Hikvision, an IoT solution provider with video as its core competency, has announced a brand-new addition to its DeepinView camera line: the Dedicated Subseries. This unprecedented new addition loads a batch of AI-powered deep learning algorithms into each unit, boasting stunning performance and cost-effective pricing. Dedicated DeepinView Cameras Over the last few years, Artificial Intelligence (AI) has been applied in many ways in security markets. As technology advances, AI chipset performa...
Allied Universal, a renowned security and facility services company in North America, announces the availability of distance screening solutions as companies continue to launch their ‘return to workplace' initiatives. Distance screening solutions Allied Universal Technology Services experts are working with customers to design and implement the screening solutions that best fit their company's environment, requirements and existing security operations. The screening solutions include sta...
Videonetics announces that it has joined the Qualcomm® Smart Cities Accelerator Program to provide their AI and Deep Learning powered Unified Video Computing Platform™ (UVCP) to diverse industries such as smart cities, aviation, enterprise and manufacturing to name a few. To exhibit their features and functionalities, Videonetics will be implementing their end-to-end video management system and AI enabled video analytics in conjunction with Qualcomm Technologies enabled smart cameras...
Dahua Technology, a globally renowned video-centric smart IoT solutions and services provider, has announced the release of DMSS, its newly designed mobile client. DMSS can connect Dahua products via the Internet or Ethernet through P2P or IP, and can also be operated remotely. It supports all kinds of product types, including NVR, XVR, IPC, TPC, VTO, Alarm Hub, and Access Control, etc. Remote operations DMSS can work in an environment with multiple internet connections. It connects Dahua prod...
Matrix Comsec has confirmed its participation in the Virtual Exhibition on Railroad Equipment from 1st July 2020 to 31st August 2020. Matrix will be showcasing its complete range of Enterprise IP-PBXs, Unified Communication Server for Modern Enterprises, IP-PBX for SMB & SME, VoIP & GSM Gateways and a new portfolio of IP Communication endpoints. Matrix has indigenous and innovative range of solutions for Unified Communications, IP Video Surveillance, Access Control, and Time-Attend...
Dahua Technology, a globally renowned video-centric provider of smart IoT solutions, has announced the launch of SafetyTemp (DHI-ASI7213X-T1), a thermal temperature monitoring station. This easy-to-deploy solution quickly measures skin temperature without the need for personal contact and provides an accurate temperature reading to help businesses and schools assess employees, customers, students and other visitors for elevated body temperature. SafetyTemp thermal temperature monitoring statio...
ISC West 2020, scheduled to take place from October 5th to October 8th 2020 in Las Vegas, Nevada, has been canceled due to industry and market circumstances. While the organizers cannot convene in person in 2020, Reed Exhibitions, along with Premier Sponsor, SIA (Security Industry Association), will transform ISC West 2020 into an all-virtual event that has been scheduled for October 5th to October 7th, 2020 to serve the security and public safety community. ISC West 2020 event canceled During this time of major change and transformation in the U.S., the ISC West community of security integrators, installers, dealers and consultants, along with corporate, government and law enforcement/first responder practitioners, have frontline essential services and mission-critical responsibilities. Amidst travel and budget restrictions, security industry professionals and solution providers are playing a major role in serving regional communities, as businesses are working on re-opening and re-designing facilities in order to ensure public health and safety across all cities and communities. Connecting via digital programs and virtual events We look forward to continuing to help the ISC West community engage via digital programs, resources and connections" “While we are very disappointed to not be able to meet face-to-face this year in Las Vegas, we look forward to continuing to help the ISC West community engage via digital programs, resources and connections. Our team, along with our valued venue partner, Sands Expo and Venetian, is working on detailed planning and protocols for ISC West 2021, which will take place March 23-26, 2021,” said Will Wise, Group Vice President, Reed Exhibitions. Pierre Trapanese, Security Industry Association (SIA) Chairman said, “We at SIA sincerely regret not being able to meet face-to-face in Las Vegas in 2020. We know the importance of ISC West to our community and know that we have a responsibility to our industry to adapt during this period.” ISC West 2020 Virtual Event Pierre adds, “We will continue to provide our members with timely information and resources on an on-going basis. We look forward to producing a great virtual event with the ISC team, anchored by a compelling SIA Education@ISC conference program delivered in a dynamic format in October.” “We will be rolling out additional information on the ISC West 2020 Virtual Event very soon, including formats for education, discussion groups, matchmaking, showcased solutions and technologies, plus elements to celebrate the security community, and support our charity partner Mission 500 and their key role in helping kids and families in crisis,” stated Mary Beth Shaughnessy, Event Director of ISC Security Events. ISC East 2020 event under continuous assessment She adds, “Regarding ISC East 2020, our smaller scale, more regional-focused event slated for November 18th to November 19th, 2020 in New York City, we will be assessing event viability over the next 8-10 weeks with guidance from the Javits Center, New York State and New York City authorities.” Mary further stated, “We will continue to consult with SIA, with the ASIS NYC Chapter, and other Northeast regional association supporters, along with our loyal community of attendees, speakers and exhibitors. Our security community is committed and resilient and we look forward to continuing to rally and adapt with everyone to chart the course forward.”
Videonetics, the globally renowned Artificial Intelligence (AI) & Deep Learning (DL) powered Unified Video Computing Platform development firm, has announced the appointment of David Wedel of Vanter LLC as the company’s Manufacturer’s Representative in the United States of America. In his new role as Manufacturer’s Rep. in the US, Mr. Wedel will be instrumental in expanding business along with fostering company’s network of system integrators and channel partners, throughout the country. Integrated video, IoT and AI solutions expert In the course of his career, David Wedel has held positions at GE (General Electric), Cisco, and Sony among others Wedel is principal at Vanter LLC with over 30 years of experience in technologies applied within the security industry, and integrated solutions sales and marketing. Having built and led sales teams capable of highly technical sales involving video, communications, networking, IoT and AI, Wedel has successfully driven revenue and built relationships with end-users and channels alike. In the course of his professional career, David Wedel has held positions at GE (General Electric), Cisco, and Sony among others, and has an affinity for emerging technologies having been involved in several pre- and post-revenue start-ups. Video computing platform “I am excited to join the Videonetics team and to represent them in the Americas. This unique video computing platform anticipates today’s needs and was architected at its inception to meet them and more,” said David Wedel. Commenting on the appointment, Dr. Tinku Acharya, Fellow IEEE, Founder & Managing Director (MD) at Videonetics expressed, “We are delighted to have David Wedel as part of Team Videonetics to expand business in the Americas. He has remarkable industry-wide connections and hosts incredible energy and drive.” Dr. Acharya adds, “His thorough understanding of the American security market will help us to position Videonetics' cutting edge products and solutions to many growing opportunities across the region.”
Panasonic i-PRO Sensing Solutions, which was established on October 1, 2019 and formally operates as Panasonic i-PRO Sensing Solutions Corporation of America (PIPSA) in the United States of America, is changing its global brand to i-PRO. i-PRO branding The new i-PRO branding reflects a significant change in philosophy relative to the company’s go to market strategies, product and integrated system offerings, and reseller and technology partnerships. Comprised of the professional security surveillance, public safety, and medical imaging business units in the U.S., i-PRO will continue to build upon its expansive portfolio with new technologies and advanced AI-driven software and analytics that complement its best-in-class imaging technologies and edge products, and further build on a history of innovation and leadership that spans over 60 years with Panasonic. Innovative technologies and solutions i-PRO is more than just a new company name or brand. It represents a significant shift in vision for our organization globally" “i-PRO is more than just a new company name or brand. It represents a significant shift in vision for our organization globally, and the innovative technologies and solutions we currently have and will be introducing moving forward to support it,” said Bill Brennan, President, Panasonic i-PRO Sensing Solutions Corporation of America (PIPSA). “We are a more versatile and agile company that can establish and implement new strategies and market specific programs and technologies faster and more efficiently to deliver solutions that set new benchmarks in performance with higher ROI and lower TCO. This is the new i-PRO.” i-PRO is comprised of the following business units: Professional Security Surveillance, offering comprehensive IP and analog video surveillance, access control, and analytics solutions for professional applications that combine best-in-class hardware, management and control software, and deep learning AI analytics. Public Safety, providing advanced video solutions for law enforcement applications including next generation body worn cameras, in-vehicle video systems, evidence capture and management software, and intelligent analytics such as facial redaction to protect personal privacy. Medical Imaging, delivering high-performance cameras designed specifically for medical imaging devices and systems, and other industrial applications. Integrated solutions “By clearly focusing on these three core markets and working hand in hand with our dedicated channel partners, i-PRO will deliver new and innovative integrated solutions that meet today’s most demanding challenges with a forward-looking perspective to address tomorrow’s needs.” “And we will work in lockstep with our headquarters in Japan to address the specific needs of our customers in the U.S., while remaining close partners with Panasonic, a key investor in i-PRO. We hope you join us on this exciting journey and engage in the new i-PRO experience. Our future is brighter than ever,” concluded Brennan.
Paxton Access is introducing free customized learning course, new products and a brand-new guide to assist installers in helping their customers ensure their buildings are COVID-secure. The initiative has been designed in line with the CDC and OSHA best practices and recommendations. In a new, 45-minute webinar, Paxton will show installers how to match their security offering with the ‘practical considerations of how to operate safely in the workplace’. A globally renowned manufacturer and provider of access control solutions firm, Paxton is also launching a new release for Net2, specially developed to support social distancing. Aiding enterprises to resume operations Like many installers, Paxton recognizes they have an important role to play in helping companies across the country update their buildings and reopen their businesses safely and securely to support the economy. As a global manufacturer with over 35 years expertise in securing buildings, the route for Paxton is always through educating their trusted network of security installers to deliver genuine solutions for the real world. Paxton’s recent series of webinars have seen over 2,700 installers attend. Importance of access control in protecting people Access control plays a key role in helping ensure buildings are COVID-secure" Gareth O’Hara, Chief Sales Officer at Paxton said, “As a manufacturer of technology, in partnership with installation companies, we have an opportunity to positively contribute to protecting people against COVID-19 infection.” Gareth adds, “Access control plays a key role in helping ensure buildings are COVID-secure. At present, thousands of buildings across the country are implementing new measures according to CDC and OSHA recommendations. Right now business owners are strategizing on how to safely transition people back to offices and work environments in a secure way.” Implementation of Net2 solutions He further said, “Our message to security installers is: Please don’t wait. We want them to start becoming familiar with the guidance and Net2 solutions and support their customers in making their buildings COVID-19 secure. From the webinar, to the supporting technical information, to the new Net2 release and free customer guide, we believe they will have everything they need.” Paxton’s team of researchers has been thoroughly reviewing the CDC and OSHA recommendations to ensure the most relevant, up to date information is shared with their customers. The result is a webinar packed full of useful advice to help installers reach out to their customers with confidence. The session covers 4 key areas: Contactless entry & exit – Hygienic access, move away from touch-based devices Flexible access permissions – Meet social distancing guidelines, limit high traffic and apply one-way flow of movement Occupancy management – Control and monitor people numbers in any given area and support social distancing Thermal scanning – Use cameras to ensure health and wellbeing in high security areas and identify people that could be at risk, quickly Occupancy Management As part of the new plan, Paxton is introducing an Occupancy Management feature in Net2 As part of the new plan, Paxton is introducing an Occupancy Management feature in Net2 and various improvements to integration with thermal scanners to give installers the best options for safe, secure access. Due for release in July 2020, Net2 Occupancy Management allows you to limit the number of people in any given area; either barring access or sending an email/text to the building manager when a space nears capacity. It works across multiple areas of a site and can be set to operate a one in, one out system to support social distancing measures. Adam Stroud, Paxton CEO said, "We understand the important part that access control has to play in managing the flow of people around a building to support a hygienic environment. In addition, controlling the density of people in any given area is a valuable tool to help businesses of all types to become 'COVID-secure'.” Net2 access control system Adam adds, “Net2 access control system is widely used in the U.S. and so we developed the new Occupancy Management feature to meet this specific need. For new and existing Net2 customers we hope that this new functionality helps the efforts that we are all making to observe social distancing and keep people safe." Paxton has also created a useful digital guide for end-users which explains in easy terms what to ask their installer to make their building COVID-secure. Ensuring buildings are COVID-secure Our new COVID-secure with Net2 customer guide should help anyone, even if they have no knowledge of access control" Katie Millis-Ward, Divisional Director of Communications said, “We genuinely want to help our installers help their customers. Providing insight into the variety of best practices and recommendations to make it simple for both the installer and the end customer is something we are ready to do.” She adds, “There’s a lot of information for businesses to digest to make buildings safe and we hope we have broken it down into a digestible format so people can get started with confidence. Our new COVID-secure with Net2 customer guide should help anyone, even if they have no knowledge of access control.” Guide to COVID-secure Buildings with Net2 webinar Paxton Access Ltd. offers a vast product range that includes IP technology, wireless and battery powered access control solutions to provide reliable security for any site or building requirement. The company is well positioned to offer both the installer and the end-user with innovative access control solutions to make their lives easier. Paxton Access Ltd.’s new webinar, the Guide to COVID-secure Buildings with Net2 starts on June 30, 2020 and runs each Tuesday and Thursday until July 16, 2020.
The Partnership for Priority Verified Alarm Response (PPVAR) is pleased to announce Tom Nakatani, IT VP of Customer Monitoring Technology for ADT, has been elected President. Nakatani officially began his two-year term at the June 10th PPVAR member’s meeting after serving as Vice President. He succeeds Joey Rao-Russell, President and CEO for Sonitrol-Kimberlite, who will now serve on the PPVAR Board as an immediate past President and Treasurer. “I am honored to take on the role of PPVAR President and to work with the distinguished and influential group of industry thought leaders, public safety leaders, and key partners on our Board of Directors,” said Tom Nakatani. Changing verification technology use Tom adds, “The use of verification technology is fundamentally changing the relationship between the alarm industry and public safety for the better. We’re thrilled to be involved with the development of industry standards that will provide more actionable information for first responders. This information will improve officer safety while prioritizing their impact.” Tom Nakatani also sits on the Board of Directors for the Security Industry Association Nakatani started his career at ADT in 1991 and has held a number of positions with the company including global monitoring technology, monitoring standards, program management, operational reporting, M&A, and product delivery. He also sits on the Board of Directors for the Security Industry Association and participates on a number of industry and regulatory committees. Promoting the value of verification As PPVAR continues to work toward its mission of promoting the value of verification during the dispatch process, it is expanding the composition of its Board of Directors to increase the number of public safety representatives. This change will ensure that the PPVAR board will represent a balanced team of professionals with excellent relationships across both public and private sectors as they work together on the issues related to alarm response process. Three of the public safety and partner members were introduced and spoke at the virtual meeting, including: David L. Holl is the Director of Public Safety for Lower Allen Township, PA. Director Holl oversees the police department, emergency medical services, is liaison to two Township volunteer fire companies, and serves as the municipal Emergency Management Coordinator. He sees his involvement in PPVAR as a way to directly impact false alarm issues and is looking forward to influencing the future of responding to emergencies. Frank G. Fernandez, is the retired Chief of Police from Miami and Hollywood Police. He is the former Director of Public Safety and Assistant City Manager for the City of Coral Gables, Florida. He is currently president of Blueprints 4 Safety (B4S) Strategies Group LLC, a security and risk assessment consulting group specializing in vulnerability assessments, strategic planning and best practice policing/public safety strategic development. He chose to become involved in PPVAR because he sees the opportunity to increase situational awareness for police when responding to emergencies and to bring awareness to his public safety colleagues about the alarm industry. John Chiaramonte is President of Mission Critical Partners’ Consulting Business where he leads more than 80 dedicated and specialized public safety professionals in improving his clients’ emergency response outcomes. He is a subject matter expert in emergency communications, 911 and next generation 911. One of his goals in participating with PPVAR is to improve emergency response outcomes as new technology brings changes to emergency dispatch centers. Strengthening public safety partnership With a bold vision for the future for PPVAR, new President Nakatani plans to continue to build on the work of the previous presidents by helping improve collaboration with public safety and other partners. This vision for the future includes expansion of the PPVAR Board, educating public safety and industry members, creating a framework for alarm verification scoring, and collaborative work with PSAPs to incorporate the next generation of technologies.
ASIS International, the globally renowned association for security management professionals, has announced its decision to move Global Security Exchange (GSX) 2020 to a fully virtual experience, titled Global Security Exchange Plus (GSX+), which includes more than 80 industry renowned education sessions, a robust exhibition marketplace, and unique peer-to-peer networking opportunities. Global Security Exchange Plus Following months of careful evaluation of the risks associated with convening an event of 20,000 professionals from across the globe during the COVID-19 pandemic, ASIS leadership concluded that transitioning GSX to a virtual-only environment for its 2020 event was the correct course of action, in the best interests of its members, attendees, speakers, exhibitors, and the public. Previously scheduled to take place from 21-23 September 2020 in Atlanta, Georgia, USA, the new online GSX+ will bring together a global audience with live and on-demand features from 21-25 September 2020. Virtual-only experience “Launching GSX+ as a virtual-only experience will provide our members, exhibitors, sponsors and others with a one-of-a-kind approach that will advance security worldwide,” says Godfried Hendriks, CPP, President of the ASIS Global Board of Directors. Godfried adds, “While circumstances dictate that we must forgo an in-person meeting this year, we are excited for GSX+ to deliver to a wider global audience the exceptional security networking, marketplace, education, and training that truly set GSX apart. There is a growing demand for a comprehensive experience that helps the entire security profession learn and grow together.” Fully virtual forum for the global security community GSX+ will deliver every element of a live event in an online environment GSX+ will deliver every element of a live event in an online environment: Community, Content, Commerce, and Connection. GSX+ provides a new, fully virtual forum for the global security community to connect and engage with live discussions on the most pressing industry issues, CPE-eligible education sessions, a robust marketplace, and peer-to-peer networking. Unlike other security-industry events, GSX+ is produced by ASIS International, the world’s renowned association for security management professionals. By the industry and for the industry, GSX+ is where a global audience of top professionals and partners showcase their knowledge, products, and services through an easy-to-use, safe, and secure platform. Workplace violence and behavior detection Topics of education sessions will range from workplace violence and behavior detection to return to remote work, pandemic lessons learned and well-being of security personnel. “We are pleased to unveil our new GSX+ model, which will deliver the same number of CPEs as GSX, more accessibility with a lower cost to participate, and will live online for several weeks after an initial 5-day live event,” Peter J. O’Neil, FASAE, CEO, ASIS International. Peter adds, “It’s never been more important for organizations to focus on risk management and business continuity. GSX+ offers a new way for professionals to come together, discover new technologies and approaches, and dive into important discussions around global best practices.”
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyze the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognizing and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognizing and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behavior analytics Behavior analytics is another field of analytics based on artificial neural networks. Even if recognizing suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and license plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specializing in VMS and modular AI analytics at ISC West 2020. Even if recognizing suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and licence plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyze employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works VMS analyzes the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognized the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognize all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specializing in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specializing in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning "We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customization during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a cellphone credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cybersecurity, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasizing “cybersecurity by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cybersecure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
Recycling Lives is a very special business. Ostensibly a recycling and waste management operation, they actually use this commercial element to support and sustain charity programs for offender rehabilitation, residential support and food redistribution. It’s a genuinely effective approach to social aid, and one that has earned four prestigious Queens Awards and numerous admirers, including Andy Moore, managing director of security and fire experts ADJ Fire & Security Limited. ADJ works with Recycling Lives to provide technology-based solutions to minimize risk at its sites. Residential accommodation “The whole company’s called Recycling Lives, because that’s what it does,” Moore explains. “It gives people a second chance, people who have come out of prison or who are homeless, and they help them back into society. It’s providing help to people who really need it, by giving them jobs and if necessary rehoming them if they need somewhere to stay until they get their own place. They’re a special company, definitely. ADJ is extremely proud to be associated with a company like Recycling Lives.” Recycling Lives has sites across the UK was founded, and is run, by second generation recyclers, time-served experts with a wealth of industry knowledge, insight and contacts. Their charity and social enterprise teams provide residential accommodation for the homeless, help to reduce reoffending and redistribute food, directly supported by recycling, recruitment, compliance and waste management businesses. As a result, they create more than just environmental and financial value from their activities: they provide significant social value too. Thermal imaging technology Specialist cameras are designed to detect even minor changes in temperature using thermal imaging technology At the Recycling Lives site in Preston, on Longridge Road, ADJ was asked to help devise a solution which could help the Recycling Lives staff prevent and detect fires on-site during and out of office hours, explains Moore. “These fires can happen within waste piles on site, and can end up burning inside without any notification,” he says. “They can seriously flare up when the pile is disturbed. There are batteries stored on site from depolluted cars and these can also be a serious fire hazard if ignited.” ADJ Fire & Security is a Hikvision Gold VASP partner, and works closely with Hikvision to devise intelligent and efficient smart technology-driven solutions for its clients. In this case, ADJ, Hikvision and Recycling Lives collaborated on the development of the ideal system for Recycling Lives’ specific requirements. ADJ recommended the use of Hikvision’s Thermometric thermal bullet cameras, specifically the DS-2TD2136T-15 model. These specialist cameras are designed to detect even minor changes in temperature using thermal imaging technology. Fire detection and alarm function The camera uses cutting edge image processing technology, including Adaptive Automatic Gain Control, Digital Detail Enhancement, 3D Dynamic Noise Reduction, and a Noise Equivalent Temperature Difference of less than < 40mk. The thermal imaging module provides 384 x 288 resolution, a high sensitivity sensor, and supports contrast adjustment Its powerful behavior analysis algorithm enables automatic smart detection including Line Crossing, Intrusion, and Region Entrance & Exit, and it also provides a reliable temperature exception alarm function and advanced fire detection algorithm. Temperature measurement range is -20℃ to 550℃ with ±2℃ accuracy. The thermal imaging module provides 384 x 288 resolution, a high sensitivity sensor, and supports contrast adjustment and shutter adjustment in various modes. There are 15 palettes of adjustable color available, and because this is a thermal imaging camera rather than a conventional CCTV device, there’s no need for additional lighting. Nineteen thermometric cameras were installed initially at the Preston site, with more set to be added in future. Prevention and early detection of fire “Cameras are located in the high-risk areas where fires could break out such as the plant rooms and stockpiles, shredder, and depollution areas,” Moore says. “When the cameras detect an increase in temperature that signifies a potential fire risk, they automatically raise an alarm and alert the client to the issue. That allows them to take action much more quickly than relying on traditional video or other forms of fire detection – they can react immediately even to the risk of fire breaking out.” Recycling Lives compliance manager Dave Gallagher says: “The prevention of fire, and early detection of any fire that may break out, is of critical importance to protecting our people, infrastructure and the local environment. While our risk controls have proved effective year after year, the opportunity to invest in new technology that enhances our ability to react fast in the event of an emerging fire hazard was one that was not to be missed.” Commercial properties fire safety The results have been tangible, Moore says, and have impressed some influential people. “Recycling Lives recently had a visit from the Environmental Agency as part of a routine inspection,” he says. “The EA were impressed with the standard of risk management and controls on the site, including the recent investment in fire detection technology. As a result, the EA Director of Regulated Industry was invited to site to view the systems in place.” The success of the Preston solution has prompted Recycling Lives to engage ADJ to implement similar systems, over time, at all their other sites across the country. Dave Gallagher says: “We’ve been impressed with how ADJ Fire & Security Ltd and Hikvision have worked collaboratively with us to identify how the technology can best be employed to reduce risk and look forward to the enhanced protection the system provides. ADJ Fire and Security Ltd are adaptable, commercially aware and completely comprehend the commercial realities of the scrap metal industry. They are reputable, reliable and respected by local authorities and institutions and moreover, they are a pleasure to work with.”
Multiple Construction sites in the Albuquerque area are managed by Shumate Constructors, Inc., an Albuquerque, New Mexico-based construction contractor, that is also renowned for building educational facilities. In addition to building schools from the ground up, Shumate Constructors completes school additions and remodels. Construction site thefts Three years ago, the company began having problems keeping thieves out of its construction sites during non-working hours. Unwatched construction sites are hot beds for a variety of thefts - from copper pipes and wire to hand tools to heavy-duty machinery. The loss of machinery, such as front-end loaders, would cost hundreds-of-thousands of dollars. Sometimes workers will arrive to a site in the morning only to find materials, such as copper pipe, gone along with their tools. Enhancing construction site security The sites also presented a challenge due to changing construction conditions The result is the loss of a whole day and sometimes multiple days of work. On top of the lost time, the contractor has to cover the cost of replacing materials, file an insurance claim for each theft and complete additional administrative paperwork that they weren’t planning to invest time in. The sites also presented a challenge due to changing construction conditions. Equipment or storage containers are delivered and removed, the sites are graded/re-graded and as sections of build were completed, tools, materials and supplies were moved to different areas. Flexible, reliable wireless solution At a contractor trade show a few years ago, Mark Shumate, President of Shumate Constructors met Dave Meurer, President of Albuquerque’s Armed Response Team. Meurer introduced Shumate to the idea of a flexible, reliable wireless solution that could continually monitor the entire site without the need to trench around the perimeter. “Mark [Shumate] was fed up with theft at his construction sites so we started to discuss some prevention ideas,” said Meurer, adding “I knew this was a great fit for the combined Inovonics transmitter and Optex sensor solution.” Optex sensors installed He further said, “At the Armed Response Team, we refer to this solution as the never sleeping, non-blinking eye. Shumate was not aware of any reliable solutions that could provide this type of theft prevention, but we explained that we were very confident in this application and he was definitely interested.” To install each combined sensor, the Armed Response Team attached the Optex sensors to a freestanding steel post with a base plate on it and deployed them throughout the site. This allowed the flexibility to be easily moved to accommodate site changes. Once installed, a signal was easily achieved. iSeries Optex/Inovonics sensors The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary The sensors in the combined solution often need to communicate as far as an entire city block and the perimeters can be several thousands of feet. The iSeries Inovonics/Optex solution was able to easily accomplish this feat. The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary. For some sites, it can be as few as a dozen, and others it can be as many as 30 or more. “Together, the products offer a great solution,” noted Meurer, adding “The Optex sensors can handle varying weather conditions and Inovonics’ wireless connectivity offers less signal drop and more consistent reporting signal than any of the other transmitters we’ve tried.” Efficient perimeter security solution “Between the perimeter technology by Inovonics and Optex, and the Armed Response Team’s follow-up, we have seen zero thefts for all projects since installation. With the integrated wireless solution, the construction sites are monitored on a real-time basis and immediately notify the Armed Response Team upon unauthorized access,” said Mark Shumate, President of Shumate Constructors. He adds, “We look at the perimeter security solution as a great investment. Annually, the cost of manpower, replacement of lost or stolen items and damage repairs could easily cost three times more than we spend on Armed Response Teams’ services with the Optex and Inovonics solution.”
Burglaries from outdoor ‘smash and grab’ have been costing retailers millions of dollars of loss. In order to detect if someone is trying to penetrate retail store buildings, retailers need to deploy a detection system that triggers activity and activate cameras and authorities. Redscan RLS02020S detectors Utilizing the OPTEX Redscan RLS02020S vertical mode detection with Genetec RSA allowed the national retail company to achieve just this. OPTEX installed first 12 stores for a total of 105 RLS-2020S detectors for the initial project. Redscan covered the sides of the buildings as well as key areas of the roofs where needed. It was integrated into the Genetec RSA plugin that unifies OPTEX Redscan detectors with cameras creating full control of video recording and security events. Enhancing retail security Next opportunities are for installing RLS-2020S at 100’s of stores across the United States in 2020-2021. Due to the success of Redscan, the national systems integrator is now introducing the value of this application for other large retail end users.
When Broome County, in the US State of New York, took the decision to upgrade its public safety radio network, it required the highest quality video surveillance system to safeguard its US$ 23 million investment in critical infrastructure. New radio network Working with Integrated Systems, a solution combining networked Axis cameras, illuminators and radar motion detectors, with Qognify’s Ocularis video management system (VMS) was installed, to deter, detect and respond to unauthorized activity, at each of its nine new radio towers. The new radio network replaces a system that was in place since the 1970’s and improves communications for police, fire, along with other emergency services and public works departments for the municipalities across the county. 24/7 security monitoring Each of the radio tower sites required a combination of networked PTZ and fixed cameras" Such mission critical infrastructure requires reliable round-the-clock security monitoring, so Integrated Systems was approached, for its reputation in the delivery of technology solutions to government and industry, to specify and install a new video surveillance system. President of Integrated Systems, Mark Hamilton, explains, “Each of the radio tower sites required a combination of networked PTZ and fixed cameras, as well as radar motion detection to provide comprehensive coverage that would ensure any unauthorized activity would be swiftly detected, automatically recorded and alerts triggered, to initiate a timely and appropriate response.” Axis camera and radar detection technology Axis camera and radar detection technology was chosen for interior and exterior use at each radio tower site and the award-winning Ocularis to provide the all-important integration. Hamilton adds, “Early in our engagement with Broome County we urged them to migrate from their disparate video surveillance architecture, whereby VMS, NVR and DVR systems were all being managed individually across the county.” He further said, “Our recommended solution was a single unified, IP-based system that was county-wide sanctioned. To achieve this, we specified the Ocularis VMS from Qognify.” Ocularis video management system Ocluaris is a VMS that is ideal for large-scale projects such as Broome County, with an emphasis on tactical real-time operations and live visualization, it is supported by full system redundancy and 24/7 availability. Integrated Systems were impressed by Ocluaris’s rich feature set, intuitive user interface (including visually mapping of the entire camera estate) and impressive scalability. What’s more with Axis as a Qognify Technology Partner it instilled the confidence Broome County needed to switch to a more unified approach to video surveillance. PTZ and fixed cameras installed All surveillance camera footage is recorded and centrally archived at the County Data Center Using Ocularis, authorized personnel at the Central Security Building and Emergency Management Services Center have 24/7, 365-days access to live and archived footage from every camera at each of the nine sites. The PTZ cameras installed give a 360-degree view of each radio tower site, while fixed cameras monitor the tower yards main gates and shelter doors. Meanwhile, the radar motion detection system guards the perimeter. All surveillance camera footage is recorded and centrally archived at the County Data Center via the county’s microwave data network. “If any suspicious activity is detected an operator can rapidly view, review and replay all relevant footage through Ocularis,” explains Hamilton. Use of video analytics and visual maps To aid the speed of response, the operator also benefits from the use of visual maps to rapidly determine what cameras are available across each site, as well as video analytics to minimize time required to trawl through footage to identify activities of interest. Broome County has been impressed with the Axis and Qognify solution, which has also been integrated with its existing county-wide video network that includes street cameras, buildings and mobile video command systems. The success of the project has been recognized with a prestigious Security Solutions Award. Hamilton concludes by saying, “Qognify’s Ocularis is now the lead VMS that Integrated Systems specifies whenever embarking on a new video surveillance project.”
Welch Sand & Gravel, a family-owned operation serving the Cincinnati, Ohio region of the US. Welch harvests gravel and sand from the water and transports all the material via hundreds of feet of conveyor to be processed and delivered to all its construction customers. The 500 plus feet of conveyor is riddled with an array of copper and metal wiring that yields big dollars on the market, making it quite vulnerable. The surrounding rural area is extremely challenging to protect, as it includes multiple acres and many access points, including the water. Optex photoelectric beams installed Sonitrol of Butler County was brought in to provide a solution to Welsh's security needs. With the assistance of Optex, Sonitrol designed an outdoor security system that was comprised of hardwired and wireless Optex photoelectric beams to secure the property. All of the Optex Beams were connected to various pan-tilt-zoom (PTZ) cameras on the property Optex’s 200 ft. battery-powered, wireless photoelectric beams were strategically placed to provide perimeter detection along the property line and not allow access to the desired wiring on the conveyer belt. In addition, interior traps were placed to provide back-up protection to Welch Sand & Gravel. All of the Optex Beams were connected to various pan-tilt-zoom (PTZ) cameras on the property, and Sonitrol of Butler County now provides 24-hour monitoring of all the cameras. Optex - Sonitrol monitored solution The moment an Optex beam detects movement, the PTZ cameras are activated and the Sonitrol Central Station immediately views the activity on site. The operator can quickly assess the situation and dispatch the proper authority if necessary. The Optex security/Sonitrol monitored solution has saved the customer thousands of dollars in loss and hundreds of dollars a month in guard service costs. Since the system was installed, no additional loss has been experienced on the site.
Vera Cadillac, a renowned automotive dealer in the Fort Lauderdale area of the US State of Florida was looking to install an advanced security system to counter the growing threat of sophisticated thieves - sophisticated enough to know how to circumvent the current security system and steal parts, tires and in some cases, complete cars. Vera’s current security system included inexpensive CCTV cameras with video motion sensors that proved ineffective in deterring theft at the dealer’s showroom. The sensors were installed on the outside of the fenced perimeter, making them susceptible to being vandalized. When the sensors were disabled, the thieves were able to penetrate the perimeter and strip cars for parts. The speed in which the thieves were stealing car parts and accessories was another tough obstacle to overcome. Tyco - Optex integrated security solution Vera chose Tyco Integrated to come up with an improved, flexible system that takes into account the many obstacles within the perimeter. This includes wildlife, vegetation and other physical obstacles. In addition, the system needed to be as vandal proof as possible. Tyco Integrated and Optex teamed up to provide a flexible, effective system of detection that would use high-mount, zone detectors as trigger devices for the American Dynamic Illustra IP400 CCTV system. SIP infrared sensors - Inovonics wireless network integration The team created a design that would easily integrate Optex’s REDWALL Wireless SIP infrared sensors into Vera’s current Inovonics wireless network (used for building automation systems). The Redwall sensors would trigger PTZ dome cameras that are fixed within the area of detection The Redwall sensors would trigger PTZ dome cameras that are fixed within the area of detection. The result will capture and record any intrusion within the sensor’s zone. The intrusion event is now tracked by ADT’s Central Monitoring Station and alerts the authorities along with a Vera contact. Masking of surrounding obstacles The REDWALL SIP sensors allowed Tyco Integrated to easily adjust and account for wildlife, vegetation and other physical obstacles by simply masking those areas. Masking deletes these obstacles within the protected perimeter of the detector. Because the old system was susceptible to vandals, the team had to address this. The team installed the sensors behind the fence and over 9 feet high on the side of the building in accordance to specification. Effective intrusion detection All-in-all, the plan included 12 SIP units mounted on four buildings, which were installed in a single day. Vera Cadillac effectively maintains a secure perimeter that detects intruders from stealing auto parts and other property. In addition, the system was easily integrated into Vera’s current wireless network and is vandal proof. It provides Vera Cadillac peace-of-mind that a system is in place to prevent such incidents from happening during the night-time and can respond with quick efficiency to catch criminal activity.
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Network cameras: Manufacturers & Suppliers
- Axis Communications Network cameras
- Dahua Technology Network cameras
- VIVOTEK Network cameras
- Hikvision Network cameras
- Arecont Vision Network cameras
- Panasonic Network cameras
- Messoa Network cameras
- Sony Network cameras
- Basler Network cameras
- Hanwha Techwin Network cameras
- Vicon Network cameras
- LILIN Network cameras
- Bosch Network cameras
- Pelco Network cameras
- FLIR Systems Network cameras
- eneo Network cameras
- Surveon Network cameras
- IDIS Network cameras
- Brickcom Network cameras
- Visionhitech Network cameras
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload