Network / IP security
Senstar, a provider of video management and perimeter intrusion detection solutions, is pleased to announce the release of Senstar Symphony 7.3. The award-winning Symphony delivers an all-in-one solution for video, security, and information management. Symphony works with cameras from all major manufacturers, scales to deployments of any size, and is easy to use and configure. With built-in support for video analytics, perimeter intrusion detection sensors, and access control, Symphony is a hig...
Genetec Inc., global technology provider of unified security, public safety, operations, and business intelligence solutions, has announced its attendance at International Security Expo (ISE), taking place at Olympia, London from 3 - 4 December 2019. Genetec security solutions at ISE Genetec, recognized as a renowned international vendor of Video Management Systems (VMS), will be demonstrating its wide array of tools that enable government, law enforcement, CNI, transportation providers...
The technology partnership established between BlueBox Video and Hanwha Techwin means that images captured by Wisenet Full HD, ultra-high definition 4K and 360 degree fisheye cameras can now be cost effectively displayed on and across a video wall, as well as on a desk top PC monitor. The successful integration of Wisenet WAVE Video Management Software (VMS) with professional grade video wall controllers manufactured by BlueBox provides an affordable control room solution for a wide range of ap...
MOBOTIX, the manufacturer of premium-quality and secure IP video systems, will showcase its latest advancements in Internet of Things (IoT) video surveillance technology at ISC East from November 20-21, at the Javits Center in New York (Booth #760). Furthering its mission to go ‘Beyond Human Vision,’ MOBOTIX will be showcasing the new MOBOTIX 7 Platform and the award-winning M73 camera that uses it, along with the company’s flagship Mx6 IoT series and MOVE line. Artificial in...
Redvision’s all-new, analog X-SERIES, rugged dome uses Sony’s next-generation, 2MP, STARVIS sensor. It directly replaces the previous RVX30 analog model and will be available to order under the same model number from November. “Many security-integrators consider Redvision’s X-SERIES™ to be the industry benchmark, rugged dome camera,” explained Paul Hucker, Director of Redvision. “With several analog components being phased out by suppliers, we were unde...
Delta Scientific, a manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announced that its new bolt down DSC7090 beam barricade has passed its crash test garnering an ASTM M30/P1 rating. That means the DSC7090 will stop a 15,000 pound (6800 kg) truck going 30 mph (50 kph) with negative 6.3 feet (1.9 m) of penetration. Raising in only five seconds and lowering in merely two seconds yields a fast cycle rate of over 100 vehicles in and out per h...
HID Global, global provider of trusted identity solutions, has announced that it has collaborated with Temenos, the banking software company, to integrate HID’s risk-based authentication solution with Temenos Infinity, a breakthrough digital front office product, and Temenos T24 Transact, the next generation in core banking. The joint offering, available on-premise or in the cloud, provides an agile, simplified path to secure digital banking, reducing the time and cost of delivering risk-based adaptive authentication, threat detection, and transaction signing on the Temenos platform. As part of the integration, HID Global’s authentication solution can now offer self-service functions to over 3,000 Temenos customers through Temenos MarketPlace. Temenos MarketPlace Temenos MarketPlace serves as an online store, where Temenos curates the most innovative fintechs Temenos MarketPlace serves as an online store, where Temenos curates the most innovative fintechs and connects them with financial institutions from around the world. HID Global’s authentication solution for Temenos customers combines its ActivID Authentication Platform with the HID Risk Management Solution featuring real-time risk profiling technology. It also includes HID Approve, a next-generation multi-factor authentication solution for online and mobile banking customers. HID Approve combines the security of public key-based cryptography and mobile-based out-of-band transaction signatures with the convenience of mobile push notification. HID Approve public key-based cryptography solution “HID has partnered with Temenos for more than a decade to provide solutions for nearly 100 banks worldwide,” said Brad Jarvis, Vice President and Managing Director of Identity & Access Management Solutions (IAMS) with HID Global. Brad adds, “This latest collaboration streamlines banks’ ability to implement advanced user authentication services with Temenos Infinity and Temenos T24 Transact. The pre-configured integration makes it easier than ever for Temenos customers to deploy out authentication tools without any customized development.” Risk-based authentication HID Global’s three plug-and-play components for risk-based authentication are tightly integrated with Temenos Infinity and Temenos T24 Transact. They provide several key capabilities that enable existing financial institutions and new digital startups to better facilitate secure digital banking: User profiles are automatically synchronized to the multi-tenant HID Authentication service when new accounts are created in Temenos T24 Transact. Administrators manage user authentication in Temenos Infinity. The solution handles all authentication administration tasks including management of the user device and credentials, in addition to displaying user authentication events and audit logs directly within Temenos Infinity. The HID Risk Management solution enables customers to protect their financial transaction systems and banking applications using a combination of evidence-based threat detection capabilities with behavioral biometrics supported by machine learning. Countering rapid increase in cases of financial fraud Banks need to protect their customers as well as retain them and improve trust"“As more and more customers bank through digital channels, incidents of fraud naturally increase and the ramifications to both bank and consumer can be massive,” said Adam Gable, Product Director – Financial Crime Mitigation, Treasury and Risk, Temenos, adding “Banks need to protect their customers as well as retain them and improve trust. Using a combination of innovative technologies and techniques, HID’s risk-based authentication solution means customers benefit from improved security at the source of the financial transaction – the device. Adam further stated, “The solution is a great addition to the Temenos MarketPlace, pre-built to work with the cloud-native and cloud-agnostic Temenos Infinity and Temenos T24 Transact. With this integration, Temenos customers will benefit from reduced cost and complexity of integration, while gaining access to a greater variety in security options.” Multi-Tenant HID Authentication Service “We are very excited to see our long-standing relationship with HID further strengthened with the introduction of this risk-based user authentication solution,” said Paul Roberts, Director – Temenos MarketPlace. “In today’s digital banking world, this solution brings essential protection and additional peace of mind for both banks and their customers.” The multi-tenant HID Authentication Service includes interoperable Application Programming Interfaces (APIs) to allow for standard integrations with third-party software and supports easy scalability, testing and deployment.
Arecont Vision Costar (AVC), the industry pioneer in IP-based megapixel camera technology and video surveillance solutions, has named experienced sales provider Geoff Stoliker as regional sales manager for Northern California and the Pacific Northwest Region. “Geoff brings a wealth of security industry knowledge to Arecont Vision Costar, which will be appreciated by our growing customer base across the region, including his own extensive customer and partner contacts,” said Kyle Parker, Vice President, Americas Sales. “I’m confident Geoff will make an immediate impact, having experience with our original Arecont Vision MegaIP products, and already fully conversant with the other components of the Total Video Solution, including our advanced ConteraIP cameras, cloud-enabled ConteraVMS, and cloud-managed ConteraCMR recorders.” Cyber-secure hybrid cloud surveillance system Total Video Solution delivers cyber-secure hybrid cloud surveillance system, integrated with megapixel cameras" The Northern California and Pacific Northwest Region is international in nature, including Northern California, Northern Nevada and the states of Alaska, Idaho, Oregon, Montana, and Washington in the USA. The Canadian provinces of Alberta and British Columbia are also part of the territory. Mr. Stoliker is supported by two manufacturer’s representative firms in the region – Axiom Technologies for the Pacific Northwest, and Badger Reps for Northern California and Northern Nevada. “Our Total Video Solution delivers a powerful, cyber-secure hybrid cloud surveillance system, integrated with the industry’s best megapixel cameras, and easily accessible from a range of devices from just about anywhere” stated Mr. Stoliker. “I look forward to bringing this outstanding solution to the attention of new and existing Arecont Vision Costar customers throughout the entire region.” Focus on video surveillance Mr. Stoliker’s career includes 21 years security sales assignments across industry manufacturers through to distributors, all with a focus on video surveillance. He previously served from 2009 – 2014 with Arecont Vision Costar’s predecessor company, familiar to his customers and partners as a knowledgeable and trusted advisor. “I’m thrilled to add Geoff and his sales acumen to this large, critically important portion of our region,” said Steve McGlasson, regional sales director. “Customers and partners will immediately appreciate the benefit of his knowledge and expertise, working in conjunction with our manufacturer’s reps, inside sales, and field application engineering teams.”
Siklu, global provider of Fixed 5G millimeter wave (mmWave) technology for Gigabit Wireless Access, Smart City and security networks, has announced a plan to accelerate the introduction of Siklu Terragraph products. The Siklu Terragraph family is being announced at TIP Summit ‘19, in Amsterdam. Terragraph is a gigabit wireless technology designed by Facebook. mmWave units and Smart City deployments Siklu, with more than 80,000 mmWave units sold and more than 225 Smart City deployments, is recognized as the most experienced mmWave vendor in the rapidly-growing Gigabit Wireless Access sector. Siklu’s Terragraph product line represents the company’s third-generation 60GHz multipoint solutions Siklu’s Terragraph product line represents the company’s third-generation 60GHz multipoint solutions. Coupled with their extensive line of point-to-point E-Band (70/80GHz) and 60GHz point-to-point and multipoint products, Siklu also offers a complete line of advanced software applications for planning, designing, deploying, and operating extensive Fixed 5G and Smart City mmWave networks. Deploying large-scale mmWave networks “We are excited about bringing to the TG ecosystem our wealth of experience in building and deploying large-scale mmWave networks,” said Ronen Ben-Hamou, CEO of Siklu. “This announcement represents a substantial acceleration of the introduction of our TG, 60GHz Fixed 5G systems and brings Gigabit-speed connectivity to data-impoverished communities across the globe.” With this accelerated plan, Siklu expects to be in initial field trials in Q1 and commercial deployments in by mid-year 2020, continuing its leadership in Fixed 5G mmWave with the largest portfolio of solutions on the market.
Code Blue Corporation is pleased to announce a number of upgrades and additions to its catalog of industry pioneering emergency communication solutions to provide even more options to customers looking to improve safety and security at their location. CB 2-e Help Point solution upgrade As first exhibited at the Global Security Expo 2019 (GSX) in September in Chicago, USA, the CB 2-e has been redesigned to make it easier to install and more economical. One of Code Blue’s most popular wall-mounted Help Points, the CB 2-e will feature a lightweight, two-piece design that makes installation and maintenance easy for a single person. Additionally, CB 2-e delivers a 4-inch depth that is slim enough to be ADA compliant on any wall, making it an ideal match for high-traffic areas like parking garages and building entrances. Code Blue also is announcing the release of the CB RT, a durable, freestanding pedestal CB 4-s hooded call box The CB 4-s, Code Blue’s hooded call box, and the former CB 6-s, which will now be known as the Surface Mount Enclosure, have been updated as well to be lighter and more economical without sacrificing any of the durability that is synonymous with all Code Blue products. Code Blue also is announcing the release of the CB RT, a durable, freestanding pedestal that can reliably house either the IP5000 VoIP or IA4100 analog hands-free speakerphones. For more than 30 years, the trademarked cylindrical design of Code Blue’s signature pedestal Help Points has served as an easily identifiable means to reliably request assistance at the touch of a button. S-1000 LED Beacon/Strobe light The addition of the CB RT and its rectangular design offers another simple and cost-effective option to effectively install communication devices. Available in either wet- or power-coated paint, the CB RT is 9 feet tall and features Code Blue’s powerful S-1000 LED Beacon/Strobe light that is easily visible in open areas and large campus settings. “These improvements are a direct response to feedback from customers, who need economical choices that are easy to install, but also are durable, visible and reliable,” Director of Distribution, Code Blue Corp., Katie Petre said. “Code Blue prides itself on being the industry leader in quality and customer service, and these upgrades make reliable safety even more obtainable and attractive for both new and existing customers.” Code Blue’s new features and products will be available to order starting January 1, 2020.
Tamworth-based trade association, DHF (Door & Hardware Federation), has, this week, launched its CSCS-approved card partner scheme in collaboration with the Automatic Door Suppliers Association (ADSA). The DHF CSCS card provision is for those who work with industrial doors, domestic garage doors, automated gates & traffic barriers and metal or timber doors. CSCS cards for construction workers “While not a legislative requirement, CSCS cards are supported by the government and provide proof that individuals working on construction sites have the appropriate training and qualifications for the job that they are doing,” explains DHF’s Commercial Manager, Patricia Sowsbery-Stevens. She adds, “By ensuring that the workforce is appropriately qualified or experienced, the card plays a vital role in improving standards and safety on UK construction sites. Indeed, the majority of principal contractors and major house builders require construction workers on their sites to hold a valid card.” Skilled Worker card DHF is asking that anyone who is applying for a card has evidence of CPD As part of the scheme, and in addition to any criteria set by CSCS such as a relevant NVQ for the Skilled Worker card, DHF is asking that anyone who is applying for a card has evidence of CPD (continued professional development). This will usually be in the form of a valid DHF training course certificate. “Each card is specific to the requirement,” continues Patricia. “In addition to the Blue Skilled Worker card, there are several other cards available, check the DHF website for further information.” CSCS card partner scheme The launch of the CSCS card partner scheme is a further ‘feather in the cap’ for the pro-active federation who, in July of this year, announced that it is the very first UK organization to offer an official theory-based ABBE-qualification for three of the industries it serves, approved and regulated by Ofqual, the Government Office of Examination Regulation. The move was described as ‘ground-breaking’. The launch of CSCS cards is further endorsement of DHF’s drive for safety and best practice. Gordon Jenkins, Director of Operations at CSCS commented, “CSCS is pleased to see the collaboration between DHF and ADSA in the issuing of cards for the Doors sector. This collaboration demonstrates DHF’s commitment to meeting the requirements of the CLC and ensuring that construction site workers are appropriately qualified. In the process, we are all playing our part in improving standards and safety on UK construction sites. CSCS looks forward to a long and productive relationship between our three organizations.”
While Cobalt robots have been patrolling the hallways at Slack offices for some time now, the recent trip to Chicago for GSX came with some exciting news about the next phase of the company’s relationship with Slack. The company’s new integration with this industry-leading enterprise collaboration platform will help keep safety and security a priority for you and your entire office. “Slack is one of the most ubiquitous communications platforms among modern enterprises, and we see this integration as a way to bridge your digital and physical offices. The ability to communicate issues through Slack allows our Cobalt Security Service to create a more effective, productive working environment for both security and facilities management teams and the employees they serve. Real-time collaboration and issues management are key factors in mitigating risks for a more safe and secure workplace, and we’re excited to work with Slack to bring this integration to life,” said Cobalt CTO and co-founder Erik Schluntz. Safe and secure in times of emergency Accidents and threats to safety and security in a business setting can occur at a moment’s notice—with the Cobalt and Slack integration, workplaces are armed with another tool to keep employees alert, safe and secure in times of emergency. With this in mind, we’re proud to announce the launch of a new public alert integration for enterprises to identify and notify employees of safety risks as well as mitigate issues in the workplace in real-time. This integration brings all of a company’s security assets onto a real-time visibility dashboard and communication service Slack’s VP of Global Workplace and Real Estate, Deano Roberts, said, “With this new integration, security teams add the Cobalt Security Service to a shared channel within a corporate Slack workspace. Anomalies identified by Cobalt needing further analysis or review from the company populate the channel in real-time, extending the visibility of the Cobalt Dashboard into a collaborative space.” Real-time alert When Cobalt detects anything that needs escalation or further review—from an unauthorized visitor to CO emissions to a water leak—it triggers a real-time alert in a designated Slack channel. Cobalt follows all company post orders to determine which anomalies and detected events require escalation and review. If the event requires further discussion or action, companies can create new temporary channels in a workspace from the alert. Onsite security personnel can use the new channel to collaborate with each other and with the Cobalt Specialist Command Center to determine courses of action, including potential new patrol paths or public announcements and broadcasts through the robot. In the case of an emergency, such as a fire or carbon monoxide leak, security teams can activate Cobalt’s PA system and siren through the Slack integration and send Cobalt on a new patrol to monitor an evacuation. Real-time visibility dashboard This integration uniquely brings all of a company’s security assets onto a real-time visibility dashboard and communication service. Hardware, software and people — now in one place to help collaboratively monitor issues and mitigate risks onsite or remotely. This is an exciting next step on our journey, and we look forward to helping keep more company workspaces more safe and secure and furthering our mission of using robotics to be maximally helpful to the benefit of all.
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be highly functional, flexible, and convenient for organizations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The Role of the Cloud The cloud has proven to be a highly functional, flexible, and convenient method for organizations to leverage as part of their strategies to protect and modernize their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalizing on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning "We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customization during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a cellphone credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cybersecurity, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasizing “cybersecurity by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cybersecure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, announces that Planet Fitness, with the help of their preferred system integrator Adirondack Direct, recently incorporated a video surveillance solution from Hanwha Techwin and Genetec that not only enhances security but also improves operations. Each of Planet Fitness’ corporate-owned clubs throughout North America is outfitted with approximately eight to 15 video cameras that provide around the clock coverage of the parking lot, lobby, break room, the fitness area where members workout and other key areas – without invading private areas, such as locker rooms and other intimate spaces. Intelligent motion detection Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video After issuing a Request for Proposal, Planet Fitness Senior Vice President of Corporate Club Operations Jim Esposito said they tested several of the camera and Video Management Systems (VMS), but ultimately decided on Hanwha video surveillance cameras managed by the Genetec Security Center unified platform. Esposito said they wanted to use Hanwha’s 360-degree cameras in particular because they provide more coverage, yet they save in hardware expenses because fewer cameras are needed. Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video at a higher framerate with true day and night function. Built-in on-camera de-warping allows instant access to PTZ, quad view, and panorama views. Alarm triggers for the Hanwha SNF-8010 include intelligent motion detection, audio detection, tampering detection, alarm input and network disconnection. Providing bookmarks of recorded incidents A typical system setup at Planet Fitness includes placing cameras 25 feet from the wall and 50 feet apart which provides almost 2,000 square feet of coverage per camera. Club managers, regional managers and corporate employees manage the system via the Genetec Security Center which provides convenient bookmarks of recorded incidents so that – instead of time spent searching through video – events are already tagged. Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed. “We knew that Planet Fitness would need thousands of video surveillance cameras for this project and it’s very important to consider reliability and functionality as well as durability,” said Adirondack Direct Director of Security and Technology, Tim Collins. “Hanwha has the lowest customer return number and that means that they manufacture products that aren’t sidelined by constant replacement and repairs.” Video surveillance management Anyone engaging in obnoxious behavior will likely be the recipient of a Lunk Alarm and the flashing lightsCollins said Adirondack Direct has long recommended Security Center from Genetec for video surveillance management because it provides the best open-architecture platform, robust features and is easy to use. Security Center blends IP security systems within a single intuitive interface to simplify operations and empowers organizations through enhanced situational awareness, unified command and control and connectivity to the cloud. While the Hanwha-Genetec solution has provided an excellent security system – as well as protection against liability for slip and fall incidents – it’s also improved operations in multiple ways by providing invaluable business intelligence, said Esposito. Planet Fitness has a judgment-free environment for individuals who want to work out, but don’t want to have to endure the negatives so often found in gyms: loud grunts, the clanging of dropped weights and aggressive behavior. Anyone engaging in obnoxious behavior will likely be the recipient of a Lunk Alarm and the flashing lights, sirens and unwanted attention that accompanies it. Providing video evidence When a Lunk Alarm is pressed, Security Center creates a bookmark of the event Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating. In order to monitor and evaluate the use of the Lunk Alarms, Adirondack Direct has integrated the Lunk Alarm into the Hanwha-Genetec video solution. When a Lunk Alarm is pressed, Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed. Gyms typically have automated external defibrillators (AEDs) in the event a member suffers a medical emergency. At Planet Fitness facilities outfitted with the Hanwha-Genetec solution, once an AED is removed from its cabinet, a sensor is activated to shut off the music in the club to provide a calmer atmosphere. The system also creates a bookmark in the VMS and notifies managers and regional managers that an AED has been deployed. Identifying areas of improvement The Hanwha-Genetec Planet Fitness solution also provides key employee analysis that can help managers identify areas of improvement. Each facility has rubber floors that must be cleaned daily and Adirondack Direct has placed a sensor on a floor scrubber that creates a bookmark and recording in Security Center when the device is moved. Video evidence verifies whether the floor was actually cleaned or if the scrubber was just relocated. Planet Fitness management can re-orient that employee on the proper policies and procedures Each break room is outfitted with a sensor that creates a video bookmark every time the door is opened. If an employee visits too often, Planet Fitness management can re-orient that employee on the proper policies and procedures. For day to day efficiencies, video analytics can be a valuable tool. If an employee is constantly leaving the front desk to go to a storage closet for a particular item, they can make changes including moving the item closer to the front desk. Losing sales opportunities “If during an overnight shift the camera indicates that there was no motion at the front desk for a prolonged period of time, then that’s a problem,” said Esposito. “We expect someone to be in that position greeting and welcoming members so if someone isn’t there, the video can help us understand why.” A big question for Planet Fitness is have they been losing sales opportunities without realizing it? A big question for Planet Fitness – that can be answered via video analytics – is have they been losing sales opportunities without realizing it? “What we’re exploring now is a virtual line that counts the number of people that come and go in the club,” said Esposito. “We know how many people check-in. So, if a club checks in 500 people in a day, but there are 600 people that enter the door, that can be lost revenue.” Delivering a safe environment Esposito said they chose Hanwha cameras and the Genetec platform because they knew that they needed a solution that was at the forefront of technology, with the flexibility to grow with them and meet their future needs. He added the solution delivers a safe environment that is appreciated by everyone. “It’s somewhat of a security blanket for our members and employees,” he said. “They appreciate our no intimidation mantra and the fact that we have created this safe and secure environment that offers a judgment-free zone where people can do their own thing.”
Evelina London Children's Hospital has had many different brands of door entry system, as is often the case with NHS Hospitals spread across the UK. Managers at Evelina wished to have a standardized system across the wards in order to improve operating efficiency and reduce maintenance costs. Upgrades needed to be quick problem free and cost-effective. Each independent ward utilizes a self-contained door entry system to control security critical access to their busy nursing area. The Maternity Ward provides a good example of a security critical area that requires an intuitive and cost-effective system to control access with the ability of a ward receptionist to permit entry and exit via an audio-video communication link. Time and date stamping of visitors Fermax Area Manager Andy Saxton worked closely with Evelina’s nominated installation company, GBE Security Solutions, to ensure that the Fermax system design using DUOX and VEO met the hospital’s needs. Based on 2 wires system with aesthetically pleasing profiles and user-friendly features and functionality, the Fermax DUOX system with VEO video monitors was a perfect match for the hospitals requirements. Purely digital in nature, the DUOX 2 wire system functions perfectly using most types of cable which meant that it could be retro-fitted onto the existing system infrastructure, thereby avoiding the excessive costs of re-cabling. Equipped with the Photocaller function which allows for the time and date stamping of visitors, the Fermax DUOX VEO monitor delivered the ideal solution.
STANLEY Security, one of the UK’s renowned security providers, has completed a major CCTV installation for Bridgnorth Aluminum Limited, the UK's only manufacturer of aluminum flat rolled products. At 27 hectares, Bridgnorth Aluminum’s site in Bridgnorth, Shropshire is extensive. It is home to a casthouse, rolling mill, two litho centers, a multi-slitting line and finishing lines. IP CCTV system The IP CCTV system is critical to our business in terms of health and safety of our employees and site security" The company had previously been using three separate CCTV systems, each covering different parts of this large site, one of which was over 15 years old, had very poor image quality and was starting to show signs of failure. Furthermore, none of the CCTV systems had any level of redundancy, so if one failed access to those particular cameras were lost, along with any recorded footage. Steve Denton, IT Manager at Bridgnorth Aluminum, explains the decision to upgrade, stating “We needed to consolidate everything into one single CCTV system, including all of the cameras from the other three systems, and we needed to add a level of redundancy. The IP CCTV system is critical to our business in terms of health and safety of our employees and site security.” IP video surveillance Following detailed discussions with Bridgnorth Aluminum, STANLEY Security designed a new site wide IP based CCTV system, covering external areas and the perimeter of the site, along with internal areas including key indoor production spaces. The system takes advantage of Bridgnorth Aluminum’s existing IP network which is deployed in most areas of the site, negating the need to install COAX cable. Opting for an IP-based CCTV system has also enabled Bridgnorth Aluminum to make use of newer technology with better quality images, which was the key. STANLEY 2MP bullet cameras and dome cameras The cameras feed is stored in two Milestone Husky M500 Advanced Network Video Recording hardware platforms The new IP CCTV system features STANLEY 2MP bullet cameras and dome cameras, including 360⁰ dome models. The cameras feed is stored in two Milestone Husky M500 Advanced Network Video Recording hardware platforms; one of which is used in case of redundancy. Bridgnorth Aluminum is pleased with the new CCTV system as Steve Denton comments, “The image quality of the new system is streets ahead of the old system. The area of coverage is also far greater thanks to the addition of 180-degree wide angle and 360-degree cameras. The software is very easy to use and has some very useful features to aid with playback of recorded footage. The software has already helped us to retrieve footage that we would have had little chance of retrieving before.” Enhanced site security STANLEY Security has been working with Bridgnorth Aluminum since 2017 when it took over the support of the company’s existing CCTV systems. “The transition period had proved successful” states Steve, commenting on their decision to appoint STANLEY Security for this project. He adds, “The service from STANLEY has been excellent, our account manager Amber is one of a kind and always goes above and beyond for us to ensure that we receive the best service possible.”
Traka’s innovative key and equipment management solutions have been installed at a new national distribution center for a top four UK supermarket. The new distribution center, fulfills orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centers are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorized personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centers are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorized colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organizations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorized ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.
Body Worn Cameras (BWCs) are transforming policing and security around the globe, helping to create new connected officers who can stream video, access information and collaborate in real-time enabling them to operate safely and more efficiently in the field. Richie McBride, Managing Director of BWC experts Edesix, says "BWCs are now built for a connected world and are being used by officers on the front line to help prevent both criminal and anti-social behavior when out on patrol.” Importance of body worn cameras in policing Innovative solutions driving creation of connected officers who can stream and access information in real-time He adds, "Technology has transformed policing and security in recent years. New innovative solutions have driven the creation of new connected officers who can stream, access information and collaborate in real-time. BWC captured footage not only provides greater transparency of interactions with the public, but also significantly increases early guilty pleas and saves officers valuable time as they often do not need to attend court”. Richie further said, "Police officers have always been connected, either to the public and communities they serve, or with their colleagues on the street and in the control room. They have shared information and generated insights to help address common problems and protect those with common vulnerabilities. However, digital technology has now enhanced these connections, enabling officers to feel more empowered, supported and secure." VideoBadges enhance police personnel VideoBadges have been utilized by police forces across the UK for some time now. Police forces, such as the Police Service of Northern Ireland (PSNI), have utilized our BWCs since 2016 to enhance the security of both officers and the general public, and to improve training and best practice. There are now 2,500 cameras being used by over 7,000 officers covering approximately 173,000 incidents each year in Northern Ireland. The BWCs are being utilized by Local Policing Teams, Neighborhood Policing Teams, Tactical Support Groups, Roads Policing Units, Dog Section, District Support Teams and Armed Response Units. Importance of good video evidence Body Worn Video has the potential to improve the quality of evidence provided by police officers" PSNI Superintendent David Moore adds, "Video evidence puts the victims of crime first. The pilot of this technology in Foyle district demonstrated how Body Worn Video has the potential to improve the quality of evidence provided by police officers and thereby increase the number of offenders brought to justice. Video evidence provides a compelling account of events and enables the raw emotion and action from a scene to be replayed in the courts in a manner that could never be captured in a witness statement.” He adds, "It also supports accountability and transparency, both of which are key elements in increasing public confidence in policing. The introduction of this new technology is the latest example of our commitment to these principles as we continue to work together with the community to keep people safe." Head-mounted cameras Armed response and firearms teams are also being equipped with head-mounted cameras due to the fact that chest-mounted cameras could potentially obstruct an officer's view during firearms use. The Metropolitan Police recently began rolling-out 1000 head-mounted cameras, with West Yorkshire Police and North Wales Police following suit.
The city of Bologna has chosen Wisenet video surveillance cameras to help it create a smart traffic management system. Bologna is the seventh most populous city in Italy. It is at the center of a metropolitan area of approximately one million people with a diverse range of traveling requirements within a very large area. The City has always invested in traffic control and monitoring systems with the aim to make travel easier and faster for its citizens. An example of this is a centralized traffic light management system which has been in operation since 2013 and has helped reduce travel times within the urban area. Video surveillance solution The purpose was to provide a tool to allow authorities to take strategic planning measures The City wanted to invest in a video surveillance solution which would allow the monitoring of 12 vehicle access gates to the city in order to provide authorities with reliable real-time information about urban mobility. The purpose was to provide a tool to allow authorities to take strategic planning measures and optimally redistribute the traffic load on the road network. After extensive research, which included the evaluation of a wide range of possible solutions, a decision was made to procure a total of 89 Wisenet cameras manufactured by Hanwha Techwin. The implemented solution consists of cameras dedicated to vehicle counting and classification, and ANPR cameras which have been installed on strategic gates. The cameras monitor both directions of travel to allow local authorities to study the most important and strategic vehicle access flows to the city. Detecting illegally parked vehicles This is made possible thanks to the latest generation of Wisenet cameras. By integrating high image quality and advanced video algorithms, Wisenet ‘intelligent’ cameras are able to enhance the value of video surveillance by supporting mobility and security in Smart Cities. 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data, an edge based application developed in cooperation with Sprinx Technologies which facilitates the collection of statistical data about vehicle flow. By tracking the vehicles moving in a camera field of view, the application is able to provide information on vehicle counts, classification and average speed. 24 of the other cameras installed are Wisenet XNO-6120R/FNPs. These feature Roadway Licence Plate Recognition application which is able to help the local authority’s control room operators detect illegally parked vehicles and other traffic infringements. Built-In IR illumination Effective with all European number plate formats, the application has more than a 95% recognition accuracy whatever the environmental conditions, even when vehicles are moving at speeds of up to 150 km/h. The Wisenet XNO-6120R is a 2 megapixel bullet camera which is able to capture high definition images with the help of a 12x optical zoom, digital image stabilization with built-in Gyro sensor, a Defog feature and built-in IR illumination. Part of the Wisenet X camera series, the XNO-6120R features the World’s best Wide Dynamic Range (WDR), which performs at up to 150dB to produce clear images from scenes that contain a challenging mix of bright and dark areas and normally result in overexposed or underexposed images. Real time automatic incident detection The Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins The processing power of the Wisenet 5 chipset incorporated into the Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins for different applications, such as number plate recognition, vehicle counting/classification and real time automatic incident detection. Completing the camera line-up are 41 Wisenet SNP-L6233RH 2 megapixel 23x IR PTZ dome cameras which have been carefully located at major road junctions throughout the city, in order to allow control room operators to zoom in to see close up detail of any incidents. Traffic management solution “We are delighted with how easy it has been to successfully integrate the Wisenet cameras with our existing video management platform and our other supervision monitoring systems,” said Alberto Nuzzo, Head of Office 'Digital Infrastructure and Telecommunications', at Comune di Bologna, when commenting on the success of the traffic management solution. “The data captured by the Traffic Data and ANPR applications running onboard the cameras, is allowing us to far better manage the existing levels of traffic, whilst also helping us capture and store valuable data which we will be able to analyze to assist us to plan for the future. Our control room operators have been particularly impressed with the exceptional clarity of the images captured by the cameras and the data analytics capabilities of the system, which are enabling them to accurately visually verify what may be occurring and quickly take appropriate action.”
Round table discussion
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?