4 receivers (Rx), mainly utilizing frequency bands of 77-81GHz, as they target mostly automotive and autonomous driving applications. Another company that develops such radar-on-chip solution is Vayyar Imaging, an Israeli start-up, founded in 2011, that developed a radar sensor for 3D imaging. Vayyar Imaging directly targets the smart home and security markets with its radar-on-chip, developing modules and products for intruder detection, automation and elderly care (fall detection). Providing not only chips, but complete systems, the new model makes radar technology highly available and accessible. The radar-on-chip technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue Radar-On-Chip Solution The radar-on-chip solution supports 72 full transceivers, an integrated DSP and radar bands between 3-81GHz. The resolution provided by this type of specification is high enough to provide subtle information about people’s real time location posture (lying down\falling\sitting\walking), and breathing, and enables to classify pets from humans, but it is low enough as to not compromise privacy. This type of technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue, such as in bathrooms or heavily lit environments. Moreover, utilization of this technology allows to dramatically minimise the numbers of sensors installed in the home, as it provides full home coverage with just one or two sensors and enables using the same HW to support additional capabilities such as breath monitoring, fall detection and highly accurate automation. Using AI and machine learning, the data derived by these sensors can be leveraged to provide smarter, verified alerts on the one hand and whole new insights on the on the other. The sensor can be tuned to learn the location of the house entrances or boundaries, where the inhabitants are expected to be at night, or where they should be expected to enter from into the home, adding new logics to the traditional yes\no decision making. Home security is widely regarded as a necessity, provides peace of mind to people and is integral to people's day to day lives Additional Smart Home Services Among the evolving home technology verticals, security is by far the most relevant and integral to people’s day to day lives. Home security is widely regarded as a necessity and provides peace of mind to people. Being a legacy industry with many well-known and well-trusted brands, security players are well positioned to introduce new technology into the home and have the ability and credibility to expand their offerings to additional smart home services by utilizing existing infrastructure and channels. With technology giants entering the security arena through the smart home door the DIY security solution market expected to explode with a CAGR of 22.4% (according to a report by Persistence Market Research). Now that new pricing and service models offer minimal commitment, traditional security players will need to step up. Security companies will need to explore new technologies and expand their offering if they intend to stay relevant and competitive in a market trending on functionality converge and minimization of maintenance and installation costs.
The next chapter of the Pelco saga began in May when Pelco Inc. was acquired by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct that next chapter. “The more time we spend with the company, the more excited we are about the opportunity,” says Brendan Hart, Vice President, Operations, Transom Capital Group. In addition to his position with Transom, Hart has taken on an interim line role at Pelco as Vice President of Product and Strategy. After helping to oversee Pelco’s rebuilding phase, he expects to step away from daily involvement over time. “We have gained an appreciation for nuance [since the acquisition closed],” he said. “The channels, the relations, how people buy in this industry are very nuanced. Who’s gone where and who’s done what? The interplay of hardware and software. We have gained appreciation for the nuance. And we need to be surrounding ourselves with people who know the industry, who know the multi-dimensional areas.” Transition from analog to IP systems We have to focus on who our customers are specifically and understand their needs” It’s a “transformative moment in the industry,” says Hart, given industry changes such as price erosion and the transition from analog to IP systems. “We are about to go into the world of added intelligence. It’s an interesting time to buy a security company.” Hart says the Pelco brand still has value: “The market is rooting for us.” There is also a strong portfolio of people and products to build from. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. A new CEO is being recruited; otherwise, “we have a great executive team” in place, including Brian McClain, COO and President, says Hart. “In defining the new company, we have to decide first and foremost what we want to be,” says Hart. “What can we provide customers? We have to focus on who our customers are specifically and understand their needs and use cases.” Part of defining the new company is to become more aligned with a specific set of verticals that fit with Pelco’s capabilities (although they are not saying which verticals those are yet). However, “we can’t ignore what we are today as we make the transition,” says Hart. Innovation in products We want customers to see innovation in products to a point when people will say ‘this is Pelco’" “We have to let the products and experience speak for themselves. We’re focused on getting our ducks in a row and going in a new direction, but actions speak louder than words,” he says. The changes will be “more organic;” don’t expect to see a big announcement. “We want customers to see innovation in products and customer support and get those things to a point when people will say ‘this is Pelco,’” says Hart. Although not exhibiting at GSX, I found Pelco occupying a meeting room near the show floor. The room gave the company a chance to respond to integrators and consultants at GSX who had questions about what was going on with the acquisition. “Everybody is rooting for us, and we wanted the ability to get out and say ‘we’re here, we’re doing things, and we’re excited about the future,’” said Stuart Rawling, Pelco’s Vice President, Market Strategy. “This is a time for people to come and see us who maybe haven’t seen us in a while.” By ISC West in the spring, Pelco expects to have a clear message of who they are and where they’re going, he says. Aligning needs of end user “We are excited about the work we are seeing internally,” which includes “aligning resources in the right way,” says Rawling. “The fruits of the labor are being seen internally now. We will be launching new products in the next eight months, although there will not be a defined moment in time when we say ‘this is it.’ It will just be happening. Next year will be an exciting time industry-wide, and product-wise, and Pelco will have a strong voice. Brendan and team have kept us extremely busy,” says Rawling, who also was part of Pelco in the “glory days” before the acquisition by Schneider Electric. We’re so optimistic, when you combine the people and the brand and what’s happening the market” “The work product has been so transformative mindset-wise for the employees. Everybody has had the opportunity to talk to the [new] owners about what type of company we are. We can set our own vision and get reenergized and get back to the core belief of what Pelco was and what it should be. We are the master of our own destiny, aligning needs of end user with the products we can deliver. We are putting the right processes in place that work for this market. It is an exciting prospect.” In the new era, Rawling expects to target marketing more toward end-users, because they have more influence on product selection than ever before, he says. End users often learn about new products online, so Pelco will be looking to target its marketing toward educating various vertical markets about available technologies and their use cases. “We’re so optimistic, when you combine the people and the brand and what’s happening the market,” says Hart. “We have to do the work. We’re excited about what we are seeing internally.”
Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the video system to operations? Mission Critical Video Surveillance Solutions Such questions can point video system designers to the right technology for an application, and a manufacturer and reseller with a wide product offering ensure that the perfect solution is available and can be shipped quickly. It’s important to remember that this is not a “one size fits all” marketplace. Data capture form to appear here! Questions need to be asked on what an appropriate server solution will provide for the customer 1) JBOD - It stands for "just a bunch of disks" and refers to a collection of hard disks that have not been configured to work together. This approach is typical of stand-alone systems such as a retailer who has one or two cameras recording locally at a remote location, and who have a tolerance for occasionally losing video footage. 2) RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks. The configuration provides more redundancy and reliability, better balance of disk usage, and more throughput and performance. RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks 3) SAN or storage area network is a type of centralized storage providing enhanced accessibility to disk arrays. SAN provides high performance but is not as easy to expand. It is also less expensive than NAS systems. 4) NAS or network-attached storage is another type of centralized data storage. NAS systems are networked appliances containing storage drives. Benefits include faster data access, easier administration and simple configuration. NAS systems are easier to expand than SAN but provide less performance. NAS systems fit well in situations where customers have massive storage needs (or expect to in the future.) These are applications with lots of cameras and a need to retain high-frame-rate video for 180 days or longer. Typical uses include sports arenas, large cities, universities, corporate campuses and airports. Immediate Access To Video Highly available systems, such as SAN or NAS, are needed in any regulated industry. For example, in the cannabis grower market, an end user might need immediate access to video to show a compliance regulator. Gaming is another market in which immediate access to video is critical, and, for example, if a video system goes down at a table game, the gaming has to shut down, which is an expensive prospect to the casino. Therefore, reliability is critical. Video’s benefits beyond safety and security can also help to justify the costs of more expensive system Importance Of Video In Risk Mitigation In some instances, video is used primarily to manage risk, for example in litigation (or to avoid litigation) in a slip-and-fall claim or other court action. This is referred to as Loss Prevention. The ability to save thousands of dollars (or millions) by averting an expensive legal verdict can go a long way toward justifying the costs of systems. Video’s benefits beyond safety and security, such as for marketing and business analytics, can also help to justify the costs of more expensive systems. Identifying The Right Video Server Equipment Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction “A tradeoff of cost and needed functionality is at the center of decisions when buying server systems for video applications,” says Tom Larson, Chief Technology Officer, BCDVideo. “Identifying specifically what the customer needs from the system, and how important it is to meet those needs, points to the right choice in video server equipment. "Various technologies have advantages and some downsides, and it is the customer’s need for those advantages (and tolerance for the downsides) that determines which server equipment is right for the job.” Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction. The systems builder can help integrators analyze the site and project requirements and translate those into the right equipment and networking choices. What does the customer need and how much are they willing to pay for it? The real determination is “how important is the video?”
Data was always bound to be a hot topic at this year's IFSEC International event. Artificial Intelligence (AI) has been a buzzword since last year's show. This year, manufacturers are ready to demonstrate solutions capable of processing and analyzing large volumes of information to bolster security and provide business intelligence. Organisers deliberately positioned IFSEC as a converged security event, highlighting the inherent link between the security of physical assets and the security of data. In the wake of the recent passing of the European General Data Protection Regulation (GDPR), visitors to the London-based show sought reassurance that physical security systems could help them comply to stricter rules regarding the collection and protection of personal information. Analyzing Big Data Seagate Technology, known for providing the surveillance industry with hard disk drives and storage solutions, showcased its Skyhawk AI hard disk drive, its first drive created specifically to enable artificial intelligence (AI) applications for video surveillance. Seagate's drive is designed for data-intensive workloads associated with recording large volumes of footage The drive is designed for data-intensive workloads associated with recording and analyzing large volumes of video surveillance footage. According to Seagate's Sales Manager Andy Palmer, AI-enabled analytics at the edge can avoid the latency associated with cloud-based systems. This makes the solution suitable for smart city applications requiring 24/7 intelligence from multiple cameras. The company also highlighted its strategic partnership with video surveillance provider Dahua Technology, with the latter seeking to leverage Seagate's technology to boost its own AI solutions. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs Video Transmission And Privacy One manufacturer addressing the challenges of data transmission was Digital Barriers. The company demonstrated the integration of its EdgeVis Live platform with Milestone's XProtect video management system (VMS). The platform is designed for safe city applications, in which law enforcement and security professionals may need to stream incidents and events in real time over a limited bandwidth. The Digital Barriers solution allows organizations to optimize how video data is transmitted depending on their particular needs. For example, while some applications may favor a high clarity of video, others necessitate low data usage or a quick turnover of frames. The full, high quality video can then be downloaded later, meaning no intelligence is lost.While some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames The company also demonstrated its deep-learning facial recognition software, which can be used to identify suspects or vulnerable persons. To maximize accuracy, the deep learning system is trained on a wide range of images with varying angles and lighting. The solution is designed around data protection and privacy, explained Product Manager Fernande van Schelle, as all information is encrypted, and the system only identifies faces of known individuals on a pre-defined watch-list. Daniel Chau, Overseas Marketing Director at Dahua; Adam Brown, security Solutions Manager at Synopsys; Udo Scalla, Global Head Centre of Excellence - IOT Privacy, TÜV Rheinland Group GDPR For Physical Security Professionals Dahua Technology addressed data protection concerns with an expert panel dedicated to the cybersecurity questions posed by the new European General Data Protection Regulation (GDPR). Speakers included Daniel Chau, Overseas Marketing Director at Dahua; and Adam Brown, security Solutions Manager at Synopsys. Chau explained that Dahua encourages customers to address cybersecurity by undertaking independent audits and penetration tests. Brown elaborated that for any organization, cybersecurity must be a boardroom issue. Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity, and instead integrate the concept into the company's overall strategy so that best practices can cascade through the organization.Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity The panel also included insights from Udo Scalla, who specializes in data protection for IoT and smart home devices at TÜV Rhineland Group. Scalla proposed that manufacturers must avoid focusing on how best to capture data, and instead ask why the data is being collected, and whether it should even be collected in the first place. Integrators must ask why the customer intends to install the system, and what they want to do with the data – only then can they begin to assess the GDPR requirements. While the possibilities for collecting data are now endless, explained Scalla, not everything that is technologically possible ought to be made into a business reality. MOBOTIX highlighted its Cactus Concept cybersecurity campaign with a large blue cactus Protecting Video Surveillance Systems Video surveillance manufacturer VIVOTEK also tackled cybersecurity, with a presentation on 'Security within Security.' The company showcased its partnership with cybersecurity software provider Trend Micro, which enables VIVOTEK to provide cybersecurity-enhanced cameras. The cameras include embedded anti-intrusion software to prevent and mitigate cyber-attacks by detecting hacking attempts and blocking the source IP address. Should a camera be compromised, explained Shengfu Cheng, VIVOTEK's Director of Marketing and Product Planning, it can be quarantined to stop the spread of the attack, thus controlling the damage and reducing the cost of the infection. The Cactus Concept campaign aims to educate partners and customers on how to build a cyber-secure video surveillance system Cybersecurity was also a key theme at the MOBOTIX stand. The stand played host to a large blue cactus, a very literal representation of the German manufacturer's Cactus Concept. The campaign, launched earlier this year, aims to educate partners and customers on how to build a cyber-secure video surveillance system. According to the concept, every element of the system, from image capture through to video management, must be encrypted. These are the digital "thorns" which prevent the entire system –the cactus – being compromised. Exhibitors at IFSEC 2018 made a conscious effort to address customers' challenges around the collection, transmission and protection of security system data. As solutions become more powerful, with increasing numbers of connected sensors, this is a theme which is unlikely to go away anytime soon.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, today shared the results of its ‘Physical Security in EMEA 2021’ report, based on insights from over 1,500 physical security professionals. The report takes a closer look at how physical security teams across Europe, Middle East, and Africa (EMEA) are leveraging technology to manage both short-term needs and long-term priorities. The findings offer useful insights for those responsible for developing their organization’s own infrastructure and security strategies. 2020 has refocused priorities The realities of COVID-19, and the subsequent shift to work at home, have emphasized the value of technology that can provide greater insight and control. As a result, video analytics, access control, and identity management were all identified as strategic technologies for 2021. “Last year we saw a seismic shift in the way companies approach security. The access control boom within facilities showed that the physical security industry is capable of streamlining innovative solutions—particularly when there’s a demand for enhanced safety. As we enter a new chapter, the industry must continue to adapt to changing requirements and invest in the latest enabling solutions to help make our workplaces safer, healthier, and more secure,” said Cyrille Becker, Managing Director of Europe at Genetec. Cybersecurity is a strategic priority Cybercrime is primed to reach record heights in 2021, with the rise of work-from-home and the growing adoption of IoT Cybercrime is primed to reach record heights in 2021, with the rise of work-from-home and the growing adoption of IoT. Against this backdrop, 67% of respondents are planning to prioritize the improvement of their cybersecurity strategy in 2021. “The rise of cybercrime has highlighted cyber and physical security measures can no longer be treated as separate conversations. Physical security professionals must partner with their counterparts in IT to understand the true limits of the security perimeter and mitigate against risk. This requires solidifying a resilient cyber-physical security framework, to ensure trusted devices are integrated into the network and subsequently configured, updated, and managed throughout their operational life,” said Christian Morin, Vice President of Cloud Services and CSO at Genetec, Inc. Accelerating adoption of cloud and hybrid cloud Physical security departments have traditionally been slower to adopt the cloud; however, the survey results indicate the situation is rapidly changing. Almost two-thirds of respondents reporting the pandemic has somewhat (51%) or greatly (12.5%) accelerated their cloud strategy in relation to physical security. “The unprecedented shift to remote work and the resulting need for supporting technology, has highlighted the importance of cloud computing and, if business leaders had not been convinced of its benefits before, they are likely to be now,” added Morin. Survey methodology In January 2021, Genetec EMEA surveyed physical security professionals based in Europe, Middle East, and Africa. Following a review of submissions and data cleansing, 1,550 respondents were included in the sample for analysis.
ISONAS Inc., an IP access control and hardware solution provider and part of the Allegion family of brands announced that the ISONAS™ Pure IP™ access control solution has been deployed at Our Lady of Perpetual Help Parish in Grove City, Ohio. The parish is comprised of seven buildings, which include the church, preschool, elementary school, rectory, storage garage, athletic building, and modular classrooms. The parish grew from around a dozen visitors daily to more than 80 people visiting the church every weekday morning and more than 500 people visiting over three separate services each weekend recently. Controlling Access The elementary school has grown to host more than 300 students and 50 staff members and volunteers, with the preschool adding another 40 students and staff members to the campus tally. With 28 exterior doors encompassing the fully renovated church, school, and preschool, the parish needed a substantial security upgrade. The new system needed to not just limit access, but also control it. A main challenge at the parish was being able to control access at all seven buildings and provide an environment with improved personal security for their staff, students, and patrons. The security system the parish had in place consisted of a few standalone keypads and electric locks on a couple of doors with no centralized management or communication. Upgrading Security With an influx of people accessing the parish and its facilities, both the facilities director and the maintenance/technology specialist at the parish were ready to find the right access control solution. The new system needed to not just limit access, but also control it. After careful consideration and research, the parish selected the ISONAS™ Pure IP access control solution for their security upgrade. ISONAS introduced the parish to its local certified independent security integrators, Systems 28. “Working with ISONAS on this project was a tremendous experience from start to finish, and we were thrilled to be brought on board to handle this security upgrade,” said Scott Hoover, sales estimator at Systems 28. “As a certified independent ISONAS systems integrator, we were proud to install this unique solution at our local parish and help make our community safer.” ISONAS RC-04 reader controller The parish also liked the fact that an on-site server was not required with the ISONAS solution The project consisted of installing 24 ISONAS RC-04 reader controllers, with 21 deployed on exterior doors and three on interior doors in a month’s timeframe. The parish chose the ISONAS solution for a myriad of reasons, with one main factor being the ability to use power over the ethernet for the card readers and electric locks. The parish also liked the fact that an on-site server was not required with the ISONAS solution, as having a cloud-based server was critical to managing access remotely for multiple buildings. ISONAS Pure Access software “We are extremely happy that the parish selected ISONAS as the right solution for their security upgrade and look forward to providing capabilities to easily expand the system in the future,” said Jonathan Mooney, ISONAS sales leader. The ISONAS system is extremely user-friendly and much more convenient Along with the ISONAS hardware, the ISONAS Pure Access software was deployed for its remote access capabilities. Pure Access™, ISONAS’s software, is a cloud-based access control application that provides users the ability to manage their access control from anywhere at any time, on any device. Remote access functionality “The ISONAS system is extremely user-friendly and much more convenient than the previous ‘stand-alone’ system we had in place prior to this upgrade,” said Kevin Radwanski, facilities director at Our Lady of Perpetual Help Parish. “We especially like the remote access functionality, as it has been great for us to be able to lock and unlock doors remotely during regular times and emergency situations like the global pandemic.”
Globally renowned security video wall technology and audio visual solutions expert, Ultimate Visual Solutions (UVS) has announced that the company has secured its first contract in Poland, as part of a concerted sales drive across Central and Eastern Europe. The project deal, for a client in the energy sector, is to supply a control room with UVS Lucidity video wall controller technology. This deal takes the number of countries where Ultimate Visual Solutions has worked in or supplied equipment to 17 in the last two years. UVS Lucidity video wall controller technology The contract is the result of detailed online demonstrations of the UVS Lucidity video wall controller technology The contract is the result of detailed online demonstrations of the UVS Lucidity video wall controller technology during lockdown, to a client brought to UVS by the audio-visual distributor, Business International Group. The AV distributor, based in Warsaw, Poland provides professional solutions, devices and audio-visual accessories to a wide range of clients. UVS technology will be at the heart of a new operations center, where it will be providing the monitoring of key Supervisory Control And Data Acquisition (SCADA) systems and other critical data. Monitoring of SCADA systems and critical data Business International Group was introduced to Ultimate Visual Solutions by Pawel Religa, the UVS representative in Central and Eastern Europe, who was recruited to take advantage of the region’s fast-growing audio-visual markets. He was given technical support by UVS’s certified and authorized Eastern Europe pre-sale and after-sale service support partner, Robert Chlebowski of SIGE Poland. Pawel Religa has a wealth of experience in the AV sector, with previous employers including, Edbak (EDBAK Sp. Zo.o.). He is focusing on Russia, Poland and other key parts of the European mainland. Live demonstrations of UVS technology Pawel Religa commented, “The fact that Ultimate Visual Solutions (UVS) were able to provide Business International Group and their end client with very specific online live demonstrations and evaluations of the proposed UVS technology, and using the exact same SCADA application as the end client has implemented, convinced the end client that it was providing the correct solution.” Pawel further adds, “Ultimate Visual Solutions support during the sales, procurement and installation cycle has been excellent and Business Group are looking forward to a long term business relationship.” UVS remote services suite Ultimate Visual Solutions launched a suite of remote services, including a live online demonstration facility Earlier this year, Ultimate Visual Solutions launched a suite of remote services, including a live online demonstration facility, in order to provide full video wall technology evaluations for partners and their clients, even in lockdown or self-isolation due to the COVID-19 pandemic. Steve Murphy, Managing Director of Ultimate Visual Solutions (UVS), which is based in the Business First - Burnley Business Centre, said “This contract is the first to come as a result of the many proposals we have been doing during lockdown for Business International Group in Poland, which have benefitted greatly from our ability to provide online demonstrations.” Video wall displays and AV solutions provider Steve Murphy adds, “The investment we made at the beginning of 2020 in our remote demonstration and remote support capability is proving invaluable and has contributed to a very strong finish to 2020.” Ultimate Visual Solutions (UVS), which has its headquarters at the Business First - Burnley Business Centre in Burnley, United Kingdom, provides video wall displays and audio visual solutions to a range of clients across the UK and the rest of the world. It changed its name from eyevis UK in September 2018, following the acquisition of eyevis GmbH by the Leyard Group.
One of the key problems in airport security is the sheer size of the perimeter and a large number of incidents are in fact linked to unauthorized access onto the airfield, either runways or where aircrafts are being loaded or refueled posing an extremely high risk. Most airports will combine multiple sensors and technologies to protect the actual perimeter fence and even beyond the perimeter fence, to warn of potential threats. OPTEX LiDAR sensor integration with RSA module Some airports have found the level of information generated by the perimeter security systems quite challenging to deal with and they wanted to decrease the number of events so operators could focus on what was critical. The Airport development team at Genetec integrated the OPTEX LiDAR sensor into their Restricted Security Area (RSA) Surveillance module, an extension of the Genetec Security Center platform with the purpose to unify data from the sensor and camera to present more meaningful information to the operators. Restricted Security Area Surveillance module The RSA module has been designed specifically with a view to providing wide area protection The RSA module has been designed specifically with a view to providing wide area protection and integrating with wide area surveillance technology, including radar, fiber optic and laser detection devices. The solution allows security staff to determine the level of threat for each area, map them, and utilize OPTEX technologies to identify and locate quickly and precisely the point of intrusion. For instance, with Fiber optic fence sensor, zones can be 100m-200m long and will identify people cutting through a fence, crawling under or climbing over. Newer fiber technologies provide point location. Another way to pin-point exact intruder location is with OPTEX LiDAR technologies or with Radar. ‘Fuse’ data into a single event A particularly intelligent feature of the system is its ability to ‘fuse’ data (known as ‘target fusion’) coming from multiple sources and confirm an event as a single (i.e. the same) activity rather than a multiple threat. For instance, using the X&Y coordinates provided by OPTEX REDSCAN sensors, RSA allows to map exactly the path of the intruders or moving vehicles, fuses the path from one camera to the other and considers it as one event, one target and tracks it precisely on the map. Intelligent Tracking and event categorization This gives a more meaningful picture to the operator and presents events in a unified and intelligent way. This helps support the security team in making the right decisions. The deeper integration of OPTEX’s technologies into Genetec’s RSA platform enables intelligent tracking and event categorization, making it a very precise security system for airports.
The ten photovoltaic panels for the JUICE mission (JUpiter ICy moons Explorer) are ready. JUICE is the most ambitious mission of the Cosmic Vision space program of the European Space Agency (ESA), for which the Italian Space Agency (ASI) participates with an important contribution. Leonardo photovoltaic panels Airbus, as the prime contractor, is developing and building the JUICE spacecraft. Leonardo will deliver the panels to Airbus Defense and Space Netherlands, which is developing the solar arrays for the interplanetary mission. Even during the COVID-19 emergency, Leonardo guaranteed the continuity of its activities, respecting the timeline of the supply. With the production of the JUICE photovoltaic panels, Leonardo not only confirms, but exceeds its technological leadership that was previously achieved with the Rosetta mission. JUICE’s panels cover a total area of 85 square meters, becoming the largest ever built for an interplanetary mission. JUICE mission JUICE mission, scheduled to launch in 2022, will study Jupiter and its three icy moons, Ganymede, Callisto, and Europa JUICE mission, scheduled to launch in 2022, will study Jupiter and its three icy moons, Ganymede, Callisto, and Europa, which are considered to be of great interest due to the presence of vast oceans beneath their surface. The surface and inner layers will be explored in search of conditions favorable to life. To reach Jupiter, JUICE’s journey will take almost eight years during which the solar panels will guarantee the energy necessary for the on-board instrumentation. At its destination, the probe will be about 780 million km away from the Sun, and will have to operate in extremely critical conditions. Jupiter’s moon missions Jupiter’s distance represented a challenge that required the study and implementation of specific and optimized technologies which are able to operate with temperatures as low as -230 degrees Celsius and in conditions of almost no light (about one twenty-seventh of that arriving on Earth). The constant generation of power is in fact an essential requirement without which the mission would not survive, failing all its objectives. JANUS optical telescope and MAJIS infrared spectrometer For the JUICE mission, in addition to supplying the photovoltaic panels, Leonardo participates in the production of the JANUS optical telescope and the MAJIS infrared spectrometer, both highly technological scientific instruments of great importance to the mission. JANUS is developed under the responsibility of ASI with the contribution and scientific guidance of INAF (National Institute for Astrophysics). MAJIS is developed by the French institute IAS and funded by CNES and ASI. European Service Module The European Service Module, powered by Leonardo's photovoltaic systems, will transport the Orion capsule Activities continue at the Nerviano plant (Milan) with the construction of the photovoltaic panels of the European Service Module that ESA will provide to the Orion shuttle, as a contribution to NASA’s ARTEMIS program for the safe return of man on the moon. The European Service Module, powered by Leonardo's photovoltaic systems, will transport the Orion capsule, guaranteeing the astronauts housed inside the shuttle a safe and comfortable journey. ARTEMIS program Leonardo has already provided the panels for the first two missions of the ARTEMIS program, scheduled for 2021 and 2023, which aim to verify and test the complex integrated transport system between the Earth and the Moon. Furthermore, activities for the solar panels of the third ARTEMIS mission have just begun, the launch of which is scheduled for 2024, and it will bring the next man and first woman back to the lunar soil, more than half a century after the historic 1969 landing. Leonardo has over ten years of expertise in the field of photovoltaic generators and power units, developed by participating in numerous international missions such as: Herschel, Planck, Lisa Pathfinder, GAIA, Aeolus, COSMO-SkyMed, Euclid, ExoMars TGO, Exomars 2022, Meteosat Third Generation, MetOp Second Generation.
ARST is a public transportation company in Cagliari, Italy. The company operates a massive fleet of about 800 public buses throughout the island of Sardinia. During the vehicle modernization process, the company decided to deploy new centralized CCTV systems to enhance the security level of passengers and drivers. First of all, the low-definition images captured by the original surveillance equipment cannot meet the company’s advanced monitoring needs. Second, the bus driver could not achieve point-to-point communication with the command center in real time. In addition, in case of an accident, there was no emergency button on the bus before to report the emergency to the command center. Customized mobile solution To help ARST revamp its bus security system, a customized Dahua mobile solution consisting of more than 3,000 cameras and 750 MXVRs, Panic Buttons, DSS integrated platform as well as other accessories was employed. The data collected from the front-end cameras is integrated in the control room via DSS4004, where emergency calls, geo-localization of vehicles and statistics can be managed. Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras and panic buttons. The main features of the systems are: data encryption, people counting, hot spot, router 3G/4G, dynamic management of the LCD monitor on board and geo-localization via DSS app. As the first mobile XVR adopting HDCVI/AHD/TVI/CVBS/IP signals, MXVR6212 can achieve 1080P high-definition real-time recording. High performance sensor It supports real-time vehicle location tracking and monitoring, and all information such as GPS and video can be uploaded via wireless network - 3G/4G/WIFI. In addition, the device can also support connection of various accessories, such as card readers, fuel sensors, and emergency buttons. Furthermore, it has passed EN50155/ISO16750 to meet the requirements for mobile use. Other than city bus, this device can be used in various applications, such as school bus, taxi, police car, train, truck, etc. The 2MP HAC-HDBW2241F-M-A mobile camera is designed with a shock-proof compact case, which makes it convenient to be installed and adaptable to various applications. Boasting the strengths of the Dahua self-developed HDCVI technology, the camera offers high quality images and ensures real-time transmission. Also, it adopts a high performance sensor to provide incomparable performance even under extreme lowlight environment. Manage mobile devices The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses The Starlight feature allows capturing of more details and recognizing accurate colors at night or in scenes with limited illumination. At the control room, Dahua DSS platform was utilized to control and manage the mobile devices deployed on the bus. It displays real-time location, speed, direction of mobile device, playback device’s history location, and supports alarm for over-speeding, entering and leaving the E-FENCE. Aside from central management, the Business Intelligence feature of Dahua DSS platform also allows the user to export Heat Map reports and people counting statistics, helping operator companies to optimize driving route to generate more profit. High-definition monitoring With upgraded Dahua system, the command center can communicate with every single vehicle of ARST Bus Company in real time, enabling them to deliver instructions to the driver, allowing the driver to report immediately to the command center in case of an emergency through the panic button, and ensuring the safety of passengers and drivers. The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses, and enables bus companies to collect accurate information about traffic flows and automatically download data to assist efficient and profitable operation. The Dahua mobile solution mounted on board has been proven to be highly efficient and reliable, which were also applied in two other Italian bus companies: AMAT Bus Company in Taranto and AMTAB Bus Company in Bari.
IP transmission: Manufacturers & Suppliers
- exacqVision IP transmission
- Axis Communications IP transmission
- BCDVideo IP transmission
- AMAG IP transmission
- Video Storage Solutions IP transmission
- OT Systems IP transmission
- Avigilon IP transmission
- Dahua Technology IP transmission
- Messoa IP transmission
- Hikvision IP transmission
- Dallmeier IP transmission