March Networks, a global video surveillance and video-based business intelligence solutions company, is pleased to announce a new highly scalable Linux version of its Video Management Software (VMS) that can support up to 3,000 cameras on a single server. Command Recording Software The latest release of March Networks Command Recording Software offers unparalleled flexibility and scalability for customers. In addition to Windows systems, the software now works with Linux-based Operating System...
ONVIF, the renowned global standardization initiative for IP-based physical security products and solutions company, has released Profile D, a new profile that addresses interfaces for access control peripheral devices, providing the market with an additional tool for building modern and secure IP-based integrated video and access control systems, using ONVIF. Profile D Profile D is designed to provide ONVIF interoperability for peripheral devices such as locks, credential/biometric readers, P...
Active Witness Corp., a provider of artificially intelligent, cloud-based visitor management solutions introduces its SIMA multi-factor access control system that stops unauthorized access and redefines how access control is deployed. Conventional facial recognition systems require a person to present his/her face, then search a database and present the closest match and identity. That process is slow and can lead to incorrect identity authorization and privacy concerns. Quick identity identif...
Motorola Solutions has announced it has entered into a definitive agreement to acquire Openpath Security Inc., a cloud-based mobile access control provider. Motorola Solutions expects to close the transaction by the end of the month. Terms of the transaction were not disclosed in the announcement. Openpath company takeover Openpath is a renowned company within the access control industry. Openpath’s solution makes businesses more secure with multi-factor authentication, enables a contact...
Hanwha Techwin, a global supplier of IP and analog video surveillance solutions, has expanded and updated its line-up of P series AI cameras with five new 2 MP HD models. A follow-up to the premium 4K P series AI cameras announced in 2020, the new cameras present a cost-effective entry point into the powerful world of AI-based camera technology. Hanwha P series AI cameras Hanwha P series AI cameras include license-free video analytics based on deep learning that can detect various object types...
Video wall technology expert Ultimate Visual Solutions (UVS) has announced that its UVS Lucidity video wall controller now integrates with Synectics’ Synergy command and control software platform. The move is part of an ongoing strategic partnership that dates back more than 14 years, with the integrated Lucidity/Synergy solution now being installed across multiple client sites, helping to protect people and assets across the UK. Flexible and user-friendly platform Synectics is a global...
Ringway Jacobs, a renowned highway services provider, has become the first UK fleet operation to adopt a video-enabled lone worker service that is designed to better safeguard drivers operating in the field. Ringway Jacobs’ H&S and Fleet departments teamed up with Peoplesafe and SureCam to roll-out the integrated safety solution, by using a mobile phone app that enables the benefits of lone worker protection with those of video telematics. Video-enabled lone worker service David Bonehill, Head of Fleet at Ringway Jacobs said, “Health, wellbeing and safety is at the heart of everything we do, so our aim is to provide a safe working environment for our employees at all times. We are committed to adopting industry best practise technology and processes, which is why we are rolling out the video-enabled lone worker service.” David adds, “This latest initiative, developed with our valued partners at Peoplesafe and SureCam, will not only increase compliance of our lone worker processes, but also extend and enhance the levels of protection we provide to drivers in and out of the vehicle.” Partnership with Peoplesafe and SureCam Ringway Jacobs has been using Peoplesafe’s lone worker protection service since 2016 Ringway Jacobs has been using Peoplesafe’s lone worker protection service since 2016, providing peace of mind to 300 employees that assistance is available, should they need it. The company is now taking advantage of a strategic partnership between Peoplesafe and SureCam, to integrate the service with dual-facing, connected dash cams, fitted on 163 vans and specialist vehicles last year. This will enable footage to be viewed direct from the cameras fitted on the vehicles, in the event of an alarm being raised. Lone worker protection Lone workers will scan a QR code when entering a vehicle, to register a unique ID and confirm exactly who is driving. This will enable controllers at Peoplesafe’s Alarm Receiving Center (ARC) to access audio and video, as well as incident data via its portal, when an incident is reported such as injury, illness or an act of violence. This will include footage from forward-and rear-facing vehicle cameras, providing immediate visual insight into what has happened, so the most appropriate action can be quickly taken. Video evidence for faster response Naz Dossa, the Chief Executive Officer (CEO) of Peoplesafe commented, “The added understanding provided by the video evidence means our service can act faster and respond better, when an alarm is raised. We are working closely with Ringway Jacobs to support their health and safety strategy, and best protect drivers from the risks they face, when they are working alone, especially in isolated locations or out of hours.” Sam Footer, Strategic Partnership Director at SureCam said, “By bringing together these proven technology solutions, we are offering customers such as Ringway Jacobs an effective way of not only improving safety and reducing fleet risk, but also safeguarding staff when they are in or out of the vehicle.”
photonicSENS, a pioneering supplier of single-lens 3D cameras for next-generation depth perception has collaborated with Qualcomm Technologies, Inc. to accelerate the commercialization of its industry-leading single-lens 3D camera technology. Beneficial features With a complete reference design based on the Qualcomm® Snapdragon™ 888 5G Cellphone Platform, smartphone manufacturers can benefit from dramatic enhancements in-depth map resolution for front-facing applications like enhanced face authentication, and rear-facing applications including 3D reconstruction, enhanced bokeh, one-shot macro photography with 3D-reconstruction and printing of small objects and augmented reality (AR). Qualcomm® Platform Solutions Ecosystem Program photonicSENS' single-lens 3D depth sensing solution will be a game-changer for smartphones" PhotonicSENS is part of the Qualcomm® Platform Solutions Ecosystem Program, which enables software and application vendors to pre-integrate and optimize solutions to create a premium user experience and feature differentiation for OEMs. "photonicSENS' single-lens 3D depth sensing solution will be a game-changer for smartphones," said, Ann Whyte, President of photonicSENS. Single-lens apiCAM technology "The 3D depth camera reference designs of this collaboration are based on our single-lens apiCAM technology that with a single device delivers simultaneously an RGB image and depth map to offer smartphone manufacturers the means to differentiate with enhanced photographic features, a 1.4Mpx depth map, the lowest component count, lowest cost and the lowest power dissipation, as well as the best performance in any environment.” “Snapdragon 888 is a clear leader, and we are excited to be working with Qualcomm Technologies to release our cutting-edge 3D sensing solution to market." Availability photonicSENS is presenting the reference design at Mobile World Congress 2021 in Barcelona, Spain from 28th June to 1 July in Hall 3 (3H52MR).
Altronix, the provider of power and data transmission products for professional security applications, continues to expand the company’s popular line of Trove™ Access and Power Integration Solutions. Altronix Trove™ now seamlessly integrates with Swiftlane DCU 5 Door Controllers, simplifying board layout and wire management. Systems integrators can now easily configure and deploy Swiftlane access control for up to 12 door systems. Companies are rapidly moving to cloud-based access control solutions in the remote first post COVID world. The Swiftlane and Altronix partnership now enables rapid deployment of contactless entry to offices through face recognition and mobile credentials. Remote access grants By using a combination of remote access grants for face recognition, mobile and PINs, and a cloud-based access control and wireless video intercom solution, companies can now manage primary and satellite offices remotely. Regarding multifamily buildings, package theft has become a major problem. Food deliveries are at an all-time high, increasing burden for property access. Food deliveries are at an all-time high, increasing burden for property access Technology like video-based wireless intercoms and remote unlock can now be deployed seamlessly using the Altronix-Swiftlane solution, creating user experiences that residents desire. “Our collaboration with Swiftlane streamlines the design and installation process, saving time and labor which ultimately makes projects more profitable,” said Alan Forman, President, Altronix Corporation. “In addition to the convenience and cost-efficiency these preconfigured Trove kits deliver, they can be further customized with a number of options including advanced network communications.” Access control solutions Altronix and Swiftlane pre-configured Trove kits support four and twelve door systems. Trove1 and Trove2 solutions provide scalable flexibility for custom applications, where specific power requirements are needed. “Our partnership with Altronix provides high degrees of efficiency and convenience to systems integrators and end users by expediting system deployment with assuring quality and performance.” “Altronix has a long history of delivering reliable, efficient and versatile power solutions. By combining Swiftlane's face recognition and mobile access control solutions with Altronix’s Trove solutions, we are able to deliver rapid deployment of touchless access control technology,” said Saurabh Bajaj, CEO and Founder, Swiftlane. “We look forward to further enhancing this combined offering as new products and solutions become available from our respective companies.” Altronix products are manufactured in the U.S.A. and backed by a lifetime warranty.
2N, internet-enabled intercoms, and access control systems company, has launched the new 2N® IP Style intercom with a next-generation platform supported by an Axis processor. Sleek design with a touchscreen display The 2N® IP Style sets new standards in access control simplicity, performance, and aesthetic appeal, and will meet the specific needs of owners of modern residential and office buildings. 2N® IP Style’s attractive, large 10” touchscreen LCD provides a complete, detailed view of incoming visitors. To ensure its durability, it is protected by scratch-resistant 4-mm tempered glass. Users will also benefit from the ‘smartphone-style' touchscreen display with instant response and smooth animations. In another breakthrough, the 2N® IP Style has also been designed to deliver different office and residential screen capabilities in one. In this way, it can meet the differing needs of commercial office and luxury developments. Visitor identification via WDR technologies The 2N® IP Style gives the building owner or user all the decision-intelligence they need at their door Drawing on the processing power of Axis’ Artpec 7 chip and the flexibility benefits of edge IP devices, the 2N® IP Style gives the building owner or user all the decision-intelligence they need at their door. Because of this new chipset, the intercom platform can handle multiple simultaneous full HD streams and provides a full-color picture without any artificial light. Its 5MPx camera’s incorporation of Wide Dynamic Range (WDR) technologies ensures full image quality and identification of the visitor, even in darkness or uneven lighting conditions outside. In these ways, this intercom sets a new benchmark for ease of use and building security. Fast and easy access control Based on feedback from security and installation companies, 2N has also developed a new installation mechanism for the new intercom. The patented tilt-out system allows installers to use both hands to work with the cables, making installation faster as well as easier. Michal Kratochvíl, CEO of 2N Telekomunikace, said, “The 2N® IP Style revolutionises access control for modern apartments and office buildings. The intercom incorporates the best camera, the best video transmission, and display, and has a quality user interface which can be activated by a simple tap of a smart device – all wrapped in a timeless design.” WaveKey access technology The new intercom unit allows faster and simpler access because it supports the widest range of access control technologies – including the latest and fastest Bluetooth-enabled mobile access technology, WaveKey, as well as all card technologies. It also has a smart PIN keypad. With WaveKey access technology implemented in the intercom, the 2N® IP Style supports Touch, Tap in App, and Motion modes. The Motion mode means that if a user has an authorized application on their mobile device, the unit’s camera registers any movement from that person in a 170° field of view and automatically opens the door. High building security & easy access With a certification of IP65 and IK08, the 2N® IP Style is well suited to outdoor and harsh environment applications Michal Kratochvíl added, “Developers and users of luxury homes and high-end offices expect the highest standards in building security and ease of access. We are meeting, and indeed exceeding, these needs with the new 2N® IP Style, which redefines the performance, capabilities, and aesthetic appeal of access control units.” “The new intercom draws on our 30-year record in access control unit design and unrivaled expertise in open standards integration. Through that commitment to cutting-edge devices and setting industry benchmarks, the 2N® IP Style brings together the power of Axis’ Artpec 7 processor, beautiful glass panel housing, and the speed and simplicity of Bluetooth with WaveKey access technology.” “We believe the 2N® IP Style will become the intercom of choice for forward-looking developers for many years to come. Applications The 2N® IP Style unit is designed and manufactured with a commitment to open protocols so, as with other intercoms from 2N’s portfolio, it can be integrated with the best in high-performance third-party systems. Manufactured in the Czech Republic from hard-wearing materials, and with a protection certification of IP65 and IK08, the 2N® IP Style is well suited to outdoor and harsh environment applications.
Senstar, a world pioneer in perimeter intrusion detection and video management solutions highlights its Senstar LM100 perimeter intrusion detection and deterrence system securing sites around the world. Since its introduction to the market in 2017, this innovative and versatile product has quickly gained momentum. It is currently protecting sites of all sizes – from small independent businesses to large international facilities to critical infrastructure. Perimeter intrusion detection solution “Using Senstar’s innovative accelerometer technology, the Senstar LM100 is first and foremost a perimeter intrusion detection solution detecting attempts to cut, climb or lift the fence fabric; triggering warnings and alarms; and cueing up camera systems,” said Product Manager Todd Brisebois. “Add high performance LED lighting that provides instant, visible deterrence by enabling or strobing light in the immediate area of the intrusion attempt, and you have a cutting-edge product that detects and deters intruders all while they remain outside the protected area.” Wireless network technology The LM100 reports intrusion attempt locations to the site’s security management system Consisting of luminaires mounted along the fence, the Senstar LM100 uses wireless self-healing mesh communication network technology to relay intrusion information enabling the system to operate in a coordinated fashion and resulting in robust site-wide security. When networked, the LM100 reports intrusion attempt locations to the site’s security management system to enable a directed response. Surveillance optimization Optimized for use with camera surveillance systems, the Senstar LM100 provides localized, uniform lighting along the fence line. Uniform coverage lets cameras operate with a higher dynamic range, ensuring objects and people are illuminated while avoiding the generation of dark silhouettes in front of bright backgrounds. Suitable perimeter security system The Senstar LM100 is an ideal perimeter lighting solution for customers who require low-light pollution products. Senstar can accommodate requirements for International Dark-Sky Association (IDA) approved products with its IDA option. The Senstar LM100 is easy to install and maintain, environmentally friendly, and is suitable for sites of all sizes as a standalone or complimentary perimeter security system.
According to the research report, the ‘Millimeter Wave Technology Market by Product (Scanner Systems, Telecommunication Equipment), License Type (Unlicensed, Fully Licensed), Application (Mobile and Telecom, Automotive), Component, Frequency Band, and Region - Global Forecast to 2026’, published by MarketsandMarkets, the market size is estimated to grow from USD 1.8 billion in 2021 to USD 4.7 billion by 2026, at a CAGR of 20.8%. Rising adoption of millimeter waves in the telecommunication sector is one of the main factors fueling the growth of this market. Frequency sources & related components The larger market share of frequency components is mainly due to the use of oscillators Frequency sources & related components are projected to account for the largest share in the millimeter wave technology market. The larger market share of frequency components is mainly due to the use of oscillators. The frequency sources & related components include oscillator source devices that generate 30 GHz to 300 GHz signals. The efficiency of signals generated from millimeter wave systems depends on the nature of frequencies involved, in the component manufacturing process. Telecommunication equipment The telecommunication equipment is projected to dominate the millimeter wave technology market by product. The high growth of telecommunication equipment is due to the higher use of millimeter wave components for 5G backhaul. Also, millimeter wave components are widely used in indoor and outdoor telecommunication equipment, which includes small-cell and macro-cell equipment. The millimeter wave technology for fully licensed frequencies is projected to account for the largest share by 2025, due to the high adoption of millimeter wave for devices in the fully licensed frequency band. The unlicensed band is set to grow at the highest rate due to its increasing adoption, mainly in the mobile and telecom sectors. Users are expected to use light-licensed and fully licensed frequency bands in the near future, owing to the lack of security in the unlicensed spectrum. Millimeter wave technology market for 57–95 GHz The millimeter wave technology market for 57–95 GHz is estimated to account for the largest share and grow at the highest CAGR, during the forecast period. The dominance of this frequency band is due to the high demand for this frequency band, as it serves numerous applications, such as autonomous mining, security & perimeter protection, traffic monitoring, and automated cruise control. Apart from this, the E-band and V-band are mainly used for telecom applications, which lie in the 57–86 GHz frequency band, which is projected to further increase the dominance of this frequency band. Mobile & telecom applications Mobile & telecom applications are estimated to dominate the millimeter wave technology market by application The mobile & telecom applications are estimated to dominate the millimeter wave technology market by application. The growth in the mobile & telecom segment is mainly attributed to the large-scale adoption of millimeter wave technologies in 5G mobile phones and telecom infrastructure. The consumer & commercial applications are projected to witness significant growth during the forecast period, due to the high demand for high-speed transmission of video data in CCTV devices. Major North America market share The millimeter wave technology market in North America is estimated to account for the largest share. The growth in the market is mainly attributed to the higher adoption of millimeter wave technology in mobile & telecom applications. The majority of the players offering millimeter wave technology are from this region, such as Axxcss Wireless Solution, Eravant, Aviat Networks, and L3Harris Technologies, which would propel the growth of the market in this region.
While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras Similarly, CCTV is a well-established security measure that many of us are familiar with, whether through spotting images displayed on screens in shops, hotels and offices, or noticing cameras on the side of buildings. It is therefore necessary we ask the question of why, when facial recognition is integrated with security surveillance technology, does it become such a source of contention? It is not uncommon for concerns to be voiced against innovation. History has taught us that it is human nature to fear the unknown, especially if it seems that it may change life as we know it. Yet technology is an ever-changing, progressive part of the 21st century and it is important we start to shift the narrative away from privacy threats, to the force for good that LFR (Live Facial Recognition) represents. Live Facial Recognition (LFR) We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition Across recent weeks, we have seen pleas from UK organizations to allow better police access to facial recognition technology in order to fight crime. In the US, there are reports that LAPD is the latest police force to be properly regulating its use of facial recognition to aid criminal investigations, which is certainly a step in the right direction. While it is understandable that society fears technology that they do not yet understand, this lack of knowledge is exactly why the narrative needs to shift. We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition, we respect these anxieties. However, it is time to level the playing field of the facial recognition debate and communicate the plethora of benefits it offers society. Facial recognition technology - A force for good Facial recognition technology has already reached such a level of maturity and sophistication that there are huge opportunities for it to be leveraged as a force for good in real-world scenarios. As well as making society safer and more secure, I would go as far to say that LFR is able to save lives. One usage that could have a dramatic effect on reducing stress in people with mental conditions is the ability for facial recognition to identify those with Alzheimer’s. If an older individual is seemingly confused, lost or distressed, cameras could alert local medical centers or police stations of their identity, condition and where they need to go (a home address or a next of kin contact). Granted, this usage would be one that does incorporate a fair bit of personal data, although this information would only be gathered with consent from each individual. Vulnerable people could volunteer their personal data to local watchlists in order to ensure their safety when out in society, as well as to allow quicker resolutions of typically stressful situations. Tracking and finding missing persons Another possibility for real world positives to be drawn from facial recognition is to leverage the technology to help track or find missing persons, a lost child for instance. The most advanced forms of LFR in the market are now able to recognize individuals even if up to 50% of their face is covered and from challenging or oblique angles. Therefore, there is a significant opportunity not only to return people home safely, more quickly, but also reduce police hours spent on analyzing CCTV footage. Rapid scanning of images Facial recognition technology can rapidly scan images for a potential match Facial recognition technology can rapidly scan images for a potential match, as a more reliable and less time-consuming option than the human alternative. Freed-up officers could also then work more proactively on the ground, patrolling their local areas and increasing community safety and security twofold. It is important to understand that these facial recognition solutions should not be applied to every criminal case, and the technology must be used responsibly. However, these opportunities to use LFR as force for good are undeniable. Debunking the myths One of the central concerns around LFR is the breach of privacy that is associated with ‘watchlists’. There is a common misconception, however, that the data of every individual that passes a camera is processed and then stored. The reality is that watch lists are compiled with focus on known criminals, while the general public can continue life as normal. The very best facial recognition will effectively view a stream of blurred faces, until it detects one that it has been programmed to recognize. For example, an individual that has previously shoplifted from a local supermarket may have their biometric data stored, so when they return to that location the employees are alerted to a risk of further crimes being committed. Considering that the cost of crime prevention to retailers in recent years has been around £1 billion, which therefore impacts consumer prices and employee wages, security measures to tackle this issue are very much in the public interest. Most importantly, the average citizen has no need to fear being ‘followed’ by LFR cameras. If data is stored, it is for a maximum of 0.6 seconds before being deleted. Privacy Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story. It is essential we spend more time and effort communicating exactly why watchlists are made, who they are made for and how they are being used, if we want to de-bunk myths and change the narrative. As science and technology professionals, heading up this exciting innovation, we must put transparency and accountability at the center of what we do. Tony Porter, former Surveillance Camera Commissioner and current CPO at Corsight AI, has previously worked on developing processes that audit and review watch lists. Such restrictions are imperative in order for AI and LFR to be used legally, as well as ethically and responsibly. Biometrics, mask detection and contactless payments Nevertheless, the risks do not outweigh the benefits. Facial recognition should and can be used for good in so many more ways than listed above, including biometric, contactless payments, detecting whether an individual is wearing a facemask and is therefore, safe to enter a building, identifying a domestic abuse perpetrator returning to the scene of a crime and alerting police. There are even opportunities for good that we have not thought of yet. It is therefore not only a waste not to use this technology where we can, prioritising making society a safer place, it is immoral to stand by and let crimes continue while we have effective, reliable mitigation solutions.
Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider threats all while streamlining operations to help preserve a positive passenger experience. Beyond the visual of long and winding security checkpoint lines, most travelers are unaware of the vast amounts of work that take place behind the scenes to ensure their safety. Increasing passenger numbers On top of the typical, day-to-day concerns security operators face, airports are only becoming busier. According to the United States Department of Transportation’s Bureau of Transportation Statistics, 2018 was a record-breaking year for air passenger travel. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017. As these numbers continue to increase, the demand on airport security personnel to keep people and property safe also increases. This is why the latest advancements in security technology are critical as part of a comprehensive and cohesive airport security strategy. Let’s take a look at some of these advancements and how they are helping airport security operators mitigate risk. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017 Video-based command and control Airports are operational 24 hours a day, 7 days a week, which means it is paramount (and typically mandated) to have video as the heart of modern-day security operation centers (SOC). In today’s data-focused environment, security personnel rely on a multitude of solutions and systems, which often include video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection of passengers. What’s needed is a single, unified platform with integrated event management and response The rising influx of information from these systems can often be overwhelming, and in most cases, manual processes are used to manage across these domains in an attempt to achieve a coordinated response. These manual processes are not scalable. What’s needed and is now being introduced to the market is a single, unified platform with integrated event management and response to allow security operators to maximize situational control and determine the appropriate intelligence-powered response. Real-time situation management The combination of real-time video, with information from a variety of additional sensors, devices and applications is changing the game for airport security personnel. Now, in the event of an incident, security officials can use this data to gain enhanced situational awareness of what’s happening and deliver actionable insights to efficiently and effectively respond to the incident. Through numerous information sources and security systems, airports can benefit from a modernized and enriched investigative experience for a broad and deep understanding of routine or emergency situations. Advanced analytics Analytics are a powerful resource that gives security teams the ability to discover significant patterns and obtain insightful knowledge from video surveillance data. Advanced algorithms can be the key in providing early warnings to assist in detecting threats, helping to establish a proactive security strategy. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations. Additionally, analytics can automate predefined standard operating procedures to help minimize human error and optimize resource utilization. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations Mobile reporting The Internet of Things (IoT) and ubiquitous connectivity have brought remote capabilities to airports, where instantaneous information sharing is paramount. Mobile reporting solutions allow passengers and employees to act as additional “eyes and ears”, bringing critical safety alerts to the attention of security officials. Information shared by passengers and employees can be extremely beneficial to help shed light on a security incident and enable faster and more efficient response. Some solutions even offer the ability to share video and audio with the command center through a passenger’s smartphone. Facial recognition technology Facial recognition can provide situational intelligence through detecting, tracking, and alerting on persons-of-interest A powerful and versatile security solution, facial recognition can provide situational intelligence to security operations centres through detecting, tracking, and alerting on persons-of-interest appearing in video streams across multiple sites and thousands of cameras simultaneously. These systems are capable of forensic-search recognition capabilities and can be compared against national, local or custom databases to make investigations faster and more efficient. Interest and adoption of the technology is growing, with new use cases being introduced daily. The solution is sure to become a valuable tool in the years to come. In short, airports are very much like small connected cities, featuring a landscape with a variety of assets, a wide range of stakeholders, and numerous sites that keep safety at the forefront of the public eye. However, while global risks and day-to-day challenges can be difficult for security operators to manage, today’s advanced and intelligent technologies can ultimately help improve the overall traveler experience.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com has adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimize impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilizing webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts. Helping customers remain connected Adapting to challenges of the coronavirus pandemic, Alarm.com is further investing in solutions that help customers remain connected and engaged. The company has created a resource hub called “Succeeding Remotely” that provides tools, tips and news links that partners can use to adapt their business operations. From adjusting sales and installation techniques to maintaining cellular upgrades, Alarm.com is helping partners stay connected to customers remotely, keep their teams trained, and address rapidly evolving customer concerns without rolling trucks.The company has created a resource hub called “Succeeding Remotely “Additionally, after seeing all that our partners are doing to support their local communities in need, we were compelled to highlight those efforts with ongoing videos called Good Connections, which we’re sharing with our partner community to spark more ideas and ways to help,” says Ferguson. “Though our partners have experienced varying degrees of disruption to their business, we’re inspired by their adaptability, ingenuity and resilience,” says Ferguson. “Along with establishing proper safeguards for operating in homes and businesses, our partners are leveraging our support resources more heavily, while our entire staff has worked tirelessly to deliver new, timely resources.” Do-It-Together solutions Alarm.com partners are successfully employing Do-It-Together (DIT) solutions, focusing on 3G-to-LTE upgrades, and pivoting to new verticals like commercial and wellness. Many are also streamlining their business operations and taking advantage of virtual training opportunities to enhance their technicians’ skills and knowledge, says Ferguson. Do-It-Together installs involve depending on customers to perform part or all of the installation process. Partners can send customers fully configured kits with mounting instructions, or technicians may guide customers on a remote video call. Alarm.com’s tools, training and products help partners modify remote installation options depending on each customer’s needs. End users can validate the Alarm.com Smart Gateway with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app Alarm.com Smart Gateway For example, the Alarm.com Smart Gateway can be pre-configured with indoor and outdoor cameras for easy customer installation and to reduce the likelihood of future service calls. Also, end users can validate with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app. “DIT is helping our partners continue onboarding customers and avoid backlogs,” says Ferguson. “We’ve been pleasantly surprised by the resiliency and level of future investment that our residential and commercial partners have shown in the face of adversity,” adds Ferguson. For example, a significant number of business customers have used the slow period to install systems that are typically too disruptive to put in during normal business hours. Similarly, service providers are adopting new technologies or business models, such as cloud-based access control. “They’re often saying to us, ‘I’m going to take this opportunity to make changes to improve our business,’ and have been working closely with us on training and business consulting to support their efforts,“ she says. Shift to the cloud Ferguson sees a growing preference for cloud-managed surveillance and access systems over ones that have historically been run on-premise. The technology itself is attractive, but especially driving change is the enhancement to the daily lives of service providers and customers, which have been strained during this time. “The foundational benefit of our cloud-based solution is the hassle-free, seamless customer experience it delivers,” says Ferguson. “We make this possible by taking ownership of the servers, software maintenance, firmware updates, health monitoring, and more. With cloud technology, these aspects become invisible to the customer and take a lot off their plate, which is more important than ever.” End users can take advantage of Smart Tip video tutorials to help with DIT installations, or they can use the Alarm.com Wellcam to connect with loved ones anywhere.End users can take advantage of Smart Tip video tutorials to help with DIT installations Partners can attend training workshops focused on remote installation tactics, while driving consumer interest in new offerings through Alarm.com’s Customer Connections platform. The goal is to make it simple for partners to stay connected to their customers to maximize lifetime account value. “We are well-positioned to endure the pandemic because of the strength of our partners in their markets along with our investments in technology, hardware and our team,” says Ferguson. “As restrictions slowly lift, there is cautious optimism that the residential, commercial, property management, plumbing/HVAC, builder and other verticals will recover quickly. We believe that as more partners adopt the DIT model and add commercial and wellness RMR, they will find increasing opportunities to deploy security, automation, video, video analytics, access and more throughout their customer base.”
Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernize the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and push data to the cloud. “What sets us apart is the system architecture that drives our solution,” says Brandon Davito, Verkada’s VP of Product and Operations. “Starting with edge processing, all data is instantly analyzed and processed at the camera. This enables enterprise users to scale coverage without traditional limitations like bandwidth consumption or the costs of supporting additional equipment for processing footage. Simultaneously, all footage is stored directly on each camera and can be streamed securely via Verkada’s centralized management platform to any device.” The product is simple: cameras record video, connect to the internet, and push data to the cloud Hybrid cloud architecture Verkada’s goal is to make it easy to buy, deploy and manage large-scale enterprise video security systems across hundreds of cameras and dozens of sites. The hybrid cloud architecture makes it easy to access video footage from hundreds of cameras across any platform (web, mobile apps, tablets, and AppleTV). Verkada is appropriate for any business, school or enterprise that needs a scalable, secure and reliable video security solution, says Davito. “Our system streamlines surveillance management, removes the need of supporting equipment, and is ready to use, out-of-the-box, without the need for technical configurations,” says Davito. The simplicity and scalability of the end-to-end solution is attractive to security professionals, simplifying the day-to-day of surveillance management and providing insights that drive a business forward in other areas of the organization. “This approach also allows us to provide customers with a complete experience, as we build our hardware and software to work seamlessly together,” Davito adds. Verkada does not integrate with other equipment or systems. “Taking an end-to-end approach ensures that we are able to develop and roll out features more quickly and take advantage of the edge-processing capabilities of our cameras,” Davito says. The simplicity and scalability of the end-to-end solution is attractive to security professionals Defending against IoT threats An end-to-end solution also increases defenses against threats in today’s Internet of Things (IoT) space. IP cameras have historically been some of the most vulnerable devices. Verkada cameras save time by updating automatically, and they are unable to accept 3rd party software (and the risks that come with it). Verkada partners with many of the leading channel distributors and is always recruiting new integrator/reseller partners. “The solution is easy to sell. It's a bolt-on value-add that doesn't require altering or configurations to existing infrastructure,” says Davito. “Sales cycles are also much shorter because implementation is simple and streamlined; it’s creating a lot of business efficiency.” The world of physical security is always evolving, so Verkada’s ongoing challenge is to continue delivering on the potential of hybrid cloud management of physical spaces. “We are always launching new features and enhancements, as well as ensuring the security and integrity of our customers’ environments,” says Davito. “We will look to continue to push the boundaries of physical security and deepen our use of technologies like machine learning and future advancements in video analytics and AI technologies.”
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organizers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favorite soccer team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defense & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritized, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a soccer game. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organizers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organizers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same soccer team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
HID Global, a pioneer in trusted identity solutions announced that the Arcos Bosques Torre 1 (Tower 1) has deployed its access control solutions to heighten security and better manage visitor entry. Located in the Bosques de las Lomas neighborhood of Mexico City, the center is comprised of six buildings. The complex includes two skyscrapers and is home to high-profile law firms, industrial, mining, media, and technology companies, and one of the city’s most recognized shopping centers. HID readers and smart card technologies With the help of system integrator Logen, Arcos Bosques Corporate Center chose HID Mobile Access® solutions as well as HID readers and smart card technologies for tenants and visitors to securely pass through its 16 turnstiles and use the 32 elevators that lead to their offices. The HID solutions also give tenants the choice of using their mobiledevices or physical smart cards for entry. Touchless and safe entry HID’s mobile access solution enables administrators to remotely manage credentials by cloud-based infrastructure “Accessing the building by simply presenting a mobile phone makes a lot of sense as we look for ways to eliminate touching things during the global pandemic,” said Santiago Morett, Project Manager at Servicon, facilities manager for Arcos Bosques. “HID Mobile Access has given us touchless entry and safer building security, which is more important than ever for our tenants.” Mobile access solution HID’s mobile access solution also enables administrators to remotely create, issue, manage and revoke credentials through the cloud-based infrastructure. Servicon, the facility management company for Arcos Bosques, now has continuous building access visibility through a unified, up-to-the-minute database of the tower’s tenant names, affiliated companies, and work locations. "Building security today extends not only to who has access but also to how individuals are able to enter a facility,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. “HID’s access control solutions provide the foundation for optimal oversight and control while also keeping people healthy and safe.”
Corero Network Security plc, a provider of real-time, automatic Distributed Denial of Service (DDoS) cyber defense solutions, and Juniper Networks, a pioneer in secure, AI-driven networks, team up to provide Plusnet, an organization offering communications and network services to 25,000 businesses in Germany, with their joint DDoS Protection Solution to protect its infrastructure, business, and customers within seconds of a DDoS attack. DDoS protection solution Over the past 20+ years, DDoS attacks have always been a part of the threat landscape, but their frequency, magnitude, and sophistication are constantly increasing. Plusnet, which serves 200 cities and regions of Germany, previously relied on an internal data filtering solution to analyze anomalies in traffic patterns. Plusnet needed DDoS mitigation with effective, and dynamic protection to defend its network from attack-driven outages However, this in-house solution required manual intervention, which was neither practical nor effective as attacks mounted and evolved. Plusnet needed to automate DDoS mitigation with effective, dynamic, and scalable protection to defend its national network from attack-driven outages. Impact on network performance “During the testing phase of the Juniper-Corero solution, we could immediately see a manageable stream of DDoS attacks. With the Juniper-Corero solution, Plusnet can further improve network protection without any significant impact on network performance,” said Ralf Weber, Head of Competence Center Network & Security, Plusnet. Solution highlights: The joint solution removes malicious traffic at the network edge, as close to the source as possible, delivering fast and effective protection cost-effectively. Plusnet took an active approach to thwart DDoS attacks with Juniper Networks and Corero Joint DDoS Protection, delivering real-time detection and line-rate mitigation of DDoS attacks, which can identify and block very significant attacks in seconds. Juniper Networks MX Series Universal Routing Platformswork together with Corero SmartWall Threat Defense Director to rapidly identify, precisely detect and automate mitigation of attacks. Analytics and continuous monitoring provide comprehensive visibility of data patterns and anomalies for network security professionals. As DDoS attacks continue to increase, the protection capacity provided by this solution can be expanded to tens of terabits per second. 24/7 protection from threats “More than ever before, providers need to ensure that their infrastructure and business operations are always available to deliver an exceptional user experience. This can only be achieved when security is built into the same network infrastructure that provides connectivity and extended across every point of connection.” Plusnet is a great example that leverages Juniper Connected Security to enable the threat-aware network " “Plusnet is a great example that leverages Juniper Connected Security to enable the threat-aware network, ensuring its operations are comprehensively protected 24/7 against the growing risk of DDoS attacks,” said Samantha Madrid, Vice President, Security Business & Strategy, Juniper Networks. SmartWall TDD solution “We are very pleased to continue partnering with Juniper Networks to provide a superior DDoS solution that is now protecting thousands of customers around the globe.” “The SmartWall TDD solution couples Corero’s surgically accurate, real-time automatic DDoS protection with the high-performance packet filtering of Juniper MX Series routers." "This, along with the comprehensive visibility into attacks, enabled Plusnet to implement a cutting-edge solution that can detect and mitigate DDoS attacks in seconds to protect its network and the ones of its customers,” said Lionel Chmilewsky, Chief Executive Officer at Corero Network Security.
Videoloft is bolstering its presence in the United States by hiring new U.S.-based sales staff and integrating with established brands in the US market, including Digital Watchdog, exacqVision, Vivotek, and Lorex. Cloud surveillance systems Videoloft focuses on transforming traditional professional surveillance systems into cloud-connected solutions via the Videoloft Cloud Adapter. The company was born from the innovative technology created for the Manything app in 2012, which turned old smartphones and tablets into ad-hoc DIY home-monitoring cloud cameras, and now boasts over 1 million+ user. Cost-effective cloud solution The versatile and highly cost-effective Videoloft cloud solution can serve either as a backup to local recorders or as a primary recording method, sending video footage direct to the cloud at up to 8MP resolution. Videoloft end-users have remote access to its cloud video surveillance system via the Videoloft cellphone app or web-based VMS The solution employs rigid security protocols to ensure all video is transmitted and stored securely in the Videoloft cloud, which is hosted on Amazon's AWS. Videoloft end-users have remote access to their cloud video surveillance system from anywhere and at any time via the Videoloft cellphone app or web-based VMS. It makes security systems highly proactive and personalized and instantly upgrades legacy systems with new features. Remotely installed Videoloft’s partner pricing is extremely competitive and is approximately 8 to 10 times less expensive than other cloud providers. The platform is compatible with leading brands, has an impressive feature set including video analytics and remote installation, as well as a proven ability to send video to the cloud over real-world uplink speeds. VSaaS solution Selling predominantly via the channel, Videoloft’s cloud-based VSaaS solution is rapidly being adopted by professional security dealers and systems integrators who add the Videoloft cloud to their customers’ surveillance systems. The solution is being used with exceptional results by a wide variety of users ranging from homeowners to restaurant chains, and healthcare facilities to cannabis growers and dispensaries. Available versions Videoloft offers two white label versions of their platform, with over 150+ white label solutions already deployed by national distributors and integrators. Videoloft users span 160+ countries and generate the equivalent of 25 years of video monitored by the Videoloft cloud every day.
Motor Fuel Group (MFG), the UK’s largest independent forecourt operator, has entrusted Wisenet cameras manufactured by Hanwha Techwin to help protect its major investment in electric vehicle (EV) charging hubs. With the sales of electric vehicles growing, MFG is accelerating its plans to offer the ultra-rapid, electric vehicle (EV) charging bays – up to 12 charging bays at each location - across its 900+ station network. Identifying damage via VMS Dedicated Wisenet video surveillance systems are being installed to deter and detect vandals, as well as maximize the customer experience by helping MFG personnel to quickly identify if any charging equipment has been damaged. Andrew Edwards, group infrastructure director at MFG, said, “Reflecting the wish of many drivers to own eco-friendly vehicles, we expect the sales of EVs to continue to rapidly increase year-on-year, which is why we have made a commitment to lead the market with the provision of fast, clean and 100% renewable energy.” AGE CCTV The contract to install the Wisenet systems was awarded to AGE CCTV, a division of AGE Electrical Services Ltd. “We have been installing new video surveillance solutions and upgrading existing systems at MFG forecourts for over 15 years. In all cases, we have used Wisenet cameras in line with MFG’s decision to single source cameras and recording devices from Hanwha Techwin,” said Jason Gargiulo, Managing Director of AGE CCTV. “It was just a simple matter therefore of working with Hanwha Techwin’s pre-sales and technical teams in order to specify which Wisenet camera from the company’s extensive range, would best assist MFG personnel to observe close up detail of any activity occurring at their EV charging hubs.” 5-megapixel images The QNO-8080R is a true day/night camera, equipped with built-in IR illuminators which enables to capture superb quality images Depending on the number of charging bays at each location, AGE CCTV has installed one or more 5-megapixel Wisenet QNO-8080R bullet cameras. The QNO-8080R is a true day/night camera, equipped with built-in IR illuminators which enable it to capture superb quality images regardless of the lighting conditions. It also benefits from enhanced Wide Dynamic Range (WDR) which performs at up to 120dB to produce clear images from scenes containing a challenging mix of bright and dark areas which normally results in overexposed or underexposed images. Remote access With many MFG (EV) charging sites being unmanned, authorized MFG personnel are able at any time to remotely access the live images captured by the H.265 Wisenet QNO-8080R cameras or retrieve the recorded video of any incidents. They can do so from a desktop PC or laptop by using Hanwha Techwin’s management software or conveniently via their smartphones or tablets using the Wisenet cellphone app. Complementary compression technology The images are transmitted over 4 G technologies and in this respect; the WiseStream II complementary compression technology built into the QNO-8080R is proving to be a significant benefit. Bandwidth efficiency is improved by up to 75% compared to current H.264 technology when WiseStream II is combined with H.265 compression. As a forward-looking company, MFG has never hesitated to invest in the latest technology to ensure its people, property, and assets are kept safe and that they provide the highest quality of service to the customers. MFG’s Andrew Edwards concluded, “We are delighted with how AGE CCTV and Hanwha Techwin are continuing to work in partnership to help us achieve these objectives.”
The Goffert Stadium, home to the N.E.C. soccer club in Nijmegen, Netherlands, was in dire need of an upgrade as its legacy security system had fallen into disrepair and was no longer fit for purpose. To tackle the issue, the soccer club worked with VideoGuard to deploy a Genetec system that could modernize security operations and support a phased evolution of infrastructure. The security challenge of the stadium The Goffert stadium’s original analog security system had been installed during a major renovation in 2000. It had initially served the security team well but over the years it had failed to evolve in line with the new requirements of the organizations. Upgrading its capabilities were complex and costly, while almost half of the CCTV cameras had become inoperable. Theo van Benthum, Goffert Stadium Manager, explains the issue in more depth, “The images from the old cameras could no longer be used as legal evidence. And that’s important if one really wants to be able to tackle hooligans. In addition, there is also an economic reason to have good CCTV surveillance.” “The mayor of Nijmegen demands from us that we have a good security organization and camera surveillance is an integral part of that. In matches with an increased risk of disturbances, the police come to us to watch and if they think that the camera footage cannot be used, this could have consequences for us. For example, we have to allow fewer visitors, or certain competitions may no longer take place. The KNVB (Royal Dutch Football Association) can also come with sanctions if we are imposed by the municipality.” Flexible systems with lowering costs Replacing the entire system became the only option. However, committing the budget required to fund all of the necessary upgrades in one go would be difficult. Van Benthum was also keen to ensure that whatever system was adopted had the flexibility to evolve in line with future needs. Richard Nass, the Owner and Managing Director of VideoGuard stepped in to assist the club, proposing a complete refit based around Genetec Security Center. As an open platform that supports a wide range of cameras, this provided a path for the club to take a phased approach to refresh its hardware. Helping to lower up-front costs without limiting options for future upgrades. Deployment of Genetec Project began by replacing the dilapidated analogue cameras with state-of-the-art Type 5000i Bosch AutodomesTheo van Benthum acknowledges that a project of this scale simply wouldn’t have been feasible without the input of VideoGuard and Genetec. “It wasn’t just about replacing the 24 cameras. The existing network could also no longer be used. Everything was outdated and weathered. I knew Richard Nass from the past and knew he was in the camera business, so I thought I’d give him a call. This is how the idea arose to turn our stadium into a showroom. He came up with a proposal that we could handle just fine. Now, but also in the future.” In 2018, the project began by replacing the dilapidated analog cameras with state-of-the-art Type 5000i Bosch Autodomes, which significantly improved the quality and accuracy of footage. The cameras were then connected via a new network with two Genetec Streamvault-SV-2000 servers and run on Genetec Security Center. Surveillance camera coverage was also considerably expanded in other areas, such as the fan entrances and car park, to ensure better visibility across the stadium in high footfall areas. Easy camera accessibility The interior cameras were previously run on a separate system, but now, using Genetec Security Center, staff can access every camera on-premises via a single platform, providing a more holistic view into security operations. Furthermore, Security Center also enables personnel to monitor surveillance via their phone or tablets, enabling a greater degree of flexibility, as the security personnel is no longer required to be constantly posted at a monitoring station. Speaking about the refit, Frank Scholten, Product Manager and Engineer at VideoGuard, said, “What has improved enormously with Genetec is the ease of use. For example, it is very easy to select cameras based on a map. In addition, the system can be expanded quickly and easily if necessary.” The new security system proved its worth when hooligans associated with ADO Den Haag attempted to burn down the N.E.C. training center. The new state-of-the-art cameras were able to clearly capture the scene, serving as vital evidence for the police, leading to the successful arrests of both of the suspects. Plans As Security Center is an open platform, it means the club isn’t restricted to specific hardware and can integrate whichever tools suit their needs best. Speaking about plans for the future, Frank Scholten said, “It may sound strange, but we actually think it’s a bit of a pity that the Goffert Stadium is so satisfied with our system. We do intend to use more and more opportunities in the future. For us, but of course also to be able to show other stadiums what is possible.”
Stark Property’s shared working environment sees about 150 people from 40 different companies co-working across their Panama properties. Stark Property sought to overcome the challenges of a shared working space by fostering a sense of community within the Panama buildings, streamlining processes, and ensuring a safe and secure environment for all. Panama app Stark Property worked with digital technology developers, Dynamo6, to develop the Panama app. Easy to operate, the app integrates Gallagher access control with other building functionality, including news, feeds, Wi-Fi access, and the ability to submit maintenance requests and book shared meeting rooms. Utilizing Gallagher’s Mobile Connect SDK, Dynamo6 was able to incorporate the functionality of Gallagher Mobile Connect into the Panama app, offering a one-stop shop for all things building-related. The app utilizes Bluetooth® or NFC on users’ phones to gain access via Gallagher T-Series Readers Simplified access control Integrated access control creates a simple, easy access experience for app users while establishing a safe and secure working environment. Through Gallagher Command Center, Stark Property can keep track of who is coming and going, while ensuring anyone entering the building is authorized to be there. Utilizing users’ cellphones to host access credentials means no time wasted replacing or issuing temporary cards for visitors Utilizing users’ cellphones to host access credentials means there’s no time wasted replacing lost or stolen access cards or issuing temporary cards for visitors. “People will lose an access tag, but not many people lose their phones,” says Matt Stark, Director of Stark Property. Effective communication In a co-working environment, it can be difficult to ensure important information, such as planned building maintenance or fire alarm testing, is shared with everyone in a timely manner. The Panama app mitigates this with a newsfeed on the app home screen, notifying tenants of any important information. Integrating the newsfeed with access control functionality ensures tenants stay up to date, with important information displaying prominently whenever they open the app to unlock a door. This simple but efficient method of communicating helps Stark Property adhere to their health and safety requirements by ensuring tenants are aware of any building-related issues that may arise. Efficient property management In shared working spaces, reporting building maintenance issues can be problematic, especially if there are just one or two main people from each group in contact with property managers. The Panama app offers tenants the ability to submit maintenance requests directly. By entering details of the issue, along with the capability to attach photos, requests can be reported directly to Stark Property by anyone working on site. Matt hopes this functionality will lead to Stark Property having the best-maintained buildings in town. “Often, it’s the small stuff that goes unnoticed by maintenance staff – cracks, dents, breakages. Now tenants can keep an eye out for any issues and report these to us directly. It has helped us to streamline our processes and keep on top of any issues.” Shared building resources are also managed through the app, with the ability to book meeting rooms and connect to the Wi-Fi. The future of shared spaces The app utilizes cloud technology to deliver an app that can be customized to the building space and facilities Currently, the app is only in use across the Panama properties but there are plans to roll it out across other Stark Property sites in the future. “The app is still pretty new to us,” says Matt. “We’re still learning from it and looking to see what other services we can add to it, but overall it has saved us time, made lives easier, and allows us to keep progressing as a property group by delivering better, more efficient spaces.” Using cloud technologies Igor Matich, Founder and Executive Director from Dynamo6 said, “The app utilizes cloud technology to deliver an app that can be customized to the building space and facilities. Everyone pretty much has a cellphone on them." "Connecting access to cellphones makes it easier for people to enter the building and the experience is more unique. It delivers a premium experience. Moreover, you’re more likely to remember your phone than an access card.” Igor continues, “The advantage of integrated access and the property app, particularly in a shared environment like this, is the community feel it creates. It helps foster a sense of community among tenants. We’re excited about the additional services the app brings, such as meeting room bookings, and other future developments.” Mobile Connect SDK The Mobile Connect SDK enables developers to incorporate the functionality of Gallagher Mobile Connect into a third-party app. In addition to access control, Mobile Connect includes the capability to receive push notifications on a cellphone device directly from Command Center, arm or disarm buildings, and control lighting and HVAC from the cellphone device.
Round table discussion
There is a broad appeal to the idea of using a smartphone or wearable device as a credential for physical access control systems. Smartphones already perform a range of tasks that extend beyond making a phone call. Shouldn’t opening the door at a workplace be among them? It’s a simple idea, but there are obstacles for the industry to get there from here. We asked this week’s Expert Panel Roundtable: What are the challenges and benefits of mobile access control solutions?
Perimeter security is the first line of defense against intruders entering a business or premises. Traditionally associated with low-tech options such as fencing, the field of perimeter security has expanded in recent years and now encompasses a range of high-tech options. We asked this week’s Expert Panel Roundtable: What are the latest trends in perimeter security technology?
In the past few weeks, the light at the end of the COVID-19 tunnel has brightened, providing new levels of hope that the worst of the pandemic is behind us. Dare we now consider what life will be like after the pandemic is over? Considering the possible impact on our industry, we asked this week’s Expert Panel Roundtable: Which security technologies will be most useful in a post-pandemic world?
Mobile surveillance: Manufacturers & Suppliers
Simplified Security for Utilities & Critical InfrastructureDownload
Best Practices For Migrating To An IP-based Access Control SystemDownload
Access Control: Bringing Efficiency To Your Lifts' Automatic Destination SystemDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload