Interface Security Systems, a renowned managed services provider delivering managed network, asset protection, and business intelligence solutions to distributed enterprises, introduced a new interactive security service that allows businesses to equip at-risk staff with a wearable safety device that is directly connected to the Interface Interactive 24/7 Central Command Centers. Through a partnership with RiskBand, a renowned provider of wearable live-monitored safety devices, Interface is ena...
Global MSC Security has announced that it has chosen Meningitis Now as its charity for the Global MSC Security Conference and Exhibition 2020, which takes place at the Bristol Hotel in Bristol, United Kingdom, on Monday 9th and Tuesday 10th November, 2020. The annual event for professionals operating in all areas of the surveillance industry, will help the Bristol and Avon Group (B&A Group) to meet its pledge to raise £100k, for the only charity dedicated to fighting meningitis in the...
The new Wisenet PoE extender cameras from Hanwha Techwin are designed to save integrators and end users time and money, when there is a requirement to install two cameras within 80 meters of each other. For retrofit applications where an additional camera is needed, system integrators need to simply substitute an existing Wisenet camera with a PoE Extender camera, and then re-install it at the new camera location, with both devices being able to share the same cable run. PoE Extender cameras...
Panasonic has launched a free online resource for businesses to help them to continue to learn, change and share in the ‘new normal’ work environment. Panasonic BizTalk Panasonic BizTalk brings together a series of digital talks, webinars, training and Q&A’s with Panasonic experts and partners across its entire range of business technology. Areas of interest covered include mobile computing, security, broadcast, business communication and visual solutions, as well as ind...
Maxxess Systems, a global renowned provider of event response management and collaboration systems, is pleased to announce their partnership with Seek Thermal, an advanced imaging technology company, to deliver a complete temperature screening solution to help manage health risks. Temperature screening solution Unlike stand-alone systems for temperature screening, this new complete solution helps organizations not only detect health risks in real time, but also to trigger immediate automated s...
Health organizations around the world have created the common awareness that maintaining a safe distance between people is one of the best practices to avoid being exposed to COVID-19 and in slowing its spread. Effective social distancing As various countries and regions push to reopen businesses and relax stay-at-home orders, social distancing remains an ongoing requirement. More than that, crowd density information is also considered a significant reference in managing the ‘social dist...
Arcules, a globally renowned provider of integrated cloud-based security services, has announced that it has appointed Michael Hygild as Director of Sales, EMEA, effective from July 1, 2020. The addition of Hygild to the Arcules leadership team will help to accelerate the company’s current momentum and ignite its next phase of growth. In his new role, Hygild will be responsible for strategic sales initiatives, including channel programs, within Europe. Strategic sales expert Hygild joins Arcules from Hikvision where he managed the Hikvision Europe - Nordic business unit, focusing on rapidly expanding the company’s reach and growth strategies in its early stage. Previously, Hygild led strategic sales efforts within Hikvision within the Nordic region. During his tenure, Hygild drove the development and successful execution of sales and business development initiatives to significantly expand the reach and use of the company’s solutions. ‘Sales Excellence of the Year’ award nominee He was recently selected as one of four finalists for ‘Sales Excellence of the Year’ by Business Denmark and TACK International, awarded to sales leaders who have achieved high levels of sales expertise and execution across Denmark. “Michael Hygild brings a wealth of knowledge, energy and experience to Arcules, including first-hand insight into the complexities and challenges our customers face in building the next evolution of video surveillance and security infrastructures,” said Nigel Waterton, Chief Revenue Officer, Arcules. Nigel adds, “As we expand our sales organization, Michael’s ability to go deep into markets, navigate executive and committee sales, and create exponential growth will be essential for the next phase of our expansion. The success we are having in the market has allowed us to attract someone of Michael’s caliber who represents an ideal fit to help lead our sales initiatives.” IP cameras and video surveillance solutions promoter Hygild was also instrumental in developing a security department for a European IT distributor In his nearly 20 years of experience, Michael Hygild has managed sales teams and general business operations in the video surveillance market and played a pivotal role in expanding the adoption of IP cameras for a wide range of businesses. Hygild was also instrumental in developing a security department for a European IT distributor, offering significant experience driving business from all points in the supply chain. Delivery of cloud-based services As Director of Sales for EMEA region for Arcules, Michael Hygild will help expand and grow the company’s go-to-market strategy while identifying new revenue streams for the delivery of cloud-based services designed specifically for video surveillance and security use cases. “Arcules’ ability to deliver cloud services that are simple, scalable and secure are unlike anything else in the industry,” said Michael Hyglid, adding “As we continue to see more and more organizations embrace the cloud for its ease of usability and utmost reliability, I’m excited to be helping them experience the true potential of the cloud and address the changing needs of the modern business.”
Pivot3, the globally renowned provider of intelligent hyper-converged infrastructure solutions for mission critical video, has announced a new platform for video surveillance solutions that enable organizations to do more with less in supporting their mission-critical security operations. Powered by the next generation Lenovo ThinkSystem SR655 server platform with 2nd Gen AMD EPYC processor, the new Pivot3 solutions deliver 10% lower cost per terabyte, 14% better capacity density and 100% more bandwidth than similar solutions. The result is improved camera density at a lower overall TCO for customers who consider their video mission critical. Pivot3 Surveillance Series “More and more customers are juggling how to enable better business decisions through technology, including capturing, storing and analyzing massive amounts of video data to enable real-time decision making with tight budgets,” said Kamran Amini, Vice President and General Manager of server, storage and software defined infrastructure, Lenovo Data Center Group. He adds, “Lenovo is collaborating with Pivot3 to deliver innovative solutions that empower customers with the performance they need to handle today’s fast-paced environments while eliminating their challenges.” Powered by Lenovo ThinkSystem SR655 server platform Pivot3 Surveillance Series appliances provide the performance of a dual-socket server at a lower acquisition cost With the Lenovo ThinkSystem SR655 server platform, the new Pivot3 Surveillance Series appliances provide the performance of a dual-socket server at a lower acquisition cost. The single-socket configuration also offers the potential of up to 50% savings on software licensing compared to the dual socket x86 alternative without sacrificing any performance. These savings are due to the solution’s use of one CPU instead of two CPUs. Because the Lenovo ThinkSystem servers include the 2nd Gen AMD EPYC processors they also support PCIe 4, which delivers 100% bandwidth increases compared to PCIe 3. Enhanced bandwidth for video recording With this update, customers get significantly more bandwidth for video recording and 150% increase in networking speed, with 25GbE support to enable faster video transfer from the edge to the core. The new Pivot3 solutions empower organizations dealing with the enormous growth of video to capture, store and analyze massive amounts of video data while controlling infrastructure investments. Optimized for video workloads The new solutions combine the power of the AMD EPYC processors along with Pivot3’s software optimized for video workloads to help ensure video loss and degradation never occur and video is always accessible and available. The Pivot3 solution also enables non-disruptive scalability and provides intelligent monitoring and analytics capabilities for real-time system health monitoring to maximize system uptime and reduce time to repair. Mission-critical IoT, security and video deployments AMD EPYC processors provide an additional layer of value to the new Pivot3 platforms" “The combination of Pivot3, Lenovo and AMD delivers the resilience and optimal performance organizations need to support mission-critical IoT, security and video deployments,” said Greg Gibby, Senior Product Marketing Manager, Data Center Products, AMD. He adds, “AMD EPYC processors provide an additional layer of value to the new Pivot3 platforms, empowering customers to make the most of their budgets upfront while increasing cost-effectiveness over time, critical for businesses that seek to expand their video deployments as needs evolve.” Single, modular software-defined platform The flexibility of the Lenovo ThinkSystem SR655 allows servers to be configured to support the massive processing requirements of new video analytics applications as well, meaning customers can deploy one modular, flexible software-defined platform to meet all their mixed security-workload requirements. This significantly reduces complexity and cost of ownership over traditional 3-tier proprietary systems or bare-metal servers. Enhanced security and safety measures “While video data output is growing, budgets have remained the same and this leaves security and IT professionals challenged on how to deliver on security and safety imperatives,” said Ben Bolles, Vice President of Product, Pivot3. Ben adds, “Building on more than a decade of experience creating solutions purpose-built for video and leveraging the latest in processing technologies, Pivot3 delivers the performance and economics that today’s security decision-makers require.”
Pulse Secure, a renowned provider of software defined Secure Access solutions, announced that Pulse Secure was recognized among representative vendors within Gartner’s Market Guide for Network Access Control (NAC). Pulse Policy Secure (PPS) is an easy to use NAC solution that offers extensive user and device visibility, adaptive access management, dynamic guest and IoT device segregation, and automated threat response. The solution enables organizations to gain Zero Trust control by working within their existing hybrid IT infrastructure and security ecosystem. The complete Gartner Market Guide for Network Access Control report can be obtained on the company’s official website. Network access control According to the May 2020 Gartner report: Most organizations interested in network access control (NAC) are looking to establish security of devices and users accessing the network, driven primarily by audit findings and to some degree a zero trust network security strategy. Gartner recommends that security and risk management leaders responsible for network and endpoint security should: Implement NAC solutions that integrate well with existing network infrastructure and security solutions to improve security incident response times and lower overall operating overhead for the NAC product itself. Focus primary evaluation criteria of NAC solutions on vendors’ abilities to align with an organization’s goals, such as discovery and device visibility, pre connect or post connect authentication and ease of use, more than on detailed technical comparisons across solutions. Plan a multiphase implementation effort that requires commitment from multiple teams including executives, networking, endpoint, service desk and security teams — even for moderately complex organizations. Applications across data centers Pulse Secure offers a portfolio of Secure Access solutions that provide exceptional usability, contextual intelligence and policy orchestration to enable easy, compliant user and device access to resources and applications across data center and cloud environments. Available separately or as part of Pulse Access Suite Plus, Pulse PPS is an enterprise-class NAC solution that is easy to deploy, manage and scale. Key features of Pulse Policy Secure are: Easy, phased in deployment — start with visibility, add guest, user and IoT management, and expand with stronger, granular policies for endpoint enforcement, network segregation and threat response Streamlined administration — configuration wizard, dashboard and centralize system management Popular infrastructure and security integrations — network, WiFi, NGFW, SIEM, MDM and endpoint security, as well as ICS/IIoT security tools 360-degree visibility — remote and on-premises authentication, discovery, classification and tracking of managed, unmanaged and rogue endpoint and IoT devices Combines both 802.1X and non-802.1X access controls — RADIUS, MAC auth, TNC and SNMP Agent and agentless Client — multi-mode NAC, VPN and SDP operation for end-to-end remote, cloud and on-premise intelligence and access control Granular policy engine — policy wizard with built-in user and entity behavior analytics (UEBA) anomaly detection High performance, scalability — each appliance can control up to 50,000 devices and can be centrally managed to control over 1 million devices Enhanced high availability — physical and virtual failover and support for hosting PPS in Azure and AWS Enterprise-class NAC solution “With a complete NAC solution as part of our integrated, modular Secure Access Suite, our customers are achieving significant deployment, operational and economic advantages over piecemeal Secure Access investments,” said Prakash Mana, Chief Portfolio Officer at Pulse Secure. “We are pleased to be acknowledged in the NAC market and welcome organizations and resellers to see how Pulse Secure can help enterprises realize Zero Trust Networking.” Pulse Secure’s integrated Access Suite including its enterprise-class NAC solution can be tried by visiting the company’s official website.
Interphone has teamed up with Dahua Technology, a global video surveillance specialist, to help private and public sector organizations create a safer in-building environment and experience as COVID-19 restrictions are lifted. As an accredited Dahua Integrator Partner, Interphone will have access to the latest innovations in thermal access control, temperature monitoring, people counting and flow control, which will be used to develop epidemic safety protection solutions all types of premises. Prevention and control measures “These technology solutions will assist in the identification of those persons who may be unwell, while controlling the flow of people in and out of buildings,” explains Julian Synett, CEO of Interphone Limited. Julian adds, “They will support effective prevention and control measures that will be required moving forward to protect occupants and visitors, as well as reduce the staffing requirement to carry out these monitoring and control functions at entrances and exits.” Temperature monitoring cameras Interphone will now have a range of temperature monitoring cameras available that includes free-standing, wall-mounted and integrated turnstile-mounted options. They are accurate up to a distance of three meters and to within ±0.3-0.5 degrees centigrade. They can be located at any entrance, all with easy installation and flexible deployment, to provide fast and non-contact screening, with extremely high passage efficiency. In fact, it takes just 0.2 seconds per person to identify any abnormal temperature and, if required, whether someone is not wearing a face mask. AI-powered people counting camera AI-powered people counting camera will be able to automatically and accurately calculate numbers in real-time Meanwhile, an AI-powered people counting camera will be able to automatically and accurately calculate numbers in real-time for those organizations that require limited people flow in and out of buildings. It will provide full visibility and control of the amount of people entering a building, making it possible to avoid congestion, maintain social distancing and mitigate the risk of infection and spread of the pandemic. Flow control solution When the number of people reaches a set limit, the flow control solution changes the digital signage located at the entrance, using a traffic light-style system, to automatically manage the movement of people. Anyone entering the building is alerted that the maximum capacity has been reached and asked to wait until space is available. As a result, there is no need to have added security staff located at the door to manually count people in and out of the building, which can help reduce workforce overheads and improve management efficiency. Epidemic safety protection solutions Synett further said, “With the world coming to terms with the impact of the COVID-19 pandemic, public and private sector organizations now face the challenge of how they operate in a safe, responsible and efficient manner as restrictions are lifted.” “Our epidemic safety protection solutions are suitable for any premises, so property operators and managers can take advantage of them to create a safer in-building environment and experience,” concludes Synett.
Swann, a globally renowned provider of do-it-yourself security solutions, has announced the release of the Swann Tracker security camera as well as the Swann Enforcer camera systems in 4K resolution, a perfect indoor and outdoor security solution for any home or business. The 1080p resolution Enforcer cameras are coming soon. Swann Tracker security camera The Swann Tracker security camera was first unveiled at the Consumer Electronics Show (CES) 2020 earlier this year and was named a CES 2020 Innovation Award Honoree as the world’s first compact, non-mechanical pan-tilt security camera that includes auto-tracking. The Enforcer is Swann’s latest camera that includes motion-activated, red and blue flashing lights, spotlight, siren (on 4K variant) and additional features to deter intruders. Swann has announced two new additions to their security products line. Swann Wi-Fi Tracker security camera Compact, non-mechanical pan-tilt indoor security camera – It uses innovative auto-tracking technology to track and record moving objects without physically having to pan or tilt. Auto-zoom capability – It ensures any suspicious activity is kept targeted and in-focus for up to 2 objects at once within a second camera view while the main 180-degree widescreen full-room view remains onscreen via the Swann Security app. Infrared night vision which can see in the dark up to 32ft / 10m, automatically turning on when the lights are off. Two-way audio - Greet visitors, talk to pets or warn off intruders. Easy to install - Just plug into power and connect through Wi-Fi. Swann Enforcer security systems Motion-activated police-style, red and blue flashing lights - Deters intruders, while their spotlights, sirens (4K version only), and mobile alerts ensure intruders are left with nowhere to hide. Night2Day color night vision - Available on the 1080P model, this ensures complete protection and peace of mind 24/7. True Detect Heat and Motion technology - Sensing people and cars for more reliable security monitoring and fewer false alarms. Free local storage on DVR - Up to 180 days onto a 2TB hard drive, plus the ability to upload clips to the cloud for free. “While many of us are staying home to reduce the spread of COVID-19, the need to safeguard our homes and small businesses has never been of greater importance. These next generation Swann surveillance products offer advanced features to prevent and deter unwanted intruders outside and inside the house,” said Michael (Mike) Lucas, CEO, Swann. He adds, “Swann’s latest products continue the Swann tradition of providing consumers with easy to use, reliable, home security protection and 24/7 peace of mind.” Total security control via Swann Security app These new products are part of a complete security ecosystem that can be managed under the ‘Swann Security’ app. This gives users a unique ability to control wired and wireless security devices from multiple sites, stream live video, always receive rich notifications and know what’s happening in one place. Swann is the only vendor that offers a complete line up of inter-connectable wired and wireless security solutions that is also completely integrated with Google Assistant and Alexa.
Eagle Eye Networks, the global renowned provider of cloud video surveillance, has announced the availability of a passive elevated temperature screening solution with the Eagle Eye Cloud Video Management Systems (VMS). Eagle Eye Networks will be providing a complete system via its reseller partners which includes a thermal camera, blackbody calibration unit, cloud-based recording subscriptions, and real-time notifications. Calibration unit The calibration unit is recommended by the FDA for these applications to increase accuracy The calibration unit is recommended by the FDA for these applications to increase accuracy. Eagle Eye resellers can offer solutions to restaurants, factories, warehouses, office, retailers, hotels, health care, fitness, and other industries in order to provide passive temperature screening as business resumes. “Elevated temperature screening, although not fully proven, is a potential tool to enhance people’s safety as the world resumes business. The desire to measure everyone’s temperature when entering a facility is new, but the technology was quickly integrated into the open Eagle Eye Video API platform, providing an excellent example of why an open platform is superior,” said Dean Drako, Chief Executive Officer (CEO) of Eagle Eye Networks. Eagle Eye Cloud VMS Dean adds, “You cannot accurately predict all your security system needs as the world and technology changes so rapidly. You really must have an open platform, like the Eagle Eye Cloud VMS, to be prepared.” Applications which require around-the-clock monitoring, such as passive elevated temperature screening, are best accomplished using a cloud video surveillance solution. Leveraging the cloud avoids the need for an attendant to be present, helps in maintaining proper records, and provides for quick deployment in global multi-location situations. Eagle Eye elevated temperature screening system The turnkey Eagle Eye elevated temperature screening system includes all the necessary components for efficient functioning. The integrated cameras are manufactured by overseas third-party companies. To address cyber security concerns, Eagle Eye Networks utilizes its Cyber Lockdown feature to ensure all cameras are cyber secure at all times. Eagle Eye also supports thermal cameras from Sunell, HikVision, Dahua, Mobotix, FLIR, and other companies. Joshua Baer, Chief Executive Officer (CEO) of Capital Factory, the globally renowned start-up incubator in Austin, Texas, US said, "As we look to re-open our facilities in the near future we want to make sure the environment is as safe as possible for our members and entrepreneurs”. Joshua Baer adds, “We see passive thermal elevated temperature measurement as a powerful tool to make sure we are doing what we can to keep everyone safe. The fact that it is fully passive and does not require any action by the members or require attendance by a staff member is critical to us." Eagle Eye Cloud VMS integration with thermal camera Existing Eagle Eye Cloud VMS customers can easily add a thermal camera to their existing system Existing Eagle Eye Cloud VMS customers can easily add a thermal camera to their existing system and perform elevated temperature measurement. "We all want to do what we can to battle COVID-19," continues Dean Drako, adding "As a cloud video surveillance company we have been working on integrating, testing, and validating thermal cameras for elevated temperature screening”. Complete turnkey system Darko further said, “Our results have indicated that these solutions, while not perfect, can be a useful tool as we strive to return to a more normal workplace. A number of our partners and customers have asked us to provide a complete turnkey system." Passive Elevated Temperature screening is a new technology that comes with a complete set of new challenges. Eagle Eye Networks will continue the development on these thermal screening systems to reduce costs, increase accuracy, and improve robustness.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A stories in 2019: 1. Pelco Acquired by Private Equity Firm Transom Capital Pelco Inc. was acquired in May by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct the next chapter of the iconic company. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. 2. Panasonic Spins Off Security Business Electronics giant Panasonic sold off 80% of its video surveillance business to a private equity firm but is retaining 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by competition from Chinese companies and lower video prices. Polaris Capital Group Co. acquired 80% of the outstanding shares of the new security systems business. 3. Qognify Acquires OnSSI and SeeTec 2019 began with the acquisition of IP video management software (VMS) company On-Net Surveillance Systems (OnSSI), including SeeTec in Europe. Backed by the global investment firm Battery Ventures, Qognify completed the acquisition in the final days of 2018. With Qognify, OnSSI and SeeTec operating under one umbrella, the company provides VMS, video analytics, PSIM and critical incident management for mid-market and enterprise organizations. 4. Busy Year for Acquisitions at Allied Universal Security services company Allied Universal had an active year in acquisitions, beginning in April with the acquisition of integration company Securadyne Systems in Dallas. There was an additional acquisition announced in each of the next four months: Point 2 Point Global Security, Dallas, in May; security services company Cypress Private Security in June, services company Shetler Security Services in July , and Midstate Security in August. Allied Universal announced two more acquisitions in November – low-voltage integrator Advent Systems Inc. in Chicago and Vinson Guard Service in Louisiana. Also in November, Allied announced a transformational merger with SOS Security. In December, Allied Universal acquired APG Security, South Amboy, N.J. 5. Motorola Continues Video Push with VaaS Acquisition Following its acquisition of Avigilon in 2018, Motorola Solutions continued to build its presence in the security market in 2019 with the acquisition of VaaS International Holdings, Inc. (VaaS), a data and image analytics company. Motorola Solutions paid $445 million in a combination of cash and equity for the company, which includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. 6. ACRE Acquires Access Control Companies Open Options and RS2 Open Options is an open architecture access control company headquartered in Addison, Texas; and RS2 is an open systems access control provider in Munster, Ind. ACRE, global provider of security systems, wrapped up acquisition of both firms in 2019, after announcing the Open Options deal in the waning days of 2018 and following it up with the RS2 announcement in the spring. ACRE’s portfolio now consists of Vanderbilt, Open Options, RS2 and ComNet. 7. Assa Abloy Expands Capabilities with LifeSafety Power Lock and access control giant ASSA ABLOY acquired LifeSafety Power in September, providing a complement to the access control portfolio. The plan is to incorporate LifeSafety Power’s knowledge of power supply and consumption throughout the ASSA ABLOY access control line. LifeSafety Power was established in 2009 and has some 65 employees. The main office is located in Libertyville, Illinois. 8. Distributor Anixter Going Private and Selling to CD&R Anixter International Inc., a distributor of network and security solutions, electrical and electronic solutions and utility power solutions, entered into a definitive agreement with an affiliate of Clayton, Dubilier & Rice (CD&R) to be acquired in an all cash transaction valued at approximately $3.8 billion. The transaction will result in Anixter becoming a private company and is expected to close by the end of the first quarter of 2020. Under the terms of the merger agreement, CD&R-managed funds will acquire all the outstanding shares of Anixter common stock for $81.00 per share in cash. (It has been reported that a new bidder has also emerged, although Anixter is resisting – stay tuned.) 9. Alarm.com Expands Commercial Offering with OpenEye Acquisition Alarm.com has announced a majority-stake acquisition of OpenEye, a provider of cloud-managed video surveillance solutions for the commercial market. OpenEye is optimized for enterprise-level commercial customers requiring expansive video recording capabilities, in addition to remote viewing, administration and diagnostic reporting. Combined with the Alarm.com for Business offering, service providers partnered with Alarm.com now have solutions to accommodate commercial accounts of any size. 10. ADT Makes Multiple Acquisitions, Sells Canadian Operation Another North American security giant, ADT Inc., also had a busy year in mergers and acquisitions. In February, ADT acquired LifeShield, a pioneer in advanced wireless home security systems. In June ADT continued expanding capabilities and geographic reach via Red Hawk Fire & Security, ADT Commercial with the asset purchase agreement of Security Corporation, a commercial security integrator headquartered in Detroit, Mich. In November, ADT Commercial purchased Critical Systems, which specializes in enterprise-class fire alarm, fire suppression, life safety and integrated building security solutions for high-rise properties, healthcare campuses and data, manufacturing and distribution facilities in Atlanta. In October, ADT announced an agreement to sell its Canadian operations to TELUS Corp.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
Mayflex, the distributor of converged IP solutions, has installed Thermal Elevated Temperature Screening solution from Hikvision to improve the health and safety of their employees and visitors during the Covid-19 pandemic. Elevated Temperature Screening The system works by automatically checking the forehead skin temperature in real time as employees pass by, maintaining a 2 meter gap in accordance with the UK Government’s social distancing advice. If a person is over a normal temperature threshold, an audible and visual alarm is given and they will be asked to verify their body temperature using a medical thermometer. If in the future face masks become mandatory, the system can also verify if a visitor or employee is wearing a mask. Hikvision Thermographic Bullet and Turret Cameras The system includes the Hikvision Thermographic Bullet and Turret Cameras" James Vian, Technical and Training Manager at Mayflex said, “The temperature screening solution has been installed in our main reception as well as the warehouse entrances at both the Head Office and our Environ House warehouse. The system includes the Hikvision Thermographic Bullet and Turret Cameras with the addition of the Hikvision Blackbody Calibrator that increases the accuracy of the readings from ±0.5 degrees Celsius to ±0.3 degrees Celsius.” Andy Cooper, Supply Chain Director at Mayflex said, “It’s a non-contact means of quickly and consistently measuring the skin temperature of a person’s forehead, while maintaining social distancing in line with current Government guidelines”. Enhanced staff security in COVID-19 period He adds, “In doing so, we can reduce the likelihood of someone with an elevated temperature coming into contact with other building occupants. This also reduces the possibility of losing an entire shift for 14 days, ensuring that we can deliver on our customers’ needs even in these challenging times.” Andy concluded, “It gives me confidence that we are doing everything we can to ensure the wellbeing of staff and protecting the business during the Coronavirus Pandemic.” Hikvision are highly regarded as one of the major manufacturer of security products, which are distributed by Mayflex in the United Kingdom.
Haier Group, China’s renowned home appliance manufacturer, has built a new industrial park in Russia to cope with the growing demand in Europe. Covering a total area of about 124.9 hectares, the new site is located in Naberezhnye Chelny, an important industrial city in Tatarstan, Russia. Intelligent system With the gradual completion of its factories in the industrial park, Haier is looking for an intelligent system to realize multiple tasks within the whole industrial park. Firstly, the smart system should be able to prevent theft and timely detect people climbing over the perimeter fence. Secondly, the intelligent security system should provide comprehensive monitoring in the whole industrial park and inside the factory unit, which includes, monitoring of production line and employees’ smoking behavior during working hours at office areas, efficient employee attendance management, vehicle identification at the entrance and exit areas of the park, and the overall management of all the devices, data report outputs, and other facilities at the industrial park. Total smart solution The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system, access control, time attendance system, face recognition barrier, DSS PRO platform and EVS storage for Haier’s industrial park. Notably, all of the devices were integrated in one central management platform, making it easier for operators to control and manage the system. In addition, the intelligent system also supports further device upgrade based on customer’s future plan for the next several years. Dahua 5MP WDR IR Bullet AI Network Cameras To help Haier solve the first problem, Dahua 5MP WDR IR Bullet AI Network Cameras were chosen to safeguard the perimeter of the Haier industrial park. Featuring active deterrence, the cameras are able to proactively warn intruders to leave before users take action. Once an intrusion is detected, a white light will turn on, accompanied by a buzzer to warn off the intruder. Additionally, its AI-powered perimeter protection function can greatly reduce false alarms caused by irrelevant objects. AI-powered perimeter protection The combination of advanced AI analytics and real-time alerts to desktop or mobile clients reduces system requirements and resources, thereby improving the efficiency of the surveillance system. The office areas and the interior of the washing machine factory are covered with Dahua 4MP WDR IR Dome Network Cameras, while public areas are monitored by 2MP 25x Starlight IR PTZ Network Cameras. As a member of Dahua Eco-savvy product family, the Dahua 4MP WDR IR Dome Network Cameras adopt upgraded H.265 encoding technology to provide starlight, Smart IR technology, as well as intelligent image analysis techniques. It saves bandwidth and storage, with energy-saving design to enhance monitoring performance of the system. Intelligent Video System analytic algorithm As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom With built-in Intelligent Video System (IVS) analytic algorithm, these dome cameras also support intelligent functions to monitor a scene for tripwire violations, intrusion detection, and abandoned or missing objects. In the future, it can respond quickly and accurately to events in the monitored areas. As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom and accurate pan/tilt/zoom performance that can provide a large monitoring range and rich details. Through the latest Starlight technology, the cameras can achieve excellent low-light performance. In addition, these cameras are equipped with smooth control, high quality image and good protection, which meet the requirements of most industrial parks. Dahua face recognition barriers Dahua face recognition barriers were deployed at the entrance of the Haier industrial park and its office building, allowing quick and touchless passage of registered Haier employees without using employee cards or other identification documents. The system is based on a deep learning algorithm powered by AI, which compares facial images captured by the camera with those stored in the library to verify a person’s identity and grant permission. Access will be denied for unregistered people. 2 Megapixel Full HD AI Access ANPR cameras The industrial park’s entrance and exit use 2 Megapixel Full HD AI Access ANPR cameras to identify entering and exiting vehicles. Boasting a capture rate of over 99%, the cameras can automatically recognize the number plate of a vehicle in low speed less than 40 kmph, and capture vehicle data such as vehicle direction, vehicle size and vehicle color detection (in daytime) based on deep learning algorithm. Aside from these capabilities, the cameras can also control the barrier according to the whitelist set by users and let registered vehicles pass without stopping. Dahua DSS PRO management platform The Dahua DSS PRO management platform integrates all cameras and the stated devices At the management center, all the information collected by font-end cameras will be transferred to a 16-HDD Enterprise Video Storage. With Seagate HDD, the device offers unparalleled capacity performance for users to store massive videos and obtain evidence when needed. The Dahua DSS PRO management platform integrates all cameras and the aforementioned devices, allowing operators to easily control and manage the system. Smart industrial park solution Dahua Technology’s smart industrial park solution has assisted Haier in creating a modern intelligent industrial park in Russia. The up-to-date Dahua AI equipment provides Haier a long-term smart security system with upgraded security level and enhanced management efficiency. “The traditional personnel management system requires manual registering of employee information and cards to enter and exit office areas, which is inefficient and difficult to manage, and often high in cost,” said Zhao Shengbo, Regional Director of Dahua CIS. Upgrading access verification system Zhao adds, “Upgrading the access verification system is crucial for modern companies like Haier in order to increase the security level of its industrial park and office building. We look forward to our future cooperation.” “During the requirement discussion, solution design, and engineering survey, Dahua shows professionalism and excellent communication skills. Haier is satisfied with the first step cooperation and looking forward to the second step of the project,” said Liu Wei, Overseas Regional Project Manager of Haier Group.
Imagine a campus security installation so big that it will take years to complete all the work, and it also means installing solutions with the latest technology and significant impact on school security. This illustration is the kind of job an integrator can really sink their teeth into. It is the kind of solution that a manufacturer wants to keep on their to-do list. Houston Independent School District Houston Independent School District (HISD) is the largest school district in Texas and is the seventh-largest school district in the United States. The latest technology is about to make its debut in every one of HISD's campuses. HISD has built ten new schools within the district in 2018 and is expected to add another 10 to 12 this year, all of which will be brought on board with new cabling and IP cameras. In all, there are 280 schools in the district. IP network cameras installed We (Salient) have partnered with Houston ISD for their security needs for more than a decade" The change in security solutions would be significant as the district had already deployed upwards of 17,000 analog cameras at its schools with coax cable. As seen with many of the surrounding school districts, the time had come to retire the old system and make significant upgrades. "We (Salient) have partnered with Houston ISD for their security needs for more than a decade," said Paul Fisher, Vice President of Global Key and National Accounts at Salient Systems, adding "We have worked with other nearby school districts in the Houston area, including HISD. Our extensive experience will continue to guide HISD as they build new schools and refurbish other facilities in the district." Implementation of PowerUltra hardware Fisher said the most significant difference with the new IP security installations would be the implementation of Salient's PowerUltra hardware. This hardware will replace an obsolete Windows XP, which is no longer serviced by Microsoft. PowerUltra hardware is the new standard of storage from the IT perspective. "This hardware will allow HISD to grow over the next five years and give them twice as much horsepower than they currently need," Fisher said, adding "This is a major move to IP video surveillance, and each server will easily handle more than 200 IP cameras." IP video surveillance solution Building schools and refurbishing the current installed base at HISD is no easy task. The district covers territory in nine municipalities and some unincorporated areas in Greater Houston, including all of the cities of Bellaire, West University Place, Southside Place, and most of the area within the Houston city limits. HISD also takes students from the Harris County portion of Missouri City, a part of Jacinto City, a small portion of Hunters Creek Village, a small piece of Piney Point Village, and a small section of Pearland; Pearland annexed territory within HISD between 1998 and 2005. There are 209,000 students, speaking nearly 100 languages, nearly 12,000 teachers, and approximately 28,000 support staff. Enhanced safety and security Safety and security are part of the project scope for all recently completed schools" "Safety and security are part of the project scope for all recently completed schools and those currently under construction,” District officials said, adding "This includes the 40 schools that are part of the 2012 Bond Program, as well as seven more schools, either recently completed or under construction, that are not funded by the 2012 Bond." Additionally, the 2012 Bond Program includes a US$ 17.3 million line item dedicated to safety and security upgrades at schools district-wide. That focus was further strengthened in 2017 when the HISD Board of Education allocated an additional US$ 12.1 million for district-wide safety and security needs. Adopting a total IP solution "We are pleased to be a part of this safety and security upgrade at HISD. Using Salient technology at the head-end of the security systems says a lot about our open architecture, and the trust that the school district has placed in us," Fisher said. He adds, "As we help HISD move towards a total IP solution, we are also pleased to work with the HISD IT department and upgrade their network cabling." Security upgrades Not all HISD schools fall under the bond program. Many safety and security upgrades are made based on a review of assessed needs at various campuses. Most updates are at elementary and middle schools because so many high schools have been or will be replaced or rebuilt with the district-standard safety and security measures already incorporated. "The upgrades have been completed partially in-house and partially by contracting with construction, technology, and security vendors," district officials stated, adding "In regards to wire pulls, all new campuses have robust fiber optic and wire backbones, minimizing the need for new wire pulls. However, for upgrades at existing campuses, the amount of wiring needed and pull times will vary." Salient Systems VMS Salient System's VMS has been in place throughout their decades-long security contract While Salient System's VMS has been in place throughout their decades-long security contract, the company's technology unit has been working hand-in-hand with HISD's Information Technology division with the installation of the PowerUltra in new schools. All while security maintenance, a team under the purview of the business operations facilities and fleet services department, is overseeing server replacement in existing schools. Increased level of visibility "The leadership of HISD has taken safety and security to a new level with the highest quality of products and solutions, meeting the demands of installation at new schools and existing campuses," Fisher said. He adds, "Our goal has been to ensure that the software and storage systems we provide lend themselves to the overall health of the security system. The increased level of visibility in the 'live view mode' ensures that what an operator is looking at is viewed at the proper resolution." Increased coordination between SOC and security system Implementation of safety and security upgrades is currently underway. Once fully implemented, HISD expects to see a significant increase in the efficiency and effectiveness of communications, specifically, district officials will be able to see real-time 24/7 server monitoring, allowing for increased connections between the security operations center (SOC) and the security system. Technicians also will be able to troubleshoot remotely, increasing efficiency. "The SOC is manned 24/7," the district official said, adding "As servers are migrated to the PowerUltra, SOC will be monitoring them 24/7”. The official further stated, “Currently, a manual report is run each morning to determine what servers are down. Campuses also may call during the day to report if they are unable to view their cameras. Once an issue is identified, a technician is dispatched to the site to troubleshoot."
Combining radio detection and ranging (RADAR) with thermal imaging technologies produces unparalleled monitoring coverage and perimeter protection for power plants and electrical substations. By integrating SpotterRF Compact Surveillance Radars (CSR) with FLIR PT-Series cameras, end users gain exceptional situational awareness, both inside the substation and beyond the fence line. This cost-effective solution requires substantially less infrastructure than other fence line detection systems and yields higher accuracy. Video surveillance of electrical substations There are over 55,000 electrical substations in the United States. These substations, along with power plants and transmission lines, provide power for millions of people. It is imperative that these locations remain secure from intrusion and sabotage. If just a handful of these substations were rendered inoperable, the U.S. could face a serious blackout. The 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, which knocked out several transformers and totaled over US$ 15 million in damages, was considered to be a catalyst for the Federal Energy Regulation Commission (FERC) establishing new security standards for utilities. Critical Infrastructure Protection Standard 014 One of the most notable policies introduced was the Critical Infrastructure Protection Standard 014 (CIP014) One of the most notable policies introduced was the Critical Infrastructure Protection Standard 014 (CIP014). This statute requires utilities to identify ‘mission critical’ facilities and assets, conduct a security inspection to identify threat, and implement a security system to address those risks. In response to security incidents such as Metcalf and other FERC activities, a large electrical utility with hundreds of substations across the country, looked to expand security beyond its fence line. Enhanced perimeter protection solutions The end user wanted to enhance and possibly replace traditional fence protection systems, including fiber optics, microwave barriers, and video analytics as these systems all proved to be costly, as well as time and labor intensive. In the end, the utility company relied on VTI Security for a recommendation. VTI Security, based in Burnsville, Minnesota, is an industry-renowned integrator that has been servicing security needs in the commercial, utility and oil and gas sectors for over 35 years. To determine the best system for its end user, VTI reviewed six different technologies, including some with multiple vendors of various solutions. Cost-effective total surveillance solution VTI also tested systems in in field deployments and conducted a cost analysis. The integrator concluded that SpotterRF’s product was superior to all others and selected it as its sole radar standard for perimeter solutions. “Our findings were that SpotterRF not only provided the most comprehensive detection in a substation environment, but SpotterRF was also by far the most cost-effective total solution based on the ability to mount equipment on existing structures,” said Jerry Klapak, Senior Account Manager for VTI Security. SpotterRF Compact Surveillance Radar system CSRs enable security monitors to never be blind, providing 100% coverage, 24/7, in all weather conditions SpotterRF, based in Orem-Utah, provides perimeter protection through its patented Compact Surveillance Radar (CSR) systems, which provide up to 300 acres of radar tracking power in a hand held, four-pound device. The CSRs enable security monitors to never be blind, providing 100 percent coverage, 24 hours a day, in all weather conditions. They are designed to detect threats up to 3300 feet beyond the fence line and provide early warnings to staff before situations escalate. FLIR PT-Series cameras Upon selecting a radar system, VTI needed a video manufacturer to supply cameras to deploy with the radar. In 2015, the integrator approached the globally renowned thermal imaging and perimeter security solutions expert, FLIR Systems, for a solution. FLIR’s PT-Series was selected for the project. “The ability for FLIR’s products to perform beyond published performance specifications was a surprise we don’t often see,” said Klapak, added “Each product exceeded published performance metrics on our field testing and actual deployments.” The PT-Series is FLIR’s offering of high performance, multi-sensor pan/tilt dual cameras that feature both thermal and visible-light imaging. The system is known for providing the highest precision. The pan/tilt mechanism gives end users accurate pointing control, while providing fully programmable scan patterns, as well as radar slew-to-cue and slew-to-alarm functions. Seamless integration With the radar and thermal technologies selected, VTI worked to ensure seamless integration and performance between the systems. “We worked with each company’s support and development teams as well as the VMS manufacturer to ensure the technologies not only worked with one another, but also met the client’s needs for bandwidth consumption and VMS interface and display,” said Klapak. Maximum coverage and perimeter security SpotterRF C20 and C40 radars and FLIR PT-Series cameras deliver maximum coverage and perimeter protection Together, SpotterRF C20 and C40 radars and FLIR PT-Series cameras deliver maximum coverage and perimeter protection. “The FLIR PT-Series, when deployed with SpotterRF, can cover a wide area of substation footprint. It is a cost-effective solution for substations needing to monitor the perimeter as well as inside the yard,” said Michael Chaffee, Director of Business Development at FLIR Systems, adding “The speed at which the FLIR PT-Series slews to the cue of the SpotterRF detection is impressive.” Effective intrusion detection solution When someone walks into the field of view of SpotterRF’s C20 or C40 radar, the radio waves bounce off the person and back to the radar, which then calculates the precise GPS location of the target and target size. The radars then tell the FLIR PT-Series camera to zoom to that location. The camera automatically stays on the target, moving with and tracking it. Because the radars control the cameras, the cameras only move upon detection, which significantly extends the shelf life of the cameras and allows them to last for years without replacement. Technology impact This FLIR and SpotterRF solution addresses an important pain point for the perimeter security and intrusion detection market. “In the past, utilities tried to use video analytics to find targets. Because these systems were outdoors, a number of environmental factors affected performance, including weather, lighting and moving trees,” said Logan Harris, CEO of SpotterRF, adding “However, by combining our radar with FLIR’s pan tilt thermal cameras, you will be able to solve this problem.” Radar technology and thermal imaging integration Logan adds, “Together, SpotterRF’s radar technology and FLIR’s thermal imaging are able to locate a person in a 15 or 100 acre space, see hundreds of yards beyond the fence line, cue the camera, and alert the personnel all without the help of an operator.” In the past, only military organizations could access this level of advanced technology. Now, the FLIR and SpotterRF solution makes this security capability accessible and affordable for critical infrastructure, power distribution and commercial applications. High-level security for critical sites Our client is very pleased with the ability of the technologies to provide security for their critical sites" “Our client is very pleased with the ability of the technologies to provide security for their critical sites. One surprising benefit was the ability to use both the thermal cameras and radars for additional security and production uses.” said Klapak. He adds, “They now use the radars to activate security lighting based on motion within and outside the fences. This provides not only a green approach to security by lowering energy costs but also improves customer relations by reducing light pollution in residential neighborhoods.” Minimal installation time The entire team was also impressed by the solution’s minimal installation time. Unlike deploying fiber optic cables on fence lines, which requires months for digging trenches, the FLIR and SpotterRF solution allows one to mount the radars and cameras on control shacks and lattice poles. This process only requires a week for installation. “The deployment occurred 4x faster than was anticipated,” said Harris, adding “VTI installed the systems at 25-30 sites in just three months.” Phased deployment VTI began installation in 2016 with plans to roll out the solution in a phased approach as part of a multi-year plan. Approximately 50- 75 sites will deploy the solution. On average, each substation has two FLIR PT-Series cameras and four SpotterRF radars (two per camera). Some of VTI’s other clients are also expected to deploy the same solution at 10-20 sites over the next few years based on the success VTI has proven in the utility environment.
For most people, prison ranks high on the list of places to avoid. Yet, take no pride: U.S. prisons are filled to capacity with individuals who have committed some type of crime that warrants incarceration. Prison Policy Initiative In 2018, according to data from the Prison Policy Initiative, there were 1.3 million U.S. adults in prison and 615,000 incarcerated in jails for crimes ranging from murder, manslaughter, illegal drug possession, burglary, theft, driving under the influence, property crimes, and more. In addition to traditional security concerns such as perimeter surveillance, ID card management, visitor and vendor management, crime, and theft, prisons and correctional facilities have unique security challenges that other enterprises typically do not have. Prison security Correctional facilities face regular security audits that are conducted by the National Institute of Corrections The challenges include inmate escapes, hostage situations, gangs, contraband, riots, and overcrowding, in addition to increasing privacy and regulatory mandates. Even more, correctional facilities face regular security audits that are conducted by the National Institute of Corrections. Security teams must always be on guard and watching every individual and action of the inmate population – for an inmate’s physical safety – in addition to their own. It is not uncommon for security staff and correctional officers to receive physical injuries from prisoners, especially when trying to break up an inmate fight or transporting them to other locations. Use of drones in prison smuggling An emerging concern for prison officials is the use of drones by individuals who are looking to smuggle drugs, cellphones, weapons, and other contraband into prisons for use by inmates. Many states are working on anti-drone legislation around correctional institutions. For example, Missouri is one of the most recent US States to have introduced legislation to tackle the problem. Missouri HB 324 would make it illegal for drone pilots to fly an unmanned aircraft near any correctional center, private jail, county jail, municipal jail or mental health hospital. Anyone caught violating the law would be charged with a Class A misdemeanor and possibly other felony charges, depending on the pilot’s illegal intentions. Importance of video surveillance Video surveillance is a necessary security technology for prison and correctional facility staff, as it allows personnel to mitigate those unique security challenges. “Video surveillance is prevalent throughout facilities; even if it’s a typical two-bed jail cell or a 2,000 bed prison,” says Brad Wareham, Director of Key Accounts at Salient Systems. He adds, “In cases where facilities face a shortage of staff members to watch over the inmate population, video surveillance supports the oversight of inmates and increases accountability. Inmates know that despite the lack of staff and officer presence, they are being observed by cameras that can catch even the smallest details. Video surveillance can follow inmates anywhere. There are very few blind spots.” Upgrading to hybrid video surveillance systems They are upgrading to hybrid and/or fully digital solutions, all while maintaining the HMI model Increasingly, prisons and correctional facilities are upgrading their older analog video systems, due to age degradation and lack of adequate support resources. “They are upgrading to hybrid and/or fully digital solutions, all while maintaining the Human Machine Interfaces (HMI) model,” Wareham notes. “They continue to face security challenges typical of the corrections space, such as PLC controllers, RTSP capture, intercoms, lock controls, and more, which are atypical of larger facilities. In addition, many older analog solutions will eventually be cost prohibitive,” Wareham said, adding “and will no longer operate, due to an increasing inability to find replacement parts and to the proliferation of IP-based video surveillance solutions”. IP-based video surveillance systems For many correctional facilities, upgrading a video surveillance system to an IP-based solution, in addition to a video management system (VMS), makes sense and benefits a prison or correctional facility in multiple ways. Solutions exist that allow prison facilities to keep pre-existing hardware in place during an upgrade, while allowing for replacements and component upgrades as funding permits. Specific benefits that advanced video surveillance and VMS solutions can provide a correctional institution include: Increased Coverage – Many prisons and correctional facilities are large, and have multiple areas that need to be under surveillance, such as hallways, throughout cellblocks, healthcare facilities, dining areas, exercise yards, and more. Outdated systems may have a difficult time monitoring all areas, while an IP video system can provide continuous coverage of an entire facility Clarity of Video – Older analog cameras struggle with the ability to provide clear images. New IP cameras, coupled with an advanced VMS, will produce crisp and clear images that are necessary to mitigate security risks. Inmate Tracking – One of the biggest benefit of a VMS solutions is video analytic software, which is capable of tracking a moving target and searching for specific objects. Video analytics can count human beings, monitor queues, and even identify a geographical location. VMS solutions allow security to search video archives quickly and find archived video that matches custom criteria within minutes, which is helpful in investigations. Alerts – Video analytics within a VMS solution can be programmed to detect specific activity and activate an alarm or alert system when the activity occurs. Facial Recognition – The ability to recognize a face is another key benefit of a VMS solution used in a crowded correctional institution, in particular when inmates may be wearing the same type and color of clothing. Perimeters – Video surveillance placement on the exterior perimeter of a facility can document suspicious activity occurring in outside recreational yards where contraband can enter. Many VMS solutions allow for detecting movement throughout specific areas for an established duration of time. Mobility – The ability for correctional officers to view video on a mobile device is critical, given the large landscape of facilities. For example, Salient’s TouchView Mobile solution, combined with its CompleteView 20/20 VMS, allows users to instantly access, monitor and review live and recorded video from any camera connected to any CompleteView 20/20 recording server. Cameras from multiple servers can be accessed simultaneously with PTZ control. The solution’s DRS (dynamic resolution scaling) automatically sizes the video for live viewing, which significantly reduces network usage and provides higher frame rates over mobile connections. Securing prisons and correctional facilities You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence" Overall, Wareham notes, video surveillance and VMS solutions are a necessary and critical solution for securing prisons and correctional facilities. “You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence,” Wareham stated, adding “Facilities with challenging budget constraints are still required to have a functional Video Management System, regardless of the technology or age of their infrastructure.” Salient VMS solution For security integrators, Salient’s VMS solutions provide a steady ROI. “Salient plays a critical role in providing a viable cost per channel ROI that is superior in the VMS industry,” Wareham said. He adds, “As the requirements for third-party encoding hardware is negated, and coupled with our customer support for virtually all aspects of the detention and corrections space, Salient’s VMS solution addresses budget constraints.” For prisons and correctional facilities, an advanced video surveillance and VMS is not just a product, it is a necessity that enables correctional facilities to stay safe and secure. “In the corrections industry, surveillance goes hand in hand with the employee, inmate, and visitor safety, while coupled with procedural compliance and enforcement,” Wareham concluded.
A global hyper- and supermarket giant has transformed an ailing legacy CCTV system and enhanced storage capacity across its Middle East operations with a high performance surveillance and business intelligence solution. Carrefour Jordan operator Majid Al Futtaim turned to specialist systems integrator Ametrad Technology Services to upgrade its video technology as it prepares for growth. Increasing operational efficiency The Dubai-based retail pioneer, which first introduced Carrefour to the Middle East in 1995 and now operates 70 outlets across the region, has ambitious expansion plans and is looking to open new express stores and hypermarkets. Ametrad are deploying video technology built around IDIS Solution Suite (ISS) video management software (VMS) for the Majid Al Futtaim security team, whose priority is to prevent losses, improve safety and security, enhance the customer experience and greatly increase operational efficiency across its existing eight express stores and hypermarket. Failover providing protection The legacy CCTV system was proving costly to maintain and time-intensive to operate ISS VMS is modular and scaleable, giving Carrefour a cost-effective centralized monitoring environment with multi-layered failover providing protection against network instability and power outages. The legacy CCTV system was proving costly to maintain and time-intensive to operate, while low bandwidth at some stores was limiting performance. These problems were being compounded by new requirements to move from 30 to 90 days storage. Ametrad managing director Ahmad Shanawani says: “We have not experienced a single hard disk drive failure, a request for an NVR reset, or any gaps in footage due to a power outage. This is tangible evidence of IDIS’ quality, resilience and failover technology.” Ensuring pin-Sharp image capture All the hardware is backed by a cost-free warranty and the ability to easily add new stores as they come online – vital as Carrefour serves over 200,000 customers every day across the region and is continuing to expand – ensuring low total cost of ownership. Using a phased upgrade approach 32 2MP domes and bullets already provide coverage at the hypermarket in Irbid City Center, with a further 64 legacy cameras earmarked for upgrade, while an average of 28 cameras deliver situational awareness across each express store. The IDIS cameras ensure pin-sharp image capture in varying light conditions, including in darkness up to 30 meters, and cope with varying light and shade thanks to true wide dynamic range. 32-channel NVRs and a user-friendly interface for authorized retail staff at each supermarket provide 370Mbps throughput and up to 960ips UHD real-time recording. High performance live monitoring These technologies also allowed Carrefour to double the camera count at each store This ensures high performance live monitoring and forensic video retrieval, while native RAID 1 provides an important additional layer of redundancy. Ametrad engineers connected each device in minutes thanks to true plug-and-play IDIS DirectIP® technology, and IDIS For Every Network (FEN) technology allowed one-click configuration linking each store to the control center. The hierarchical connection structure between IDIS DirectIP devices also guaranteed the most efficient method of cabling into the compact control room. Limited bandwidth was solved with IDIS Intelligent Codec, which typically reduces storage and bandwidth requirements by up to 75% compared to H.264, while dynamic multi-stream control has alleviated latency. These technologies also allowed Carrefour to double the camera count at each store to provide comprehensive coverage without the need to upgrade networks. Intelligent reporting capabilities Ametrad is also deploying IDIS VA in the Box analytics, to provide each store with heatmapping, people counting, queue management and intelligent reporting capabilities – thus helping improve sales and marketing performance and providing store managers with valuable business and customer behavioral insight. ISS control panels provide live monitoring, playback, event search, system health reports, and navigation via store layouts, allowing control room staff to troubleshoot and manage 100s of video streams and devices across multiple stores. These intuitive functions have reduced the time needed to find and export video clips from hours to minutes. Carrefour has contracted Ametrad to provide maintenance services and is working with the Ametrad team with a view to adopting new IDIS technologies such as IDIS Deep Learning Analytics.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Network monitoring: Manufacturers & Suppliers
- Axis Communications Network monitoring
- Dahua Technology Network monitoring
- Vicon Network monitoring
- AMAG Network monitoring
- Sony Network monitoring
- Hikvision Network monitoring
- IDIS Network monitoring
- BCDVideo Network monitoring
- LILIN Network monitoring
- Video Storage Solutions Network monitoring
- Surveon Network monitoring
- Vanderbilt Network monitoring
- Bosch Network monitoring
- eneo Network monitoring
- VIVOTEK Network monitoring
- TruVision Network monitoring
- Luxriot Network monitoring
- March Networks Network monitoring
- Avigilon Network monitoring
- Panasonic Network monitoring
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload