Allied Universal, a security and facility services company in North America, has signed a definitive agreement to acquire Securadyne Systems, a security systems integration company based in Dallas, Texas. The deal is expected to close on April 15, 2019. This acquisition will combine a leading U.S. security services company with a world-class technology solutions provider, which will serve as a platform for providing technology-enabled security solutions on a global scale. Terms of the deal were...
It’s the first quarter of a New Year and businesses are already busy reviewing budgets for ways to save money. One line item that can impact business the most – loss. Employee theft alone is a crime that costs U.S. businesses $50 billion annually*, according to Statistic Brain. So if you aren’t sure who is keeping watch over your property and assets, and how they reduce preventable loss, it might be time for a security audit. According to GuardOne, the security patrol and remo...
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented...
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per...
School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimize the death toll)? In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective ar...
ISC East, in collaboration with premier sponsor, the Security Industry Association (SIA), reported strong growth results at the conclusion of this year’s industry event in New York City. The International Security Conference & Exposition is the Northeast’s largest security trade show, where close to 7,500 security and public safety professionals convened this month to meet experts from over 300 leading security brands, all the while co-locating with the launch of Unmanned Securit...
Security 101, one of the fastest growing security integrators in the country, announced it has opened its 40th office in Austin. Kevin Schnyder, an experienced IT and physical security professional, is the owner and president of the new franchise. Most recently Schnyder was an IT manager with the Texas Municipal Power Agency. Previously, he worked with Marathon Oil Corporation in Malabo, Equatorial Guinea, West Africa on facility security, access control and perimeter surveillance. Security 101’s 40th Franchise Opening the 40th U.S. franchise is a milestone for Security 101 and a sign of the company’s momentum and the strength of the overall security market, according to Steve Crespo, Security 101’s chief executive officer. “Kevin has the ideal background for his new role at Security 101,” he said. “He has physical security experience combined with a background in IT which is essential for a security integrator today.” “Austin is one of the fastest growing metro areas in the U.S. with many people calling it a mini Silicon Valley,” Schnyder said. “We’re looking forward to being part of that growth by helping the business community with its security and safety needs.”
Eagle Eye Networks, Inc. announced the enhancement of the Eagle Eye Cloud Security Camera VMS to include the integration of Hikvision body worn cameras. The new Eagle Eye solution provides ease, reliability, and cybersecurity to body worn camera users seeking to synchronize and store video for extended periods in the cloud. The Eagle Eye Cloud Security Camera VMS will retrieve video and GPS data through a docking station connected to any Eagle Eye Bridge or Cloud Managed Video Recorder (CMVR) and securely transmit the video to the Eagle Eye Cloud Data Center. The body worn camera and its video appears in the Eagle Eye Customer Dashboard along with any fixed cameras attached to the system and can be reviewed, managed and analyzed. Integration With Mobile Cameras Eagle Eye Networks’ customers have requested the integration of mobile cameras in to the Eagle Eye interface to enable the combination of fixed position cameras with mobile cameras to better serve specific applications. Eagle Eye's customers are using mobile video for optimisation in robotics, manufacturing, emergency room management and home care services Law enforcement, guarding services, health care, retail management, training, warehouse management, and other service-oriented verticals create considerable value and reduce risk through the reliable and secure management of surveillance video in the cloud. Several of Eagle Eye Networks’ high-tech customers are using mobile video for business optimization in robotics, manufacturing, emergency room management and home care medical services. The challenge surrounding body worn and other types of mobile cameras has always been the lack of scalable, cost-effective, redundant storage. The Eagle Eye Cloud Security Camera VMS offers subscription-based storage for any period. Body Worn Cameras Lieutenant Kevin Francis, Head of the Bay County Sheriff’s Office Drug Enforcement Division stated, “We are excited to see Eagle Eye Networks adding body worn cameras to its system. The management of body worn video is cumbersome and unreliable from a storage perspective. The cloud makes it so much easier to store and retrieve evidentiary video.” The use cases for body worn cameras are endless. Body worn cameras began gaining momentum in law enforcement and private security, but there are other business optimization benefits that these cameras provide.Body worn camera users in retail are witnessing a decrease in customer standoffs and reduced claims against stores Businesses using body worn cameras have been able to improve profitability, communication, and customer service by using the footage to provide scenario-based training to employees. In the retail industry, for example, body worn camera users are witnessing a decrease in customer standoffs and reduced claims against stores based upon readily available visual evidence. Cloud-Powered Video Surveillance According to Dean Drako, CEO of Eagle Eye Networks, “Eagle Eye Networks is the industry’s go-to supplier of cloud video surveillance." "One of the many advantages of a cloud-based video management system is the ability to coalesce a wide variety of video collecting devices within a single user experience. Eagle Eye Networks will remain the leader in offering innovative solutions to combine connected, remote and mobile based camera technologies.”
Veracity, a global designer and manufacturer of innovative IP transmission products, long-term surveillance storage and an advanced, modular integration platform for Command and Control Centers, is a key sponsor of the IAPSC Annual Conference and will be presenting to the attended delegates in San Diego, CA during the three-day event. Veracity will be promoting VIEWSCAPE, their comprehensive Command and Control system. Featuring an advanced, modular integration platform, VIEWSCAPE gives operators flexible and immediate control over complex surveillance and security functions. VIEWSCAPE includes visual information received from IP and deployable CCTV cameras combined with interactive maps and incident management. Its flexibility adapts to new requirements whilst minimizing the challenges of integration with legacy systems.Live views may be mixed with playback and media streams such as broadcast news, online data streams, maps or other graphical displays TRINITY Direct-To-Storage Architecture VIEWSCAPE is fully integrated with Veracity’s TRINITY direct-to-storage architecture and the award-winning, advanced COLDSTORE surveillance storage system. It also features a full video and media wall display option that can be reconfigured on-the-fly and in response to specific incidents or emergency situations. Live views may be mixed with playback and media streams such as broadcast news, online data streams, maps or other graphical displays. Cost-Effective Security Solution “Our solution brings a new level of cost-effectiveness to the integrated Command and Control system market,” says Jack Meltzer, Director of A&E Programs at Veracity. “COLDSTORE has already established itself as the most reliable and cost effective long-term storage solution available, and the addition of VIEWSCAPE to our portfolio brings significant added-value for any project."Veracity’s innovative solutions will be presented to the attending conference delegates at the IAPSC Annual Conference IAPSC Annual Conference "The system can provide integration with access control, building management, intruder detection, VOIP intercom systems and video analytics including LPR and facial recognition” added Meltzer. “A number of native security functions can be added to the system in a modular, customisable way, such as guard tour, lone worker monitoring, dispatch, alarm monitoring and key management.” Veracity’s innovative solutions will be presented to the attending conference delegates at the IAPSC Annual Conference between the 29th April and the 1st May in the Kona Kai Resort in San Diego, California.
Boon Edam Inc., a provider of security entrances and architectural revolving doors, is demonstrating significant growth and momentum in both their product offering and their business operations this year at ISC West 2018 (booth #8037). With the expansion of their Enterprise Customer Group, a range of new integrations, and the growing adoption of anti-tailgating and piggybacking entrance tech by Fortune 50 Global companies, the company is advancing its position as the market leader in the Americas in security entrance solutions. “While we have held the lion’s share of the Americas market for security entrances since 2012, according to IHS Markit reports, we are moving ahead now on a number of business fronts,” said Mark Borto, President and CEO, Boon Edam, Inc. “Enterprise sales have become a major market for us as a result of our expanded focus on global standardization and deployment. At the same time, we are integrating the most advanced technologies with the combination of biometrics and anti-piggybacking solutions, addressing some of the most pressing challenges for risk mitigation.”All of these solutions can operate without manned supervision as they incorporate Boon Edam’s proprietary StereoVision 2 Integrated Biometric Technologies Products on display in Boon Edam’s booth will showcase ease-of-use, speed and accuracy via integrated biometric technologies that enable multi-factor authentication combined with piggybacking prevention. Show attendees can experience the Circlelock security portal, a turnkey mantrap solution offering the highest security available in an entrance. It’s newly launched cousin, the Circlelock Combi ‘half portal’ saves both space and costs by transforming any fire-rated swinging door into a high-security mantrap entrance that prevents piggybacking. Boon Edam’s Tourlock 180+90, the industry’s best-selling security revolving door, delivers high, bi-directional throughput while preventing tailgating and piggybacking. All of these solutions can operate without manned supervision as they incorporate Boon Edam’s proprietary StereoVision 2, which prevents piggybacking using near infrared and optical sensors to determine if someone is entering the door alone, ensuring a level of reliability. Remote Access Control In addition, the super-slim Lifeline Speedlane Swing stylishly combines high throughput with high security via biometric identification. Technology on display from Boon Edam this year enables remote access and control of security entrances. This includes BoonConnect software, which provides diagnostic and configuration tools for the Tourlock and Circlelock via smart device, and BoonTouch, enabling management of multiple Boon Edam security entrances through a desktop control panel.We have put significant support behind the Enterprise Group initiative so that we are positioned to provide the best entrance solutions" Enterprise Customer Group An additional focus at ISC West this year is the expansion of Boon Edam’s Enterprise Customer Group. Originally launched in 2013 and now numbering at 11 employees, this sales and service team delivers exceptional entrance solution consulting, logistics planning and customer service to large national and global companies through every stage of the sales process. “Our Enterprise Group of dedicated specialists is bringing an unprecedented level of consultative expertise to the world’s biggest organizations,” said Mr. Borto. “We have put significant support behind this initiative so that we are correctly positioned to provide the best possible entrance solutions for this fast-growing segment of business.” Increasing Risk Recognition As recognition of risks and liabilities grows, it has also driven the need for users to focus on hardening entrances and perimeters. Some of the risks include active shooters, cyber-threats, workplace violence, protests in urban areas and more.Boon Edam is the official turnstile sponsor for ISC West with 2018 marking the 11th year of exhibitors and attendees walking through their turnstiles Boon Edam has seen market growth for their ability to stop a range of threats including tailgating and piggybacking. Other factors driving the company’s growth include the ability of their security entrances to facilitate identity verification, along with integrations between lobby turnstiles, elevator dispatch and visitor management systems. Consultation For Identity Verification Solutions “We’re now seeing more security entrances being deployed in the upper elevator lobbies in multi-tenant properties as well,” said Mr. Borto. “Every organization has its own varied needs for identity verification and security at differing entrances, and we provide consultative support in helping them determine the right mix of products for their needs.” Boon Edam is the official turnstile sponsor for ISC West and 2018 marks the 11th year that exhibitors and attendees will walk through Boon Edam turnstiles as they enter the exhibit halls, making the turnstiles a familiar site at the show. This year the company unveils 34 lanes of the sleek Speedlane Open, a new, barrier-free optical turnstile designed for deterring casual intrusion attempts.
Boon Edam Inc., global manufacturers of security entrances and architectural revolving doors, is demonstrating a new security portal solution at their ISC West 2018 booth (#8037). The Circlelock Combi will help security executives combat piggybacking and unauthorized entry in existing high security areas that currently have fire-rated swinging doors. Our new mantrap solution is a game changer for security managers who use fire-rated doors to protect their assets or data” Circlelock Combi Security Solution “Our new mantrap solution is a game changer for security managers who use fire-rated doors to protect their assets or data,” said Mark Borto, President and CEO of Boon Edam, Inc. “We designed the Circlelock Combi as a turn-key retrofit option to address the risk of tailgating that exists with swinging doors in facilities - once a swinging door is opened, anyone could slip inside behind an authorized user. But once the Combi is installed with that existing swing door, they still get all the benefits of a fire-rated entry, only now it’s a high security entrance that only lets authorized people enter and doesn’t need manned supervision.” The Circlelock Combi is a cylindrical mantrap portal solution that has a single sliding set of doors on one end and an opening on the other end that is mounted to an existing swing door. This also saves considerable space compared to traditional mantrap vestibules created from walls and two swinging doors. It provides a throughput of five to six people per minute and is ideal for any interior location where the most critical security is required. This could include data centers, government buildings, secure areas in airports, legal or patient record areas, prescription medication dispensaries, executive suites and more. Many facilities use fire-rated swing doors to protect data and assets from destruction by fire Fire-rated Swing Doors Many facilities use fire-rated swing doors to protect data and assets from destruction by fire, but this type of door cannot prevent tailgating or piggybacking. The Circlelock Combi attaches to the existing fire-rated door, converting it immediately into a mantrap solution that prevents piggybacking 24/7. One of the most important benefits of the Circlelock Combi is the enablement of multi-factor authentication – the ability to ensure that only one person, and the right person, is entering. Users can present a credential in front of the portal to open the sliding door and once inside and confirmed to be alone, can present another credential to unlock the swing door. The Combi can also accommodate a wide variety of identity verification technologies (iris scanner, facial reader, pushpad, etc.) in its interior with a customizable floor-to-ceiling post. Facial Scanning Technology Boon Edam will feature the Circlelock Combi solution in their ISC West booth as a two-factor authentication scenario: initial authentication using an AMAG Symmetry card reader to enter the portal, followed by facial scanning technology from StoneLock Pro to open the second door.
EverFocus, GeoVision, PLANET and VIVOTEK—were the highlights of a press conference at ISC West 2018, organized by the Taiwan External Trade Development Council (TAITRA), Taiwan’s foremost trade promotion organization. These breakthrough products, with potential to transform the global security market, include a futuristic Virtual Reality 720° camera, a facial recognition dome camera, a cutting-edge Internet of Vehicle (IoV) fleet surveillance system, an IP camera armed with anti-intrusion software, and a next-gen intuitive colour touch LCD switch.We are proud to showcase Taiwan’s finest at one of the United States’ most prestigious security tradeshows" Extensive Engagements “Today, the United States and Taiwan enjoy an ever-expanding relationship and extensive engagement in many fields, especially in electronic security." "Our products launch event unveil some of Silicon Island’s most cutting-edge products and technologies in the areas of IoT and Internet of Vehicles (IoV), unmanned security and cyber + physical integration." "We are proud to showcase Taiwan’s finest at one of the United States’ most prestigious security tradeshows and look forward to having participants experience the future of security,” said TAITRA Executive Director Simon Lai. These Taiwanese ICT companies, all winners of the Taiwan Excellence Awards, generated a lot of excitement and buzz with the unveiling of their new products at the conference. XFleet Management Platform EverFocus demonstrated its engineering and research prowess as Regional Technical Sales Manager Marques Phillips unveiled details of the company’s XFleet Management Platform which he described as not only transforming the IoV experience, but the future of vehicle fleet management. The new solution allows users to easily track, monitor and manage any type of fleet vehicles on a Web browser anywhere and anytime. With Xfleet, users can not only reduce overall costs by effectively utilizing resources such as vehicles, fuel, and manpower, but also improve management efficiency and business performance by keeping and analysing the historical records of the vehicle data as needed.GeoVision cameras can recognize human faces in 1.5 seconds, making possible identification of authorized versus un-authorized personnel Virtual Reality Camera GeoVision showed off the VR 360, the world’s first Virtual Reality camera that can provide a 720° view. President David Huang said it’s the only camera with two Fisheye lenses to provide a floor to ceiling, 720° view with no blind spots. It’s ideal for security environments such as airports, train stations, city streets, harbors and highways. The camera uses advanced computer vision technology to simulate a three-dimensional, highly realistic, and practical 3D space. It’s water-proof, vandal-proof and dust resistant, making it ideal for outdoors. It also boasts IR Night Mode for clear images even in dark environments. Huang also demonstrated new facial recognition IP dome camera with cutting-edge AI. It can recognize human faces in 1.5 seconds, making possible identification of authorized versus un-authorized personnel, creation of blacklists for restricted personnel, and VIP lists to improve relationship management. Intruitive Touch LCD Switch PLANET explained how the Intuitive Touch LCD Switch makes it possible to easily manage powered devices in real time, greatly enhancing network management efficiency. Tammy Huang, Sales Manager, noted that it’s the unique touch LCD that makes such management possible. In addition to the touch LCD interface, the solution features L2+ switching, intelligent PoE management and an ONVIF support function. An Industrial flat-type touch LCD switch model is also offered, making possible management of large-scale networks.VIVOTEK’s Smart Stream II and H.265 technology allows users to benefit from reduced bandwidth and data storage demands VIVOTEK’s Network Cameras With the theme ‘Security within Security,’ Shengfu Cheng, Director of Marketing and Product Development, demonstrated the first cybersecurity enhanced network cameras in the IP surveillance industry. The three new cameras are armed with Trend Micro’s anti-intrusion software, allowing them to automatically detect and prevent credential attacks and block suspicious events. They also feature VIVOTEK’s Smart Stream II and H.265 technology, allowing users to benefit from reduced bandwidth and data storage demands by up to 90% more than systems employing H.264. Low-Light Surveillance Add to that a new generation of night visibility technology, Supreme Night Visibility II (SNV II) which allows them to reproduce high-quality colour images, even in very low-light conditions. In the security industry, the United States is the largest buyer of electronic security products and spent $12.3 billion on imports in the field in 2016. And Taiwan constitutes North America’s 4th largest trade partner in the electronic security field, with an import value that was close to $1 billion in 2016. Throughout ISC West 2018, Taiwan exhibitors will present their latest innovations. In pursuit of Asia’s Silicon Valley vision of propelling Taiwan to the international forefront of technology, Taiwanese companies continue their pursuit of excellence and innovation.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced Visitor Experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognized a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimeter wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding Perimeter Protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centers, sports centers, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat Mitigation With Soft Target Approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labor reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving Security Posture At Event Venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual Devices And Controls In effect, a security guard wearing a HoloLens headset can approach a door in his facility and see the real-time status of that door, provided by an access control system, projected as a hologram alongside his live view of the door. It’s the first implementation of a technology with many possibilities. Related to video surveillance, real-time facial recognition could provide the identity of a person walking past a security officer in a hallway, for example. Basically, the approach extends the interfaces and capabilities available in a control room to a security officer on patrol. The officer can place and interact with a variety of virtual devices and controls as holograms in the 3-D space he or she views through the headset. Augmented Reality For Integrated Electronic Security The security industry technology has been developed by CodeLynx, a software engineering and systems integration company headquartered in North Charleston, S.C. As a systems integrator, CodeLynx specialises in audio-visual and physical security design and installation for A/V, access control and video surveillance systems. A complementary business is software engineering; Darren Cumbie, Director of the Software Engineering Division, and his team provide custom integrations of various technologies. The approach extends the interfaces and capabilities available in a control room toa security officer on patrol CodeLynx has developed software to adapt Microsoft’s HoloLens product for use in the physical security field. They are bringing it to market as ARIES (Augmented Reality for Integrated Electronic Security). The software operates using Microsoft’s HoloLens, introduced in 2016, a powerful, self-contained holographic computer worn as a headset. Specialized components enable holographic computing in lockstep with advanced sensors, including five cameras. Users can move freely throughout an environment and interact with holograms that augment the reality they view through the HoloLens. Cumbie says HoloLens provides the best mixed reality headset currently available: “Nothing else has the power, usability and scalability across an organization.” AMAG Symmetry Access Control Integration In ARIES, CodeLynx has created a certified integration with AMAG’s Symmetry access control system to enable operators to view information from Symmetry as holograms in their field of view through the HoloLens. The integration extends the functioning of Symmetry to operators in the field, thus expanding the control room environment. Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry. Approaching a door, an operator can request a list of the last five people who came through the door, for example; he or she can see a photo ID related to each person who swipes through a turnstile. CodeLynx is looking to expand the market for ARIES using integrations with other OEMs in addition to AMAG. “Instead of being chained to their desk looking at monitors or a display wall, operators can work in the field using the full functionality of their systems as they walk throughout the property,” says Drew Weston, CodeLynx Director of Sales and Marketing. “Meanwhile, I am not sitting at a desk, I am out in public.” Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry At some point, the headsets will likely get lighter and more ergonomically appealing. Right now, all the computing power is inside the headset (which, even so, only weighs only 1.3 lbs). In the future, more of that computing will likely be “offloaded” to a nearby desktop or laptop computer, or even to the cloud, and wirelessly “tethered” to the headset. In addition to making the headsets lighter and more ergonomically appealing, tethering would bring down costs from the current $5,000 per headset (possibly into the “three digit” range). CodeLynx is poised to leverage any Microsoft enhancements to the HoloLens environment. Currently the software is priced at $1,500 per user. Benefits For Systems Integrators For systems integrators, ARIES could be used to simplify installations, given its ability to view camera frames through the headset hands-free rather than needing to view a separate laptop when focusing or positioning a camera. For maintenance or troubleshooting, an operations center could access the field user’s view and direct him or her to correct a problem. In this way it would be a training tool to help integrators, which is a separate value proposition from how the devices may be deployed by end users. The ARIES approach could also eventually change how we think of a control room. Instead of video screens and walls, operators might sit in comfortable chairs in rooms with white walls, viewing all the control room “screens” through their headsets as holograms. Less power consumption would be among the benefits. ARIES plans to offer a “virtual operations center” in 2018, enabling command center operation from anywhere, user-customizable layout views and the ability to push content to specific HoloLens users. This video demonstrates how interaction with holograms can drive security functions: https://www.youtube.com/watch?v=B82oAlxt5_s
On September 2, torrential rain caused mountain flood and massive landslide swept Mengdong Town of Yunnan province in southwestern China. Local transportation, electricity and communications network were disrupted. At 9:00PM, in order to reinforce local rescue forces, Yunnan Provincial Fire Brigade dispatched 24 vehicles and 130 firefighters, who later experienced serious challenges in communications in areas where intermittent voice call and short messages in cellular service was available only on heights. Hytera swung into action immediately after being notified about the firefighting department’s emergency communications requirements. Hytera iMesh Broadband Network Solution A Hytera technical team brought the latest emergency communications equipment with them and joined the firefighters onsite. The team quickly set up an ad hoc wireless network with Hytera iMesh broadband networking solution. This broadband network has been facilitating real-time audio and video communications and coordination between the onsite forces and the Provincial Fire Brigade command center. Multiple casualties have been reported and more people are missing. The relief effort is ongoing.
Upon hearing Pablo Picasso’s famous praise of art’s ability to clear “the dust of everyday life,” one’s thoughts could easily turn to one of Arizona’s newest landmarks, the Mesa Arts Center. Set proudly amidst the dust of the Sonoran Desert, the Mesa Arts Center is a striking complex of buildings, art installations, and public throughways, offering a rich blend of visual impressions in glass, water, stone, and metal, with splashes of vibrant color and metallic reflection. At more than 21,000 sq. feet, the award-winning $95 million campus is the largest and most comprehensive performing, visual and educational arts complex in Arizona, serving as a gathering point for the citizens of Mesa and region alike, seeking to enjoy the indoor and outdoor spaces, public events, classes, and art exhibitions. The presence of an adjacent light rail station and hosting of multiple festivals throughout the year further increase traffic to, from, and through the open planned site at various hours of the day, and on weekends and even holidays. IP Video Surveillance The heart of the Mesa Arts Center complex is a grand promenade that knits together all of its pieces The heart of the Mesa Arts Center complex is a grand promenade that knits together all of its pieces, while providing places for group gatherings, performances, and quiet reflection, comfort and relaxation. Ensuring a safe, family friendly environment is essential to fulfilling the role the center plays as a gathering point for all walks of life. In addition to welcoming visitors to the Center, the open configuration of the complex invites commuters coming off the nearby light rail line to stroll through on their way to and from the station, and draw loiterers, would-be vandals, and itinerant populations (attracted to the semi-secluded spaces created by outdoor art installations and the complex’s fountains and water elements). Particularly outside of traditional hours of operation, such factors can increase the risk of nuisance crimes, vandalism, and petty theft, and potentially more serious crimes against visitors and staff, without a vigilant and comprehensive security and surveillance operation. Additionally, complex spaces, varied materials, and water elements increase risk for incident and accident without proper prevention and/or prompt response. Manned Guarding And CCTV While customary approaches to similar venues have typically relied heavily on a combination of CCTV and human security guards, the size and complexity of the Mesa Arts Center campus makes a traditional manned guarding solution, even when supported by a typical surveillance technology, both cost prohibitive and potentially inadequate. The Mesa Arts Center is an architectural showpiece and regional destination, requiring comprehensive surveillance at all hours, every day of the year, under highly variable conditions. A comprehensive technical solution with proven power, performance, and reliability was paramount to ensure protection of property and the safety of everyone on campus. The City of Mesa, who operates the center, in partnership with Scottsdale’s Surveillance Acquisition Response Center (SARC) and IDIS technology provide a mix of surveillance cameras and network video recorders (NVRs) able to meet the varied requirements of a campus housing multiple art galleries, studios, performance spaces, walkways and cut-throughs, and outdoor gathering spaces, and support SARC’s innovative approach to virtual guarding, which incorporates military, police, and intelligence best practices and personnel to enhance traditional remote monitoring models and outcomes. IDIS DirectIP NVRs And Surveillance Cameras The City of Mesa’s previous successes implementing SARC and IDIS technology at the Mesa Grande Cultural Park made the integration of technology and monitoring a natural fit The City of Mesa’s previous successes implementing SARC and IDIS technology at the Mesa Grande Cultural Park made the integration of technology and monitoring selected for the Mesa Arts Center a natural fit. Featuring multiple IDIS DirectIP [model number] network video recorders (NVRs), and IDIS Direct IP [model number] cameras, with [feature set] at the heart of a comprehensive security posture, SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution Suite and their unique military, law enforcement, and intelligence-derived protocols and best practices to support on-site personnel and cover the campus comprehensively at night and during other off-hours. Additionally, the IDIS solution also seamlessly integrates with, recording and managing footage from other camera installations, demonstrating the IDIS dedication to eliminating the common frustrations and complexities of security systems. The implementation of SARC’s virtual guard protection and protocols to support on-site personnel, and the highly visible, but seamlessly integrated, presence of IDIS surveillance cameras, as part of a total IDIS solution, have contributed to the Mesa Arts Center’s reputation as one of the region’s most welcoming and inviting community spaces among the area’s art lovers, families, and neighborhood’s workers (who regularly use the space without fear or discomfort as a gathering place for lunch or pathway to and from the local light rail station). 24/7, the integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus and those within it, using innovative surveillance application bringing together IDIS’s highest quality remote viewing and VMS offerings and SARC’s remote “voice down” virtual guarding protocol, which informs those under surveillance, in real time, that they are being watched and should leave the property immediately or face consequences. IDIS IP Video Surveillance Secures Mesa Arts Center The successful implementation of this solution has placed the City of Mesa and Mesa Arts Center management at the forefront of innovation in keeping the people, places, and property under their protection safe and secure, and marked them as leaders in responsible stewardship of taxpayer, grant, and donor dollars, through the implementation of a system that provides more comprehensive coverage, measurably better outcomes, and enhanced visitor experiences 24/7, year-round for a fraction of the cost of previous manned guarding solutions.
Property is one of the biggest targets for crime in the UK, especially open land. There are thousands of acres worth of property across the UK which aren’t effectively secured, as a result of which they have become hot-beds for crime, anti-social behavior, and not least fly-tipping. Security therefore must be a top priority for property owners, too many of whom tend to favor traditional methods such as fencing or hiring security guards. But, these methods come with a premium budget, with manned security running at a cost typically of some £300 per day. Nor is it possible to guarantee that every inch of a property is monitored. An increasingly adopted solution is Ad Hoc Property Management’s Smart Tower Security System and Smart Alarm System. Ad Hoc’s Smart Camera Security Tower sits six metres tall with a 36x optical zoom magnifying distances of up to 150 yards Ad Hoc Smart Camera Security Haringey Council contacted Ad Hoc Property Management after one of its industrial sites, Rosebery Industrial Estate in London, was repeatedly being targeted by fly-tippers over the course of many years. Every time the property was dumped with waste, it was costing the council hundreds of pounds to have their waste contractor called out to clean-up. By November 2017, they had expensed literally hundreds of thousands of pounds. By the end of the month the first Ad Hoc Smart Camera Security Tower was deployed, since then costs and incidents have plummeted. In fact, there have been no major incidents and local residents and tenants alike are delighted, welcoming the improved local environment. Ad Hoc’s Smart Camera Security Tower sits six meters tall with a 36x optical zoom magnifying distances of up to 150 yards, and a 12x digital zoom to enhance optical performance. Using state-of-the-art SMART technology (the same technology used in monitoring US Defense Center, The Pentagon), the tower boasts a 360 degree camera which can be programmed to move zones at set intervals for 24/7 monitoring. Utilizing wireless technology, the camera is able to filter large objects from those that are small, ensuring the alarm is only triggered when there is a clear threat. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK" Ad Hoc's Property Security Solutions “Open land is one of the biggest targets for waste dumping, but it doesn’t have to be. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK, preventing anti-social behavior and, more importantly, reducing opportunity for property-related crime,” said Darren Tubb, General Manager, Ad Hoc Security UK Limited. Land owners aren’t the only ones who can benefit from Ad Hoc’s security solutions; property owners of retail spaces, industrial buildings and homes who traditionally look at hiring in security guards, can benefit too, deterring fly-tipping and other anti-social crimes. As it stands, if a property is fly-tipped and no one is caught, it is the responsibility of the property owner to remove the waste legally at their own expense, which means hiring in a company licensed to remove these materials. However, as more property owners become aware of the technology available to them through Ad Hoc, not just in protecting the property but in helping police to identify the culprits, we could see property damage and fly-tipping become a thing of the past.
As Philadelphia beat New England at U.S. Bank Stadium, fans were able to enjoy the spectacle safely, in part thanks to Lenel. As the host of major national and international events, U.S. Bank Stadium in Minneapolis, Minnesota counts on Lenel to provide advanced security systems that help protect fans attending some of the world’s leading sporting events and concerts. Lenel is part of UTC Climate Controls & Security, a unit of United Technologies Corp. Working in such a high-profile venue, Lenel teams are constantly adjusting systems to maintain a high-level of security. Lenel’s OnGuard security management system has been a vital hub in the $1.12 billion stadium’s comprehensive, layered security plan since the first event in July 2016. In addition to major events, which can hold 66,000 people, the stadium routinely hosts a range of other activities for area residents such as college baseball, distance running and inline skating. The Lenel team helped us create a comprehensive system that works exactly as we drew it up" Integrated Security Bill Langenstein, director of event services for U.S. Bank Stadium venue manager SMG, said OnGuard’s integration of systems helps defuse potentially dangerous situations. “I don’t know of another platform capable of integrating the number and size of disparate systems we have in this stadium,” Langenstein said. “The Lenel team helped us create a comprehensive system that works exactly as we drew it up. The result is we are more efficient and proactive.” The OnGuard system acts as the single platform integrating access control with: More than 400 surveillance cameras monitoring seating areas, concourses and exterior perimeters Visitor management systems checking identifies at delivery gates Video intercoms protecting doors on high-value rooms More than 250 intrusion system alarm points protecting retail shops and ticket windows A real-time incident management system safeguarding attendees and staff Incidents such as an altercation in the stands or a door improperly left open generates a real-time alert for the security team"Pre-Defined Alerts Alex Housten, Vice President and General Manager of Fire & Security Products – Americas, said the incident management integration was critical as it provides stadium security with pre-defined alerts from all systems. Alerts are received in the command centers or on smartphones or tablets carried by patrolling guards. “Incidents such as an altercation in the stands or a door improperly left open generates a real-time alert for the security team,” Housten said. “The OnGuard system helps guards take immediate action. And with the entry of a few keywords, other types of events can be added to the alert list.” Secure Viewing Experience Housten credited the Lenel Custom Solutions Group with seamlessly integrating the incident management system with the OnGuard platform. The group designs, develops and delivers software solutions to create custom solutions often by automating third-party integrations. Langenstein said it’s vital that his team be able to perform their duties at the highest standard as many stadium events draw tens of thousands of fans and millions more television viewers. “We strive to execute our jobs flawlessly,” he said. “It helps to be on the cutting edge of technology. With the Lenel integration, we know we’ll be ready to provide a memorable and secure experience no matter what type of event guests attend at U.S. Bank Stadium.”
To improve safety and instil a tranquil environment for citizens of Lagos de Carrasco (Carrasco Lakes), this residential community in Uruguay invested in a new monitoring system based on video management software from Milestone Systems. Milestone Systems open platform IP video management software (VMS), is helping the lakeside community of Carrasco Lakes in Uruguay to benefit from better security control. Previous multiple standalone systems were not efficient enough. The new networked solution allows ongoing expansions with more cameras and video analytics. Located to the east of Uruguay’s capital Montevideo, Lagos de Carrasco stretches across two islands, and is known for its beautiful houses perched on the lakes’ shores. However, because the semi-private residential community can be freely accessed through city streets, the topic of security is of keen interest to its residents. A few years ago, as the neighbourhood began to grow, the area’s residents decided to invest in updating its video surveillance. Considering its location and conditions, with certain factors like humidity, electrical currents and the physical difficulties surrounding cable extensions, the system that was formerly installed deteriorated over time. This lead to a negative impact on the quality of the surveillance images, as well as to the stability of the system in general. We installed an IP network system that connected to several of the power supply points and featured a wireless connection that stretched across both islands" Installation of IP cameras and XProtect VMS Lagos de Carrasco worked with Milestone Partner Foxsys to execute the modernization project. Its commercial director, Juan Martín González, explained: “In light of the situational requirements, we installed an IP network system that connected to several of the power supply points and featured a wireless connection that stretched across both islands. This was in addition to acquiring new cameras and a video control system in the height of the project.” The previous system’s cameras, roughly five years old, were removed and replaced with about 34 IP cameras manufactured by HikVision and Arecont Vision. With the goal of combining each of these technologies and their new functions, Lagos de Carrasco chose the video management software XProtect Professional from Milestone Systems. Reduced Bandwidth González manages the system bandwidth with the software configuration. “All the security cameras are IP based, and we depend on failover redundancy with the video. It’s a big challenge to work with restricted bandwidth, and XProtect Professional allows us to optimize it, lower our consumption in real time and maintain the best recording resolution possible.” Surveillance is performed in two ways: from the central neighbourhood security office and remotely, from security company BLITZ’s main headquarters. Jaime Márquez, director of BLITZ and manager of security at Lagos de Carrasco, adds that the previously implemented systems were a complex challenge for the operators. “With the introduction of Milestone Systems software, we could optimize the concentration of CCTV personnel, immediately observe different incidents and qualify the seriousness of them. What’s more, we’re now able to conduct pre-analyses to prevent potential crime through the identification of people and/or actions,” says Márquez. This is a complicated situation, seeing as there have been several intrusions specific to the area" Video Analytics For Tresspasser Identification The initial investment is the first of three stages that the Lagos de Carrasco community has planned – another stage focuses on expanding to the farther most western perimeters of the neighbourhood, potentially adding 20-25 additional cameras. “This is a complicated situation, seeing as there have been several intrusions specific to the area. Due to a lot of vegetation and precarious conditions, it faces some larger technical challenges,” González explains. The third and final stage involves integrating different video analytics through Milestone Solution Partners. These include prowling detection methods, identifying trespassers in restricted areas and registering them, identifying and recognizing license plates, as well as establishing alerts for license plates not belonging to any of the residents that enters the neighbourhood.
Ellams, a global manufacturer and supplier of telephone scratch cards based in Nairobi, Kenya, required a foolproof security solution, integrated with access control and video surveillance for their manufacturing units. Matrix provided Ellams with an Integrated Access Control solution comprising of Card based Entry and Exit Readers. Established in the year 1977, Ellams primarily started off as a Security Documents Printer and Business Forms Manufacturer. In the year 2001, Ellams started off with the new venture of developing Telephone Scratch Cards for local telecom and cellular operators. Ellams has two manufacturing units based in Nairobi that supply secure pre-paid scratch cards to Central, Western, Eastern, and Northern Africa. Security being crucial for Ellams with respect to its manufacturing unit, the company was on a look out for a vendor who could meet the below mentioned requirements. Challenges: Dual verification of credentials at main entrance Allow entry or exit to a user in an employee zone if a guard is present in his cabin Guard does not leave while employees are present in an employee zone Keep a check on employees’ movements – whether they enter after gaining access or not, etc. Access Control in each department Pre-defined number of users allowed in a department When a user enters an area, the event is recorded till he/she leaves Generate alarm on violation of access rules Solutions: Web-based access control solution with card-based entry and exit readers Integration with beam detector for checking user availability in an area after entering the premises Man-Trap feature to open one gate at a time Employees allowed access only if guard is present Occupancy control to ensure defined number of people are allowed in the respective zone Camera remains on in presence of employees in a respective zone and turns off in their absence Instant alarm notification to take immediate action upon violation of access rules Benefits: Improves security with integrated solution Real-time alarm notification helps take immediate action upon violation of access rules Ensures the guard continuously monitors entry and exit of employees Products: COSEC DOOR CAP - RF card based premium door controller COSEC PATH RDCE – EM proximity card-based reader COSEC PANEL LITE- Site controller for multiple door controllers COSEC CENTRA GE- Application software for 100 users, expandable up to 500 users COSEC GE ACM- Access control module for COSEC CENTRA GE
Round table discussion
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?
Healthcare organizations are an important vertical market for many security manufacturers and integrators. Like other vertical markets, healthcare has its own unique set of requirements and challenges for physical security systems. We asked this week’s Expert Panel: What are the distinctive security problems faced by healthcare organizations? What technologies are being embraced to increase security?
College campuses often operate like small communities – or even like large communities depending on enrollment. Although each college and university campus is unique, there are commonalities such as a young and vulnerable population of students, many living away from their parents for the first time. Campuses can be urban or rural, geographically dispersed or densely populated, with a variety of demographics and “wild card” elements such as partying, drugs and alcohol. Campus police and security officers face a variety of challenging environments. Is it wise to add firearms to the mix? Is it necessary for campus police to be armed? Specifically, we asked this week’s Expert Panel: In what situations should college or university campus police be armed?