Optronics expert, HGH Infrared Systems announces the launch of its new tagline, Enlighten the Unseen as the company grows and harmonizes its global brand. The new positioning reinforces HGH’s one-stop company model for wide area surveillance, industrial thermography and infrared - visible test and measurement applications. Global branding harmonization US subsidiary Electro Optical Industries updated its logo to reflect its HGH Group association The HGH Group began worldwide brand harmo...
Ignition Technology and Cybereason announced a distribution partnership to grow and support Cybereason’s rapidly expanding channel community across the UK and Ireland. Cybereason’s Cyber Defense Platform offers endpoint prevention, detection and response and active monitoring. The solution delivers multi-layered endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to preve...
Panasonic’s latest i-PRO Extreme PTZ Infra-Red security cameras set a new benchmark in night-time visual quality and intelligent functionality, packaged in a device designed for reliability and low-level maintenance to deliver lower total cost of ownership. There are two models in the IR PTZ camera range: the WV-X6533LN model with a powerful 40x zoom and the WV-S6532LN with 22x zoom. night-time visibility ...
CyberLink Corp., a pioneer of AI and facial recognition technologies, announced a strategic partnership with VIVOTEK, the global IP surveillance solution provider, adding CyberLink’s FaceMe AI facial recognition engine to VIVOTEK’s IP surveillance solutions. The new collaboration will be showcased in VIVOTEK’s booth (#SAD37) at Intersec 2020 in Dubai, January 19-21, 2020. CyberLink’s FaceMe AI Facial Recognition Engine will be integrated into VIVOTEK’s network came...
Intersec 2020, a popular security, safety, and fire protection trade show, held under the patronage of HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, opened its doors to the latest security safety solutions and three days of agenda-setting discussion, as global industry sources tip the Middle East security sector for 10% annual growth over the next two years. With more than 1,100 exhibitors from 56 countries, Intersec was officially inaugurated by Major General Expert Rashid Thani Al Mat...
VIVOTEK, globally renowned IP surveillance solution provider, and CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, has announced they have entered into a strategic partnership, which will integrate CyberLink’s FaceMe AI facial recognition engine into VIVOTEK’s IP surveillance solutions. The initial collaboration will be showcased in VIVOTEK’s booth (#SAD37) at Intersec 2020 in Dubai, United Arab Emirates. VIVOTEK – CyberLink IP partne...
Money may not buy happiness or peace of mind, but it can buy today’s high-tech home security systems that seem to deliver both to customers, according to the J.D. Power 2019 Home Security Satisfaction Study, which was released recently. The study expanded to include not only the professionally installed (Pro Install) home security systems but also do-it-yourself (DIY Install) systems. Rise of DIY home security systems The growth of the DIY home security market has fueled customer satisfaction and made the industry more competitive" “The growth of the DIY home security market has fueled customer satisfaction and made the industry more competitive than ever,” said Christina Cooley, Director, Home Improvement and Technology Practice at J.D. Power. Christina further states, “As newer entrants gain market share, more established companies must continue to find ways to differentiate themselves to capture and keep new customers. Understanding what motivates customers to purchase a security system, being highly competitive with pricing and staying on the cutting edge of technology is the key to staying competitive in a fast-changing industry.” Following are key findings of the 2019 study: In search of the latest and greatest: The desire to upgrade is the most common reason customers in both the Pro Install and DIY Install segments start shopping for a home security system. Nearly half of customers (45% in the Pro Install segment and 40% in the DIY Install segment) cite the desire to upgrade as their top motivation to shop for a new system. But they have other motivations too. Customers who purchased a Pro Install system are spurred to act by special discounts and bundled packages (24%), as well as the purchase of a new home (24%). DIY customers are largely motivated by peace of mind (36%) and protecting their property (34%). Brand reputation and pricing are important: When it comes to selecting a provider, priorities differ between the two segments. Pro Install customers are driven mostly by brand reputation (42%) while DIY Install customers lean more heavily on price (63%) to aid their decision making. DIY Install customers are more satisfied: Customers who self-install their systems have the highest overall satisfaction across the six areas measured. DIYers are especially satisfied when it comes to pricing (860 vs. 785 for the Pro Install segment). It’s critical to provide pricing options that meet customers’ needs and are easily understood by customers, as each has a significant effect on the customer’s perception of the provider as being customer-driven. DIY Install customers are more likely to have additional security-related products beyond a control panel/keypad/hub and alarm sensors, such as video doorbells, exterior home cameras and alarm sirens. Study Rankings In the Pro Install segment, Brinks Home Security ranks highest in customer satisfaction with a score of 857 In the Pro Install segment, Brinks Home Security ranks highest in customer satisfaction with a score of 857. ADT (847) ranks second. In the DIY Install segment, Ring Alarm ranks highest with a score of 904. SimpliSafe (900) ranks second. This year’s expanded study measures customer satisfaction with home security systems based on six factors: billing and payment; customer service; price; professional monitoring; purchase and installation; and quality of home security system. The 2019 Home Security Satisfaction The 2019 Home Security Satisfaction Study is based on responses from 5,289 customers and was fielded in July-August 2019. To participate in the study, customers are required to have a professionally monitored system which has been installed by the system provider (Pro Install) or self-installed (DIY Install). J.D. Power is a globally renowned company in the scope of consumer insights, advisory services and data and analytics. These capabilities enable J.D. Power to help its clients drive customer satisfaction, growth and profitability. Established in 1968, J.D. Power has offices serving North America, South America, Asia Pacific and Europe.
Discreetly place emergency calls at the touch of a button with reliable emergency communication provided at fingertips of users with the PB-3-IP Panic Button from Viking Electronics. “This is what people have been asking for – it’s quick, it’s discrete, it’s reliable. People know they can trust the PB-3-IP when it counts.” said Greg Yocom, Engineering Manager, Viking Electronics. PB-3-IP Panic Button The PB-3-IP is designed for VoIP SIP systems and is PoE powered. The panic button can be programmed using Viking’s IP Programming software and receives automatic firmware updates. The versatile PB-3-IP also features an on-board relay for activating security cameras, emergency lighting, or any other device triggered by a dry-contact.The panic button can be programmed using Viking’s IP Programming software and receives automatic firmware updates The PB-3-IP panic button is designed to mount under a desk or countertop and place discreet emergency phone calls when activated. A built-in auto dialer will roll through up to 5 phone numbers until the call is answered. Silent monitoring After answering, a prerecorded location announcement is delivered to the called party and one-way audio is sent from the PB-3-IP for silent monitoring. The called party can easily engage in two-way communication after the call is connected by pressing touch tone “#”. Viking Electronics engineers and manufactures over 500 security and communication products in the USA. Products include Emergency Phones, Entry Systems, Paging Interfaces, Mass Notification Systems, Hotline Phones, Autodialers, Enclosures and more. In addition to their extensive analog line, Viking offers a large selection of IP products that are SIP compliant. Enhanced weather protection Based in Hudson, Wisconsin, in USA, the company’s legacy is of reliability and electronic innovation that spans 50+ years. Viking builds products that are designed to last and they also offer many of their products with Enhanced Weather Protection. Offering free lifetime product support they also back their products with a two-year limited warranty.
Member companies and representatives of the Open Security & Safety Alliance (OSSA) will be present at the INTERSEC 2020 show in Dubai next month. OSSA – an industry body comprised of leaders, influencers and innovative organizations from all facets within the security, safety and surveillance space – formed to help the industry focus on creating new value by reducing market fragmentation and addressing common challenges. The aim is to bring together the industry to move forward together with one united, global approach to: Create harmony across security and safety solutions focused on common Operating Systems and Application Programming Interfaces (API); Drive the creation of one digital marketplace regardless of brand; Define hardware and software measures to increase the levels of data security and privacy protection across brands; Define specifications to ensure the right levels of performance OSSA Technology Stack specification In the first full year of existence, OSSA member companies by creating the first common Technology Stack specification In the first full year of existence, OSSA member companies achieved a major component of the organization’s vision by creating the first common Technology Stack specification including a vendor-agnostic Operating System (OS) hardened for the security and safety market. This first big step allows for installation and execution of third-party apps on video security devices. It enables app developers to develop one single software application that is suitable for all cameras leveraging OSSA’s Technology Stack, independent of brand. The next steps in early 2020 are firstly for the OSSA-driven digital marketplace to go live and secondly for camera manufacturers to introduce their first commercial versions of products leveraging OSSA’s Technology Stack. The marketplace will give integrators and users the ability to easily add customized functionality to their cameras and security systems by way of installing apps (already developed by the early adopters and available at the launch of the marketplace) on video security cameras. It’s expected additional app developers will soon contribute solutions downloadable across devices and brands. INTERSEC Dubai 2020 From INTERSEC, some OSSA member companies will showcase prototype cameras based on OSSA’s commonly defined Technology Stack. Visitors can learn more about the vision of OSSA, its progress and how involved companies are revolutionizing the market, by visiting the Hanwha Techwin booth and enquiring with one of the OSSA representatives.
Sophos, a globally renowned provider of next-generation cyber security solutions, has announced introducing Sophos Intercept X for Mobile with new security capabilities for Chrome OS devices and improved mobile threat defense for Android and iOS devices. Fleeceware applications Sophos has also published research, Fleeceware Apps Persist on the Play Store, which details new findings on Fleeceware applications that overcharge unsuspecting consumers for functionality widely available in other free or low-cost apps. First discovered by SophosLabs on Google Play in September 2019, Fleeceware remains a problem with more than twenty newly discovered applications with nearly 600 million alleged installations, as reported by Google. Fleeceware and other unscrupulous app developers are walking a fine line to avoid breaking hard and fast app store rules" “Fleeceware and other unscrupulous app developers are walking a fine line to avoid breaking hard and fast app store rules. This sneaky behavior is unethical, but not illegal,” said Dan Schiappa, chief product officer at Sophos. Intercept X for Mobile Dan adds, “Possibly more worrisome are the stealthy cybercriminals who increasingly target mobile devices to carry out attacks for financial gain or as an ‘easy in’ to connected corporate networks. No mobile device is immune, and attackers are counting on unprotected devices and unpatched flaws to carry out their attacks. Intercept X for Mobile protects users from risky applications and malicious content, and keeps business data on mobile devices secure.” Leveraging the same deep learning anti-malware technology used in Intercept X for Windows, macOS and server, Intercept X for Mobile protects users, their devices and their data from known and never before seen mobile threats. A completely redesigned interface simplifies security management and aids accessibility for users with disabilities, by providing: Device Security: Intercept X for Mobile continuously monitors for and alerts users and IT administrators to signs of potential compromise so they can rapidly and automatically remediate issues and revoke access to corporate resources. Compliance checks detect jail-breaking, rooting, operating system versions, and more, informing users and IT administrators of violations and taking automatic action. Network Security: Intercept X for Mobile monitors network connections for suspicious activity in real time, warning users and IT administrators of potential Man-in-the-Middle (MitM) attacks. Web filtering and URL checking also stop access to known bad sites, protecting users from unsuitable content, and SMS phishing detection ¬spots malicious URLs. Application Security: Intercept X for Mobile detects malicious and suspicious applications installed on devices, protecting against malware, ransomware and potentially unwanted apps like Fleeceware. Integration with Unified Endpoint Management (UEM) solutions like Sophos Mobile and Microsoft Intune enable administrators to build conditional access policies, restricting access to applications, data and corporate resources when threats are detected. Chromebook Security: The new Chromebook Security extension protects Chrome OS users from unsuitable and malicious web content, provides app white and block-listing, and lets IT administrators report on device status and configuration. Securing personal and professional devices Intercept X for Mobile provides enhanced protection to secure personal and company devices" “There’s a false sense of understanding that organizations don’t have the right to secure employee-owned devices, but that couldn’t be farther from the truth. No device is off limits to an attacker, and left unsecured, mobile devices introduce significant risk,” said Scott Larson, owner of Technology By Design. “Intercept X for Mobile provides the best-in-class protection needed to secure personal and company-issued devices in today’s rapidly evolving threat landscape. It’s a must-have, non-intrusive solution that strengthens any organization’s defences, and it enables leading service providers like Technology By Design to protect customers from the most sophisticated and advanced threats.” Synchronized Security approach Intercept X for Mobile is easily managed in the cloud-based Sophos Central platform alongside Sophos’ entire portfolio of next-generation cyber security solutions. Sophos’ unique Synchronized Security approach empowers these solutions to work together for real-time information sharing and threat response. “Intercept X for Mobile is the best way to consolidate multiple endpoint management platforms for consistent policies, comprehensive security and letting users be productive on the devices they prefer,” said Phil Hochmuth, IDC program vice president. “It delivers best in class protection and performance, with less time and effort spent on managing and securing traditional and mobile endpoints.” Security and device management A globally renowned leader in the IDC MarketScape: Worldwide Enterprise Mobility Management Software for Small and Medium-Sized Businesses 2019–2020 Vendor Assessment report, Sophos provides “a centralized source for purchasing and support as well as unifying all aspects of security and device management, including endpoint antivirus on PCs to EMM/UEM and MTM security on smartphones,” according to the report. “Sophos has the ability to synchronize web security polices and protection settings across a worker's entire device environment, from mobiles (iOS/Android) to PCs (Windows, Mac and Chrome OS), allowing polices to follow users in browsers across all platform types.” Cyber and data security experts Sophos is an internationally renowned provider of cyber security and data security solutions Sophos is an internationally renowned provider of cyber security and data security solutions. The company's cloud-native and AI-enhanced security solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cyber-criminal tactics and techniques. Technology By Design, LLC is a global provider of network solutions, technical support and services, cloud security and data solutions, surveillance cameras installation, cyber security and data security solutions. Sophos Mobile 9.5 UEM feature Sophos Intercept X for Mobile is available now as a stand-alone license or bundled with the new Sophos Mobile 9.5 UEM for additional endpoint management capabilities, providing a complete and secure UEM platform with an integrated mobile threat defense solution.
Johnson Controls has announced the release of its new product offering, EntraPass v8.20 which will further simplifies how users remotely access the EntraPass go Mobile App. EntraPass v8.20 With EntraPass v8.20, EntraPass go Pass Mobile App users gain improved search capabilities and other efficient upgrades to deliver a remote and real-time access control solution. EntraPass go Pass requests will no longer be attached to a selected SmartLink, eliminating the need to configure every connection. Users will now be able to access any inbound connection with little to no obstacles. Enhanced users/card search functionality is also a significant enhancement to the EntraPass v8.20 Enhanced users/card search functionality is also a significant enhancement to the EntraPass v8.20. Users will be able to search for a profile, while keeping the search menu open, thereby eliminating the need to start each search fresh. This solves the previous pain point of having to reopen the search menu, if a user had clicked on the wrong profile. EntraPass Security Management Software The update also opens the EntraPass Security Management Software to macOS users. EntraPass v8.0 will be compatible with the High Sierra system or higher. Additionally, EntraPass v8.20 includes an ‘email’ field in the CSV report exports, which will be particularly beneficial for hattrix partners. This feature allows a manager to easily choose a set of accounts/owners and export email addresses, along with additional account statistics. Additional benefits of EntraPass v.8.20 with EntraPass go Pass Mobile App include the ability to view exacqVision video in hattrix, with seamless connection, easier configuration and no port forwarding. By enabling this feature within the server, the need for IT involvement is eliminated and customers will be able to connect their exacqVision NVR to the hattrix system.
CNL Software, globally renowned developer of Physical Security Information Management (PSIM) software solution, is pleased to announce that it will be exhibiting at Intersec 2020. CNL will focus on the technology that is driving the digital transformation of control rooms across the Middle East region. CNL will be joined by Cepton Technologies, Inc. a developer of industry-leading 3D sensing solutions, who will be showcasing their latest correlation of LiDAR data with real time video visualization. Scalable and secure PSIM solutions CNL Software will share valuable insights into its open, adaptable, scalable and secure PSIM solutions CNL Software will share valuable insights into its open, adaptable, scalable and secure PSIM solutions as chosen by regional governments, military, enterprises and cities. It will discuss how security operations can leverage the latest technology developments such as Artificial Intelligence (AI) and Machine Learning (ML) to help to identify and respond to incidents faster and more accurately. “CNL IPSecurityCenter is trusted by the best-informed security operations in the Middle East to provide proactive control from a central command center and supports autonomous local operations”, said Craig Menzies, General Manager – Middle East for CNL Software. “The region is changing, we are seeing the digitalization of control rooms as organizations evolve to meet today’s security challenges. CNL is driving this within our customers, enabling them to leverage from the best of breed technologies.” Integration with IPSecurityCenter When integrated with IPSecurityCenter, Cepton further enhances the industry’s most comprehensive PSIM system solution, providing users with access to more of the tools they need to quickly see, understand, assess and properly resolve perimeter security and surveillance incidents, consistently. “For the first time in the Middle East, Cepton will be showcasing the correlation of LiDAR data with real time video visualization. From a technical perspective the camera will be calibrated into a common coordinate system with the LiDAR. As a result, it will provide 3D world coordinates from the LiDAR onto a 2D video stream,” said Neil Huntingdon, VP Business Development at Cepton. LiDAR network detection Neil further adds, ”This ground breaking system provides instant video confirmation of targets detected by the LiDAR network, which will reduce false positives and allow threats to be identified faster. We have also created targeted zones for critical areas, where we can use superior algorithms without the need for additional computing hardware. This functionality also allows us target sections of video, which can be stored in high-resolution while the rest is stored in lower resolutions leading to increased efficiency and reducing the need for expensive processing and storage.”
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A stories in 2019: 1. Pelco Acquired by Private Equity Firm Transom Capital Pelco Inc. was acquired in May by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct the next chapter of the iconic company. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. 2. Panasonic Spins Off Security Business Electronics giant Panasonic sold off 80% of its video surveillance business to a private equity firm but is retaining 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by competition from Chinese companies and lower video prices. Polaris Capital Group Co. acquired 80% of the outstanding shares of the new security systems business. 3. Qognify Acquires OnSSI and SeeTec 2019 began with the acquisition of IP video management software (VMS) company On-Net Surveillance Systems (OnSSI), including SeeTec in Europe. Backed by the global investment firm Battery Ventures, Qognify completed the acquisition in the final days of 2018. With Qognify, OnSSI and SeeTec operating under one umbrella, the company provides VMS, video analytics, PSIM and critical incident management for mid-market and enterprise organizations. 4. Busy Year for Acquisitions at Allied Universal Security services company Allied Universal had an active year in acquisitions, beginning in April with the acquisition of integration company Securadyne Systems in Dallas. There was an additional acquisition announced in each of the next four months: Point 2 Point Global Security, Dallas, in May; security services company Cypress Private Security in June, services company Shetler Security Services in July , and Midstate Security in August. Allied Universal announced two more acquisitions in November – low-voltage integrator Advent Systems Inc. in Chicago and Vinson Guard Service in Louisiana. Also in November, Allied announced a transformational merger with SOS Security. In December, Allied Universal acquired APG Security, South Amboy, N.J. 5. Motorola Continues Video Push with VaaS Acquisition Following its acquisition of Avigilon in 2018, Motorola Solutions continued to build its presence in the security market in 2019 with the acquisition of VaaS International Holdings, Inc. (VaaS), a data and image analytics company. Motorola Solutions paid $445 million in a combination of cash and equity for the company, which includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. 6. ACRE Acquires Access Control Companies Open Options and RS2 Open Options is an open architecture access control company headquartered in Addison, Texas; and RS2 is an open systems access control provider in Munster, Ind. ACRE, global provider of security systems, wrapped up acquisition of both firms in 2019, after announcing the Open Options deal in the waning days of 2018 and following it up with the RS2 announcement in the spring. ACRE’s portfolio now consists of Vanderbilt, Open Options, RS2 and ComNet. 7. Assa Abloy Expands Capabilities with LifeSafety Power Lock and access control giant ASSA ABLOY acquired LifeSafety Power in September, providing a complement to the access control portfolio. The plan is to incorporate LifeSafety Power’s knowledge of power supply and consumption throughout the ASSA ABLOY access control line. LifeSafety Power was established in 2009 and has some 65 employees. The main office is located in Libertyville, Illinois. 8. Distributor Anixter Going Private and Selling to CD&R Anixter International Inc., a distributor of network and security solutions, electrical and electronic solutions and utility power solutions, entered into a definitive agreement with an affiliate of Clayton, Dubilier & Rice (CD&R) to be acquired in an all cash transaction valued at approximately $3.8 billion. The transaction will result in Anixter becoming a private company and is expected to close by the end of the first quarter of 2020. Under the terms of the merger agreement, CD&R-managed funds will acquire all the outstanding shares of Anixter common stock for $81.00 per share in cash. (It has been reported that a new bidder has also emerged, although Anixter is resisting – stay tuned.) 9. Alarm.com Expands Commercial Offering with OpenEye Acquisition Alarm.com has announced a majority-stake acquisition of OpenEye, a provider of cloud-managed video surveillance solutions for the commercial market. OpenEye is optimized for enterprise-level commercial customers requiring expansive video recording capabilities, in addition to remote viewing, administration and diagnostic reporting. Combined with the Alarm.com for Business offering, service providers partnered with Alarm.com now have solutions to accommodate commercial accounts of any size. 10. ADT Makes Multiple Acquisitions, Sells Canadian Operation Another North American security giant, ADT Inc., also had a busy year in mergers and acquisitions. In February, ADT acquired LifeShield, a pioneer in advanced wireless home security systems. In June ADT continued expanding capabilities and geographic reach via Red Hawk Fire & Security, ADT Commercial with the asset purchase agreement of Security Corporation, a commercial security integrator headquartered in Detroit, Mich. In November, ADT Commercial purchased Critical Systems, which specializes in enterprise-class fire alarm, fire suppression, life safety and integrated building security solutions for high-rise properties, healthcare campuses and data, manufacturing and distribution facilities in Atlanta. In October, ADT announced an agreement to sell its Canadian operations to TELUS Corp.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a renowned construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Replacing analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Dahua Smart Residential Security Solution The complete solution deployed more than 300 pieces of Dahua equipment, including IP cameras The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. ANPR and IP cameras installed When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. Vehicle tracking and identification For both approaching and departing vehicles, the access ANPR camera takes a snapshot of the number plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers industry-leading light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Integrated management platform Dahua smart residential solution provides an integrated management platform for the personnel of BI-City Tokyo Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. IP video intercom solution “We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases,” said Arman Lesbekov, General Manager of BI Group. Dahua Technology is an internationally renowned video surveillance and security solutions provider with more than 6000 professionals in their R&D team, dedicated to providing cutting-edge products in technologies like AI, IoT, Cloud services, video, cyber security, and software reliability with high quality and performance. Video surveillance systems expert Since 2014, Dahua has ranked second in the global video surveillance equipment market according to an IHS report, and in 2017 Dahua ranked third in the A&S International "Security 50". The company believes in investing and building strong R&D capabilities for new technology and innovation.
As one of the most important provinces of Argentina, Buenos Aires Province has been seeking to improve work efficiency and emergency response speed of its police force. However, the local police was always lacking of evidence when performing legal actions towards violence, traffic accidents, and other social incidents. This created temporary loopholes in law enforcement that criminals and erring people took advantage of in order to escape legal sanctions. For this reason, the Ministry of Security of Buenos Aires Province required powerful security tools to assist the local police in patrolling and enhancing the overall level of safety throughout the province. Strong and modern security equipment The Ministry of Security of Buenos Aires authorized the Dahua team to conduct research The Buenos Aires police sought strong and modern security equipment that could monitor the roads during police patrol, while keeping records as evidence. Additionally, they required a management terminal on the dashboard of each patrol car to allow the user to view videos in real time and manage all the surveillance equipment via the system. The technical equipment must be installed in a suitable position to avoid damage in case of car accident or airbag activation, and to ensure passenger safety under adverse conditions, such as weather changes, vehicle temperature shift, etc. After presenting Dahua Mobile Solution that could fulfill the aforementioned requirements, the Ministry of Security of Buenos Aires authorized the Dahua team to conduct research and implementation of this project. Monitoring road conditions The Dahua Mobile Solution covered 400 patrol cars of the Buenos Aires police, each of which was equipped with six HD cameras, including two different models of 2MP Mobile HDCVI IR Dome Camera – HDBW1200F-M and HDBW2241F-M-A, 3MP Network IR Mini-Bullet Camera IPC-HFW1320SP, and 2MP Mobile HDCVI IR Cube Camera HAC-HMW3200. Five cameras were also installed outside each patrol car to monitor road conditions from every angle In addition, five cameras were also installed outside each patrol car to monitor road conditions from every angle: HDBW2241F-M-A on both sides; HDBW2241F-M-A and IPC-HFW1320SP on the front top; and HAC-HMW3200 at the back. All of the products support IP67& IP6K9K, shock-proof, and resistant to vibration and severe weather conditions. HDBW1200F-M was installed inside each car to monitor its situation and regulate police behavior. As part of the requirement, the management terminal was installed at the center of the dashboard and linked to the central server through a 10/100 wired Ethernet connection via an RJ45 connector. Automatic recognition technology In addition to the cameras, Dahua Mobile Video Recorder MXVR4104-GFW was also deployed for efficient video storage. Its embedded GPS positioning allows the user to track the vehicle in real time. In case of emergency, it will trigger the alarm and automatically upload the data on time. It also supports image capturing of suspected vehicles and uploads them to the management platform It also supports image capturing of suspected vehicles and uploads them to the management platform. Indeed, Dahua Technology has launched a smart police car solution to aid the police in identifying suspected vehicles and people. Featuring automatic recognition technology, the new device can compare suspected vehicles and people with the information in its database, achieving efficient mobile control and identification. Mobile video surveillance solution With the implementation of Dahua Mobile Solution, the Buenos Aires police can now manage social security better through a comprehensive monitoring system. The mobile surveillance system with high-definition image quality and other advanced functions enabled the police to obtain first-hand evidence, achieve timely intervention and control dangerous and detrimental activities during their patrolling. This significantly improved their work efficiency, stabilized social order, and helped build a safe and harmonious community. “We are very satisfied with Dahua products. The mobile video surveillance solution used in police cars enables our police to work more efficiently and safely because the surveillance center is available 24 hours a day, providing appropriate assistance in solving various issues or incidents that the police may encounter. ” Said Dr. Ignacio Greco, Deputy Secretary of the Provincial Ministry of Security, Buenos Aires.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Cold winter temperature requires high-performance equipment capable of operating in extreme environments Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Access ANPR Camera The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. Built-in intelligent video analytics When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. IR Mini-Bullet Network Camera The camera uses a set of optical features to balance light throughout the sceneFor both approaching and departing vehicles, the access ANPR camera takes a snapshot of the license plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Smart residential solution Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. "We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases”, said Arman, General Manager of BI Group.
Once an underused industrial wasteland, King’s Cross is one of the largest and most exciting redevelopments in London. The 67-acre site is being transformed into a new part of the city with homes, shops, offices, galleries, bars, restaurants, schools, and a university. The King’s Cross development is a mixture of old and new buildings and many of the old buildings are listed with strict planning restrictions. “Some of the buildings here have played a significant part in the area’s history, so extra care needs to be taken when installing a security system,” says Nick Killington, King’s Cross Estates security system design specialist. Security solution The Gallagher solution provides flexibility to integrate a number of other systems The public areas and many of the buildings in the estate are managed and maintained by the King’s Cross Estate Services team. They are tasked with keeping the site well-maintained, well-lit and secure at all hours of the day and night, making it a place all people want to visit and enjoy. To help make King’s Cross the best managed estate in the UK, the team needed a security solution that could evolve alongside them as the estate grows. Nick Killington says Gallagher was the specified solution throughout the project. “As we are such a large estate, we required an enterprise solution that offers us the ability to extend as and when required, something we know is a particular strength of the Gallagher system.” Visitor management “The Gallagher solution is particularly useful in a retro-fit situation like this, where running cables and network points in such buildings isn’t allowed. For example, we eventually want to replace some of the door handles with a wireless locking system, which we know can also be linked to the Gallagher system.” The Gallagher solution provides flexibility to integrate a number of other systems, such as video, visitor management and elevators, as well as being able to add functionality like cellphone access when they require it. Gallagher technology will continue to feature across the new phases of the King’s Cross development, providing integrated, scalable security solutions to help create a welcoming, secure place for people to work, live and do business in this whole new part of London. “The Gallagher solution has allowed us to future proof our security, ensuring it will evolve with our needs as and when required.”
Brienon-sur-Armançon is a city in the Burgundy-Franche-Comté region of north-central France, with a population of about 3,300. Located at the intersection of two rivers – Créanton and 'Armançon, Brienon-sur-Armançon enjoys an advanced road network which is vulnerable to illegal activities. To make the city safer, the local government, with far less than sufficient police force at hand, chose to secure its city and residents with Dahua Safe City Solution. There were two main pressing issues that needed to be addressed. Firstly, the city had far less than insufficient police force, only one policeman was supposed to look after the whole 3,300 dwellers. Secondly, Brienon-sur-Armançon had not prepared itself with necessary cables needed for modern surveillance systems, requiring the Dahua Team to design a tailored solution according to the unique local environment and limited human resources of this city. Wireless transmission device This solution aids them in obtaining video recordings that can be used as evidence in case of an incident To make up for the shortage of police force and network cables, Dahua Technology delivered a customized solution covering the whole city with various kinds of video surveillance devices. These equipment are linked by a wireless device combining PTZ camera and antenna that transmits all the collected information to the highest point in the city center. These data are then transmitted to the control center, making it easy for the police to achieve round-the-clock monitoring. To monitor major sections of the city, an array of modern devices were utilised including Starlight IR PTZ AI Network Camera, Multi-Sensor Panoramic Camera, Eyeball Camera, Thermal Camera, ANPR Camera, Wireless transmission device, keyboard, etc. From the control center in the police station, the police can check real-time situation and decide whether to take action. This solution also aids them in obtaining video recordings that can be used as evidence in case of an incident. Vehicles trigger detection In addition, the combined strength of the Dahua general camera and PTZ camera created a smart capture mechanism for the police. General cameras were installed to monitor fixed scenes, once human or vehicles trigger detection rules set by the operator (like tripwire and intrusion), the PTZ camera will automatically zoom-in and start tracking. For low-light applications, the Dahua Starlight Technology of the PTZ camera also offers outstanding light sensitivity, capturing color details even under ultra-low light condition. Moreover, ANPR Cameras were deployed for road safety enforcement on main roads. Embedded with License Plate Recognition (LPR) algorithm, the cameras have the ability to detect and recognize moving vehicle's plate number within low speed. Furthermore, installing Thermal Cameras took care of the job of monitoring the BBQ sites in the park with their built-in fire detection functionality that can detect fires even at long range distance. Effectively monitor major areas The police has solved a cemetery theft case with evidence recorded by the Dahua PTZ cameraWireless transmission device made it possible for all cameras in all locations to connect to the control center without the cost and trouble of wiring. NKB 5000 HD Network Control Keyboard was installed in the control center to help the police achieve split screen operation of both general and PTZ cameras. Some Seagate hard disks were also used to store recorded videos for future use. The Brienon-sur-Armançon police can now sit remotely in the control room and operate in an efficient way with the help of Dahua Safe City Solution, which allows them to effectively monitor major areas in the city and respond in time when an incident takes place. Dahua PTZ camera The recorded videos also serve as crucial evidence and help the police to crack a case with much less effort. In the first week of the test run of this smart system, the police has already solved a cemetery theft case with evidence recorded by the Dahua PTZ camera. “The origin of our cooperation with Dahua dates back to the visit to China a year ago. This visit to the Dahua headquarters in Hangzhou concluded with a reciprocal commitment – to equip the city of Brienon with video surveillance. We welcomed this agreement, which allowed the installation of the system and improved the daily life of our residents.” said Mr. Jean-Claude M.CARRA, Mayor of Brienon-sur-Armançon.
3xLOGIC, Inc., global provider of integrated, intelligent security solutions, has announced that Ocean Blue Car Wash, Prescott Valley, AZ, has deployed or is upgrading to 3xLOGIC 32 4MP-camera video surveillance systems at four of its locations to date. DC Pro Systems is the integrator of record as it continues to install and maintain a growing number of Ocean Blue locations. V7000 NVRs and V-Series 4MP dome cameras We are standardising on the same robust 3xLOGIC video surveillance system at each of our locations" As one of the state’s first Express Car Wash concepts, the owners of Ocean Blue Car Wash have put to use their 15 years of experience to create a new standard in car washing. The Ocean Blue experience is known for consistency and a reliable standard of service. Customers receive the same safe, quality car wash every visit. “We are standardizing on the same robust 3xLOGIC video surveillance system at each of our locations,” said Alexander J. Lazar, Owner and General Manager, Ocean Blue Car Wash. Thus far, four Ocean Blue locations have each deployed, or will soon finish deploying, 3xLOGIC V7000 NVRs and 32 V-Series 4MP dome cameras. “We really like Shane Hepola and DC Pro Systems. He brought us the 3xLOGIC technology, and I trust him and the quality job they do.” 3xLOGIC high-resolution cameras “These high-resolution camera views keep my employees on point and they keep my customers on point, too. The 3xLOGIC cameras pay for themselves. I’ve got cameras everywhere, recording everything. If we’ve caused damage to a vehicle, if we’re liable, we’ll certainly pay for it. However, the proof is in the video and if there is any question about a claim, the video doesn’t lie,” said Lazar. “Any story you can imagine from the customer, we’ve experienced it, including slip and fall claims,” Lazar continued. “We need that 4 MP resolution; it keeps our employees honest and it also deters potential robberies. Our multiple cameras provide so many interior and exterior views that we capture a lot of the surrounding properties and highway, so we can be an asset to law enforcement when needed.” On-site and remote video monitoring He further adds, “I’m not at all the different sites every day, but at any given time I can log in and watch what’s going on. I’ve got a bird’s eye view, so I can catch equipment malfunctions before my staff does. Sometimes, when I wake up at 2 am, I can quickly log on to view my locations. I’ll do a night audit to check lighting, building signs, and other things. We’re not there but the cameras are—24/7/365.” Ocean Blue does both on-site and remote monitoring of video, as well as after-incident investigations Ocean Blue does both on-site and remote monitoring of video, as well as after-incident investigations. At this time, the company is expanding to a fifth location, there are plans to build another, and by end of 2020 there will be six Ocean Blue locations. All six will have the same robust, high-functioning 3xLOGIC video surveillance, installed by DC Pro Systems. VIGIL Central Management (VCM) An interesting add-on feature for Ocean Blue is a 3rd-party software app that takes footage from the 3xLOGIC cameras to determine spacing between the cars during the wash process. If two cars come within a certain number of feet from each other, the line shuts down automatically. Another improvement Lazar and Hepola are discussing is to implement 3xLOGIC VIGIL Central Management (VCM). VCM is a health monitoring software component of the VIGIL video management system that alerts either DC Pro or Ocean Blue to any malfunctions on the network before such developments create a problem. “The system is very user friendly,” said Lazar. “Basically, we’re trying to kill all the blind spots on the property, and I use the video for training purposes, too. We’ve got monitors in our offices and in the customer areas. That’s telling my customers we’re watching everything, and their cars are safe; and it’s keeping my employees doing great work,” Lazar concluded.
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom." However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
Network monitoring: Manufacturers & Suppliers
- Dahua Technology Network monitoring
- Axis Communications Network monitoring
- Vicon Network monitoring
- Sony Network monitoring
- Hikvision Network monitoring
- IDIS Network monitoring
- BCDVideo Network monitoring
- LILIN Network monitoring
- Video Storage Solutions Network monitoring
- Surveon Network monitoring
- Vanderbilt Network monitoring
- Bosch Network monitoring
- eneo Network monitoring
- VIVOTEK Network monitoring
- TruVision Network monitoring
- March Networks Network monitoring
- Avigilon Network monitoring
- Panasonic Network monitoring
- Hanwha Techwin Network monitoring
- Luxriot Network monitoring