Allied Universal, a security and facility services company in North America, is pleased to announce that Drew Vollero has received the prestigious Orange County Business Journal’s CFO of the Year Award for a private company. Vollero received the honor at the 13th Annual CFO of the Year Awards held at the Hotel Irvine on January 30th. Awards go to Chief Financial Officers for exemplary performance in the preceding fiscal year in five categories. Murray Rudin, Managing Director of Riordan, L...
Matrix has announced its presence in the prestigious trade fair for Security, Safety & Fire Protection - Secura 2020. Organized in North Africa, SECURA is the first international fire, safety & security expo organized in Algeria. With an ambitious regional visibility plan, the expo will be held in Safex - Foire d'Alger, Mohammadia from 11th to 13th February 2020. Matrix aims at exhibiting their indigenous and innovative range of solutions for IP Video Surveillance, Access Control, Time-A...
Barco, a provider of control room solutions, has just released SecureStream, a new media streaming solution to easily and securely share content beyond the control room. Using a very intuitive user interface, control room operators can simply drag and drop video or data sources into a SecureStream channel, allowing the content to be shared with field staff or remote experts. In this way, SecureStream helps authorized people get a complete situational overview, contributing to better and faster d...
Datrium, pioneer of the secure multicloud data platform for the resilient enterprise, announced that it has expanded the Datrium Global Partner Network to new regions and introduced a new tier, DRaaS Select. With DRaaS Select, partners can better aid customers in their cloud transformation and modernize disaster recovery (DR) and backup processes. The Datrium Global Partner Network has grown rapidly in North America, EMEA, ANZ and APJC, with the addition of 20 new partners in the last six months...
Vidsys, a global developer of Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) technology solutions, announces the release of the latest version of its security software platform – Vidsys Enterprise 2020 R1.0. Vidsys Enterprise 2020 R1.0 is the first release of the product’s 2020 iteration, which focuses on continuing to provide security and performance optimizations to better support the user’s experience. Mapping and v...
Synology Inc. has announced the availability of the SA3600 storage system, the latest device in the SA family of high-performance and versatile, petabyte-capable network attached storage servers. Built to tackle both existing and future data storage requirements, SA3600 provides businesses with access to faster and larger on-premises storage in a cost-effective package. "In response to the rising demand for on-premises data storage, we built the SA series to help businesses reach petabyte-scale...
UK CCTV camera manufacturer, 360 Vision Technology, announce that its Predator ‘all-in-one’ PTZ range is now an accredited Vision HS camera solution, certified to have completed the CAPSS approval process by the Center for the Protection of National Infrastructure (CPNI). Ensuring cybersecurity measures are capable of protecting against the very real threats faced by surveillance system operators, 360 Vision Technology’s team of software developers is constantly working to ensure that these threats can be averted. Video management software “There has been a lot of negative press relating to the potential vulnerabilities integrators may accidentally introduce into their customers’ surveillance systems,” says Adrian Kirk, Strategic Account Director at 360 Vision Technology. “With concerns over the ease at which some edge devices can be used as an access gateway by cyber criminals, we’re taking cybersecurity seriously and helping integrators to mitigate that risk by specifying Predator UK manufactured cameras and Vision HS video management software." “Action to remove these threats is unlikely to happen fast as the UK market is still flooded by potentially unsafe Far East CCTV cameras that are being sold at bargain basement prices, which make them commercially attractive to some purchasers. The problem is further compounded by installation companies who may have limited expertise when it comes to providing tight network security.” Security and corporate confidentiality 360 Vision cyber security protection ensures surveillance capability is not compromised" "For example, steps should be taken to prevent the edge device’s set-up browser being accessed - enabling a hacker to disable or change critical camera settings, or worse, access the wider corporate network. However, supporting peace of mind for any integrator or end-user, when a 360 Vision Technology Predator camera is deployed at the edge, it cannot be used to enable unauthorized access to a security or corporate network.” Despite the increased emphasis on cybersecurity, and more and more sophisticated cyber-attacks taking place, many leading camera manufacturers still supply easy to get to, direct access points (typically via an RJ45 port), located within a camera’s power supply – but removing this risk is essential to ensure security and corporate confidentiality is not compromised. Cyber security protection “360 Vision cybersecurity protection ensures surveillance capability is not compromised, by removing the risks associated with insecure camera access,” Adrian concludes. “To provide additional protection for our customers, we are proud to announce that the ‘Predator HS’ product range is now an accredited camera solution to work with Vision HS - certified to achieve CAPSS approval by the CPNI.”
Meesons, UK’s entry control innovator, will be unveiling its innovative EasyGate Superb at this year’s International Security Expo (ISE19), Olympia London, 3-4 December, stand K40. At 99mm the EasyGate Superb cabinets are the slimmest of any Speed Gate on the market, accentuating the sleek, minimalistic aesthetics created by the glass wings. EasyGate Superb is an ultra-slim, fully customized Speed Gate that is an ideal solution for controlling access to offices, schools, universities or government buildings. The range includes unique and innovative features, including an optional integrated card collector and QR code/ barcode reader. EasyGate Superb can be specified in colors to match a customer’s corporate identity. Its ultra-slim design has already generated significant interest and Meesons is predicting that it will continue to be a major focal point for visitors to stand K40 at ISE19. Gain independent access The EasyGate Superb is the only Speed Gate on the market with such a slim design yet featuring the ability to integrate an optional card collector with a card return function. Where required, a third-party card reader can be built into the EasyGate Superb. The QR scanner, another optional feature, will help improve the efficiency of visitor management - it will be possible for an external visitor to receive a QR code on their cellphone phone, allowing unimpeded entry to the facility on arrival without having to verify credentials. The QR code reader can also be used by delivery partners where there isn’t a permanently staffed reception. Sending the QR code in advance will mean they are able to gain independent access to specific areas of the facility. Intuitive light guidance The sensors are smart enough to detect when a person is traversing in a wheelchair, wheeling luggage or pushing a baby carriage Both the QR scanner and card collectors are an integral part of the design, meaning they don’t need to increase the cabinet width or be a bolt on like other ranges. This helps maintain sightlines of the ultra-slim cabinets, which are supplied in brushed, polished or bronzed stainless steel, any RAL color or alternative surface finishes, along with tempered glass top lids. Other optional functionality of the EasyGate Superb range includes intuitive light guidance; colored LED illumination of the top lid allows smart settings of light navigation. In addition to standard navigation functions, various lighting effects such as arrow, dots, blending colors and much more can be set. The selection of colors is fully customizable. Safety and security Jonathan Bairam, Commercial Director at Meesons A.I. Ltd, said: “We will have our new EastGate Superb in sleek white on display at ISE19 on 3-4 December. Visitors will be able to view and try this unique new product for themselves. We are expecting a lot of interest especially as its ultra-slim design and minimalistic aesthetic will appeal to specifiers and their clients in a wide range of sectors.” Safety and security are built into EasyGate Superb with 24 pairs of IR sensors that prevent people tailgating their way into a facility without presenting the correct ID or security tag. The sensors are smart enough to detect when a person is traversing in a wheelchair, wheeling luggage or pushing a baby carriage. Optional high glass wings prevent climb-over attempts by would-be intruders.
Fujitsu launches sales of the "FUJITSU Security Solution AuthConductor V2" which uses various authentication methods, including palm vein authentication, to deliver comprehensive biometric authentication support for customers. In addition to providing a unified palm vein authentication office environment, this product features facial authentication, fingerprint authentication and IC card authentication for PC logons, and is fully scalable to support use by anywhere from several people to organizations with tens of thousands of users. With the launch of this upgraded solution, Fujitsu enables customers to enjoy unparalleled convenience with secure and flexible solutions for a diverse range of use cases and authentication scenarios. Sales start in Japan with global rollout to follow within fiscal 2020. Palm vein authentication functionality Fujitsu has integrated PC login authentication solution into the "AuthConductor Server" software Biometric authentication technologies have become increasingly visible in daily life offering businesses and consumers convenience in a variety of areas, ranging from frictionless transactions for cashless shopping and ticketless travel, to access management for membership data and security clearance for sporting events. At the same time, it's anticipated that companies will continue to integrate a variety of biometric authentication methods, including for PC logins and room access management, to further improve convenience and reduce operational burdens in enterprise settings. To this end, Fujitsu has been offering customers its "AuthConductor Server" software since April 2017, enabling users to add palm vein authentication functionality to their existing business systems. Authentication solution for enterprise users Now, in order to meet the increasingly diverse authentication needs of its customers, Fujitsu has integrated its PC login authentication solution for enterprise users into the "AuthConductor Server" software and added new functions to deliver the "AuthConductor V2". This newly enhanced version enables authentication solutions to meet the unique needs of a variety of customers. Comprehensive access with users' palm vein data across different platforms and applications, replacing the need for different authentication methods Unifying in-house authentication methods with palm vein authentication for enterprise users - By centralizing palm vein data on the server, upon registration it can be used for authentication for a variety of purposes, including PC logon, physical access management, and printing authentication, eliminating the need for separate registration for each application. This not only enhances system security but also eases access for users and administrators alike. The software now offers expanded support for a variety of authentication methods Improved authentication performance for consumer-facing services - When the palm vein authentication function is added to customer-facing business systems, the verification time can be sped up to 50% over conventional products. This makes palm vein authentication even more convenient for large-scale service deployments like cashless payments, which are expected to grow in use. The new version offers users exceptional scalability, with support for small, standalone deployments or for organizations with tens of thousands of users. Expanded authentication functionality for PC logon The software now offers expanded support for a variety of authentication methods. In addition to palm vein authentication, the new version offers facial authentication using technology developed independently by Fujitsu Laboratories Ltd., as well as fingerprint authentication and IC card authentication, which offers support for My Number identification cards used with the Japanese social security system Flexibility and Scalability for small to large customers - The service can be adjusted flexibly depending on the size of the customer and the authentication method they want to use. Fujitsu aims to expand the availability of the solution globally by the end of the fiscal year 2020.
While Cobalt robots have been patrolling the hallways at Slack offices for some time now, the recent trip to Chicago for GSX came with some exciting news about the next phase of the company’s relationship with Slack. The company’s new integration with this industry-leading enterprise collaboration platform will help keep safety and security a priority for you and your entire office. “Slack is one of the most ubiquitous communications platforms among modern enterprises, and we see this integration as a way to bridge your digital and physical offices. The ability to communicate issues through Slack allows our Cobalt Security Service to create a more effective, productive working environment for both security and facilities management teams and the employees they serve. Real-time collaboration and issues management are key factors in mitigating risks for a more safe and secure workplace, and we’re excited to work with Slack to bring this integration to life,” said Cobalt CTO and co-founder Erik Schluntz. Safe and secure in times of emergency Accidents and threats to safety and security in a business setting can occur at a moment’s notice—with the Cobalt and Slack integration, workplaces are armed with another tool to keep employees alert, safe and secure in times of emergency. With this in mind, we’re proud to announce the launch of a new public alert integration for enterprises to identify and notify employees of safety risks as well as mitigate issues in the workplace in real-time. This integration brings all of a company’s security assets onto a real-time visibility dashboard and communication service Slack’s VP of Global Workplace and Real Estate, Deano Roberts, said, “With this new integration, security teams add the Cobalt Security Service to a shared channel within a corporate Slack workspace. Anomalies identified by Cobalt needing further analysis or review from the company populate the channel in real-time, extending the visibility of the Cobalt Dashboard into a collaborative space.” Real-time alert When Cobalt detects anything that needs escalation or further review—from an unauthorized visitor to CO emissions to a water leak—it triggers a real-time alert in a designated Slack channel. Cobalt follows all company post orders to determine which anomalies and detected events require escalation and review. If the event requires further discussion or action, companies can create new temporary channels in a workspace from the alert. Onsite security personnel can use the new channel to collaborate with each other and with the Cobalt Specialist Command Center to determine courses of action, including potential new patrol paths or public announcements and broadcasts through the robot. In the case of an emergency, such as a fire or carbon monoxide leak, security teams can activate Cobalt’s PA system and siren through the Slack integration and send Cobalt on a new patrol to monitor an evacuation. Real-time visibility dashboard This integration uniquely brings all of a company’s security assets onto a real-time visibility dashboard and communication service. Hardware, software and people — now in one place to help collaboratively monitor issues and mitigate risks onsite or remotely. This is an exciting next step on our journey, and we look forward to helping keep more company workspaces more safe and secure and furthering our mission of using robotics to be maximally helpful to the benefit of all.
Traka is the key management solution of choice for leading multi-sector business protection management company, Guarding UK, ensuring compliant key holding services and integrated audit control capability. Guarding UK manages nearly 1,500 sites across the UK, protecting in the region of £40bn worth of assets at commercial, corporate and residential sites across industry sectors including central London premier sites, retailers, property owners and management agents, together with airports and airlines. Employing around 800 staff, Guarding UK installed bespoke-in-design Traka systems to uphold a pledge to customers for compliant and secure key holding, with remote accountability enabled to ensure keys are managed and available instantly by authorized personnel. Says Mick Spring, Guarding UK, Head of Mobile Services: “Guarding UK prides itself on being recognized as amongst the best leading security company in the country.” Dedicated audit control Guarding UK has installed key cabinets which are designed for organizations with a high key turnover “We are constantly monitoring our resources and systems to not only ensure compliance, but also create a culture that supports our teams to provide a superior service. Traka is a testament to this ambition, providing a unique way for customers to trust us to manage their keys effectively. Having an ability to work with us right from the initial design of a system was what really appealed, allowing us to incorporate different tracking attributes, with full visibility of key whereabouts at any given time." "Should a key holder need to attend a site, we can provide all details of the call out with dedicated audit control, including specific time, which can all be instantly emailed for business reporting.” On-site, Guarding UK has currently installed Traka’s L-Touch key cabinets, which are specifically designed for larger organizations with a high key turnover. High-quality protection management Working with specialist TrakaWEB Software, allowed for dedicated audit control capability, including notifications when keys are not returned, presenting instant traceability and reporting. Lee Payne, Market Development Manager for Traka UK: “Guarding UK is at the forefront of high-quality protection management and has managed to maintain this leading industry position through a commitment to compliance and continuous improvement across its sector offerings and service excellence.” “Within Guarding UK obligation to key holding, the adaptability of Traka technology allows us to create a solution that could not only enhance key management but also improve communications, operations and workflow, enabling staff to present a seamless team approach. The audit trail capability presents a system that can be relied on 24 / 7 / 365 for the ongoing benefit and peace of mind security of all Guarding UK customers.”
Panorays, a rapidly growing provider of automated third-party security lifecycle management, unveiled a security intelligence solution known as Dark Web Insights. The new feature enhances Panorays’ award-winning third-party security management solution and serves as an additional layer of cybersecurity protection. Using Panorays’ Dark Web Insights, companies can now become proactive about knowing in advance of in-the-wild threats to their supply chain. The evaluator company automatically receives a notification when there is abnormal activity on the Dark Web regarding the third party. The new Dark Web feature checks mentions of a company’s third party on hacker forums and other nefarious marketplaces. It provides the ability to monitor potentially malicious hacker chatter about opportunities to target the third party, sell databases of personal information or take advantage of system weaknesses for financial benefit. “With the latest rash of misconfigured servers and data leaks, many companies have discovered too late that a significant breach has occurred,” said Noam Maman, VP Product of Panorays. “Many third-party security solutions assess the attack surface of vendors, but do not venture into the Dark Web. With Panorays, companies receive further necessary visibility into the security posture of their third parties.”
Small business owners work hard. They are often the first ones there in the morning and the last to leave at night. Even then, they likely bring their work home with them. During that time, everything they do is aimed at making their business as successful as possible. Because of this, many business owners don’t take vacations, and if they do, they spend a lot of time worrying about their business while they’re away. In both cases, the potential for burnout is tremendously high. The primary concern for these individuals is loss, whether from theft, waste, vandalism or other causes. Depending on the degree of the loss, it can have a devastating effect on small business. Therefore, professional security solutions must be top of mind for these businesses. Small business owners can take advantage of advanced technology that can help them work smarter, not harder Video Surveillance For Small Businesses One technology that can address loss, the feeling of helplessness that comes from not being on site and more is video surveillance. Sadly, it’s not always on the radar for small business owners, many of whom think video surveillance is very expensive and out of reach. But that couldn’t be farther from the truth. There are high-quality, relatively inexpensive solutions that don’t require much, if any, configuration, allowing an installer to place cameras, run cable, plug cameras into the recorder and use software to get end users up to speed on remote access. Best of all, almost all of these solutions come with a mobile app or other means of accessing video—both live and recorded—remotely from a smartphone or tablet. In a world where our phones have become our lifeline to a lot of information, including email, banking, inventory management and more, a security system simply has to provide this type of access. Given the availability of cost-effective video surveillance solutions and their ease of use, small business owners can take advantage of advanced technology that can help them work smarter, not harder in a few key areas. Video surveillance solutions come with a mobile app for accessing video remotely from a smartphone or tablet Efficient Incident Monitoring Having a high-quality video surveillance system with proper coverage means that any time an incident or loss occurs, a small business owner can go back and find it on the video and identify exactly what happened. For example, if something goes missing from a retail store, reviewing the video will reveal exactly what happened, when it happened, how it happened and—depending on lighting, camera resolution and field of view—possibly who took it. Video systems can also be valuable from a liability perspective. Slip-and-fall claims are not uncommon, but in many cases they turn out to be false. Thankfully, cameras can provide video that will support or refute a claim. Without video, such incidents could be costly for small businesses. A simple review of recorded videos will solve any mystery and eliminate the potential for a long argument with no evidence Video Recording For Incident Verification Another example would be a customer who claims they were shorted on the change they received from a cashier. Rather than taking the time to count the money in the drawer and reconcile that with receipts, a small business owner could simply review video from a camera placed above the point of sale to determine if the customer’s claim is correct or if they may have been mistaken. This feature can also help alleviate or avoid a potentially awkward or difficult situation when there’s a difference of opinion with a supplier. Say for instance a delivery driver claims he or she brought three cases of product to the back door, but there are only two cases in the stockroom. A simple review of the video that’s been recorded will solve the mystery once and for all and eliminate the potential for a long, drawn-out argument with no evidence one way or the other. Smartphones For Remote Monitoring It’s natural for small business owners to feel stressed when they’re not at their physical location. After all, they’re the ones who have invested in the business and are responsible for making sure it runs smoothly and profitably from day to day. For small business owners with surveillance systems, vacations can become not only a reality but also the relaxing time they are supposed to be. For small business owners with surveillance systems, vacations can become not only a reality but also the relaxing time Rather than sitting on a beach and worrying about whether the store opened on time or if employees are doing what they’re supposed to be doing, an owner can pull out his or her smartphone, log in to remotely to the video system and know for sure. That peace of mind is invaluable for small business owners. This is also helpful for business owners with multiple locations. Because no one can be in two—or more—places at once, a video surveillance system can provide eyes and in some cases ears at a location, which can be accessed at the click of a button. Video Surveillance For Training For a small business, it’s imperative that employees follow established policies and that staffing levels are maintained at the most efficient level possible. These are two other areas where video surveillance can help. If a small business owner sees that something isn’t being done properly, whether by a single employee or if the problem is more widespread, he or she can use video for training purposes. They can sit down with the employee or employees to review the video and explain the proper policies and procedures. Conversely, video can be used to demonstrate proper techniques or even to recognize employees for a job well done. From a staffing standpoint, reviewing video could reveal unexpectedly busy or down times Maintaining Staffing Levels From a staffing standpoint, reviewing video could reveal unexpectedly busy or down times. A business owner can review video from 3 p.m. on a Saturday to see how many customers are in a location and determine the ratio of employees to customers. Looking at a variety of times over a period of weeks or months could help determine optimal staffing levels, which may lead to the decision to increase staffing on Saturday afternoons when a store is busy. This will help improve customer experience and potentially increase sales. Motion Detection For Accurate Access Control Cameras can be deployed with motion-detection sensors to alert business owners when someone enters a certain area, whether during or after business hours. In many cases, detected motion can trigger an alert and/or a video clip to be sent to the business owner’s smartphone so they can review and verify whether something is out of the ordinary. These deployments could be set up to monitor a variety of locations, such as an office, safe, doors and other sensitive areas at all times or just during specific hours. If motion is detected during off hours, the business owner can view video and alert police that an unauthorized individual is at their business. Surveillance videos can be used to demonstrate proper techniques or even to recognise employees for a job well done Cybersecure Video Surveillance Systems From a cybersecurity perspective, manufacturers are constantly releasing firmware updates to protect cameras from malware and/or unauthorized intrusion. Once someone has accessed any device, all systems and devices connected to the same network become vulnerable. Updating these devices tends to be an afterthought for small business owners, who may either forget or simply not have the time to do it. So it should come as no surprise that these important updates often go uninstalled. Today’s advanced video systems overcome this obstacle with easy updating, which can be performed by small business owners or installers to ensure constant protection. Other systems are available with auto-updating capabilities, which remove the onus from small business owners completely. Today’s advanced video systems overcome cyberthreats with easy updating Cost-Effective Surveillance Solutions These are just a few of the many benefits video surveillance systems offer small business owners. What’s important to note is that for each to be successful requires having to have the right camera for the right environment. For instance, a camera positioned at the back door of a business has to have wide dynamic range to deal with changing light levels throughout the day. A camera used to monitor transactions must offer high enough resolution to identify bill denominations. Today’s solutions are cost-effective, easy to use and offer the flexibility to monitor operations from anywhere at any time – giving small business owners the power to work smarter, not harder to grow their bottom line.
Technology is changing the look and function of today’s security control rooms. Old-school CRT (cathode-ray tube) monitors are giving way to the thinner, flat screen monitors in the control room environment, but the transition is gradual. Randy Smith of Winsted still sees many control rooms that need to make the conversion, which is a boon to his company’s business. Furniture today is designed differently to accommodate the thinner monitors, often with larger screens. Need For Integrated Rack Systems With the increase of IP-based systems comes the need for integrated rack systems that include advanced functionality such as cable management, adds Jim Coleman, National Sales Manager, AFC Industries. Server rooms are environmentally controlled by cooling systems and power systems monitored on the IP network. Low-profile flat screens allow centers to utilize space vertically, thus creating a smaller footprint for the consoles. Additionally, with IP-based systems, workstations will have a smaller footprint because there is less cumbersome equipment. In most cases the servers are stored in a secured, climate controlled environment to eliminate overheating of the servers and maintain their security, says Coleman. This environment also helps with cable and power management. AFC builds technical furniture racks that adhere to the precise needs of computer network server room operators. The company designs and fabricates LAN workbenches with versatile functionalities, and server room workstation racks that are scalable. There is a complete line of IT workbenches, IT computer racks and computer server rack mounts with flexible mounting options. In most cases the servers are stored in a secured, climate controlled environment to eliminate overheating of the servers and maintain their security Flexible Control Room Designs Matko Papic, Chief Technology Officer of Evans Consoles, says the transition from bulky CRT equipment to flat-screen (lower profile) monitors was a major disruption in control room design; it changed the whole dynamic. Another evolution is the use of IP video streaming, which allows more flexibility in manipulation of audio-video content, and requires more flexible control room designs. Another shift, driven by larger, higher-definition monitors, is a shift to fewer monitors that display more information. Instead of a smaller monitor for each information stream, larger monitors now consolidate that information into “dashboard” displays. Looking ahead, control rooms will need to be more flexible, both in the initial design and the ability to adapt to changing technology, says Papic. Legacy customers who are currently using PCs may be moving to more remote applications. Sit-stand equipment will continue to be increasingly prevalent. “There will be more emphasis on flexibility, technology integration, and the ability to change over the life of the system,” says Papic. Consolidation Of Multiple Operations Into A Single System A trend in security is consolidation of multiple physical operations into a single system, says Papic. As a result, more customers are taking more interest in alarm management and situational awareness. How is the technology being used in terms of alarm triggers? How can the systems react rapidly and provide information to a larger audience in the control room? These questions impact how control rooms are designed, and Evans Consoles can adapt lessons learned from other markets to these trends in the security arena. Greater use of technology is inevitable, says Coleman of AFC Industries. “It is virtually impossible for humans to monitor all security data at the street level in our cities,” he says. “As computers become more powerful and their programs more all-encompassing, we will see a greater shift to robotic and technology uses that will provide enhanced monitoring capabilities and safety reactions.” Read our Control Rooms series here
Companies that have developed a culture of openness can provide and receive feedback at all levels “The nail that sticks out gets hammered down” is an old Japanese saying that took hold in our post World War II corporate America culture. This phrase encourages an unspoken rule of conformity combined with an authoritarian hierarchical structure. Today it is important for business leaders to consider the impact this has in American workplaces. Brent O’Bryan, SPHR at AlliedBarton Security Services explains that a winning formula for both the organization and an individual is a culture actively exhibiting healthy behaviors and practices, combined with a zero-tolerance policy for any inappropriate or troubling behaviors. Chicago, Baltimore and Philadelphia are examples of metropolitan markets that wrestle with significant violence on the streets. In all three cities, law enforcement and the state attorney’s offices face the headwind of a “stop snitching” culture. When criminals and bullies are accepted as commonplace and have greater influence than the law, their actions will not be reported, and the perpetrators themselves will ultimately not be held accountable for their actions. An anti-snitching philosophy also infiltrates many workplaces as criminals, or at least those who have yet to be found guilty, and bullies become the employees sitting in the next cubicle or office. Or worse, they become the boss. People who feel they are in a safe and secure environment are capable of achieving great things When individuals see something but say nothing, or when organizations discourage, intentionally or otherwise, the active reporting of concerning actions and behaviors, the probability of violence in the workplace increase. So, what can an organization do to transform from a “see something, say nothing” culture to a “see something, say something” culture? Organizational culture, policy and practices need to be objectively evaluated, and if necessary, changed. The culture of an organization will always trump policy when the two are not aligned. And, culture is often best defined by the accepted behaviors and practices in an organization. While the printed or preached culture may be a positive one, if the reality of what is practiced every day is not, senior leadership needs to take steps to make the desired culture a reality. The following are some areas that business leaders in human resources and other senior leadership roles should review, analyze and work collectively to change. Tame Senior Management Bully Squads If leadership fosters a workplace bullying culture, then this attitude and behavior will trickle down, permeate and dramatically alter the work culture in an extremely negative fashion. Human resource leaders, in particular, need to demonstrate to senior management that the adverse culture fails to foster productivity, teamwork and creativity – three vital objectives that every company wants to fulfill. Human resource leaders may consider corporate wide surveys, implemented by a third party vendor, that poll employees anonymously. If employees know that they can vent their frustrations and share feedback anonymously, without fear of losing their job, real change can start to occur. Companies with a secure work environment increase productivity Create Leadership Development Programs Nurturing in-house talent with a well-defined leadership development program makes employees feel more connected to the business, eases the chain of succession and empowers employees to be more creative, connected and engaged. Just as there are companies in many shapes and sizes, leadership development programs differ dramatically from company to company. The end goal of these programs is that employees have an opportunity to improve their skills through classes and workshops, have access to promotional opportunities as they arise, and feel a sense of community and kinship with their company. Leadership development begins with recruiting as human resource professionals seek individuals who can successfully lead their company’s mission. Develop Culture of Openness Companies that have developed a culture of openness can provide and receive feedback at all levels. A 360-degree feedback initiative can be a valuable option but is only recommended after a company has begun its journey to developing an open culture. If the workplace still fosters a "see something, say nothing" ideology, employees will not be forthcoming for fear that their confidence won’t be kept, or that the source of negative or constructive feedback will be too easily identified. A third party survey company should be brought aboard to confidentially assess feedback by employees at all levels of the organization. Establish Reporting Mechanisms It is important for an organization to establish clear reporting lines. These should be made especially clear in policies and procedures and communicated frequently. The expectation that employees report inappropriate, violent or suspicious activity can only be realized when there are measures in place that allow and encourage reporting. Leadership effectiveness is dependent upon the ability to gain the trust of the people who work for them. This also assumes that the one holding the trust – the employee – will perform certain desired behaviors, and that the leader has both the desire and ability to “walk the talk.” People who feel they are in a safe and secure environment are capable of achieving great things. It is up to their leaders to tap into this fundamental optimism and allegiance, and move them forward to success. By building a successful organizational culture where employees feel safe, not threatened, and not maligned by their bosses, they will flourish creatively and be more productive. By developing a culture where employees understand the range and varieties of workplace violence and its warning signs, they will feel empowered to do something about it.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
Security is more-than-ever linked to consumer electronics, especially in the residential/smart home market. CES 2018 in Las Vegas is therefore brimming with news that will have a direct impact on the security market, today and especially looking into the future. Products for the future of security CES is a giant trade show for consumer electronics with 2.75 million net square feet of exhibitor space and featuring more than 3,900 exhibitors, including 900 startups - in contrast, ISC West has some 1,000 exhibitors. During the week-long show welcoming 170,000-plus attendees from 150 countries, more than 20,000 new products are being launched. The products incorporate ingredient technologies such as artificial intelligence and 5G that will also be familiar elements as the future of the security industry unfolds. Familiar players at security shows also have a presence at CES, and many consumer technologies on display offer a glimpse of what’s ahead for security The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. Key Security Technologies At CES 2018 Familiar players at security shows also have a presence at CES. For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? At CES, Johnson Controls is announcing support for Apple HomeKit now offered in their DSC iotega wireless security and automation solution. Consumers can manage both their security system and also other home automation abilities using Apple’s Home app, or Siri on their iPhone, iPad or Apple Watch. Interlogix is announcing new features and components of its UltraSync SmartHome system, including hands-free voice control, high-definition cameras, an LTE cellular module and soon-to-be-released doorbell camera. The areas of consumer electronics and security are closely intertwined Developments In Crime Awareness ADT has a high profile at CES, including the launch of its ADT Go mobile app, equipped with 24/7 emergency response from ADT’s live monitoring agents and backed by Life360’s location technology, providing emergency response, family connectivity, safety assistance and crime awareness. ADT is also unveiling a video doorbell and expanding its monitoring to cybersecurity. IC Realtime is introducing Ella, a cloud-based deep-learning search engine that augments surveillance systems with natural language search capabilities across recorded video footage. Ella enables any surveillance or security cameras to recognise objects, colours, people, vehicles and animals. Ella was designed using the technology backbone of Camio, a startup founded by ex-Googlers who designed a simpler way to apply searching to streaming video feeds. It’s a “Google for video:” Users can type in queries such as “white truck” to find every relevant video clip. Smarter homes and smarter computers Do-it-yourself smart home security company Abode Systems announces iota, an all-in-one system giving customers more freedom and flexibility to build out and monitor their smart home. The new form factor has a built-in full-HD resolution camera enabling customers to see and hear what’s going on in their home 24/7 while a built-in gateway supports hundreds of devices to make homes more convenient, safer and more secure. There is also support for Apple HomeKit. Highly programmable and high-performance platforms will no doubt play a role in the future of video surveillance systems in our market The Z-Wave Alliance will host 30-plus leading smart home brands in the Z-Wave pavilion at CES. A full walk-through home will demonstrate different brands working together to create one cohesive smart home experience. Sigma Designs unveils its 700-Series Z-Wave platform, including numerous performance and technology enhancements in energy-efficiency and RF performance. Personal protection in attendance Self-defence product company SABRE will debut a combination pepper spray with dual sound-effect personal alarm that “alternates between the traditional wailing sound and a primal scream, while a strobe blinks 19 times per second to disorient assailants.” SABRE’s Modern Fake Security Camera includes “sleek, realistic design to deter would-be thieves.” Chip maker Ambarella is introducing the CV1 4K Stereovision Processor with CFflow Computer Vision Architecture. The chip combines environmental perception with advances in deep neural network processing for a variety of applications, including video security cameras and fully autonomous drones. At CES, applications will focus on automotive uses, including advanced driver assistance systems (ADAS), self-driving, electronic mirror and surround view systems. The highly programmable and high-performance platform will no doubt play a role in the future of video surveillance systems in our market. A full walk-through home will demonstrate different brands working together to create one cohesive smart home experience Extending home security and efficiency The Ring whole-house security ecosystem creates a “Ring of Security” around homes and neighbourhoods. Products include “Stick Up” indoor/outdoor security cameras, integrated LED lighting, a “Ring Alarm” integrated bundle for $199 including a base station, keypad, contact sensor, and Z-Wave extender. “Ring Protect Plans” include 24/7 professional monitoring. The “Streety” phone app, from Vivint Smart Home, extends home security into the neighbourhood. Streety makes it easy for neighbours to monitor neighbourhood activity through a network of shared residential cameras. They can keep an eye on kids, cars and property through live video feeds and use recorded video clips to investigate incidents. A new device making its debut at CES is the Walker “commercialised biped robot,” from UBTECH Robotics, which provides a complete home butler service and is designed to ease the day-to-day operations of a busy home or office. The varied of functions includes video surveillance monitoring, security patrol monitoring, motion detection and “instant alarm,” as well as dancing and playing games with children. The company says Walker will “bridge the gap between technologies that were once only available in scientific research institutions and everyday people.”
Critical building management and security systems at one of the most advanced super-high-rise towers, the landmark Wasl Tower in Dubai, are to be integrated with Maxxess eFusion technology. The 302-meter multipurpose tower, which will be operated by the Mandarin Oriental Hospitality Group, incorporates offices, guest rooms, public areas and apartments, and is situated in a pivotal Dubai location. The Wasl Tower is designed with advanced sustainability features including natural shading and cooling, adaptive lighting, one of the world’s tallest natural ceramic facades, and a vertical boulevard. eFusion was selected for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. With a modular, building block approach, eFusion provides an umbrella management system and drives service efficiency by removing the need for operators to continually switch between systems. Visitor management system By keeping it simple and integrating with the widest choice of technologies, Maxxess removes the complexity A key use of the technology will be to integrate back-of-house operations at the Wasl guest apartments with front-of-house systems, for maximum ease of use and operational efficiency using the Maxxess unified platform. This eFusion solution comprises a 900-plus reader ASSA ABLOY VingCard access control system, a 1700 camera Hanwha surveillance system, and advanced key management with Deister ProxSafe, and it will use the BACnet protocol to integrate the building management system (BMS). The Tower will also benefit from Maxxess VisitorPoint visitor management system, a Zenitel intelligent communication system and disabled call-to-assist alarms. The VisitorPoint integration will improve the guest and resident experience, reduce administration and front-desk queuing, and ensure smooth running of functions from visitor and contractor management to collections and deliveries, and security. Streamline security, safety and facilities management “The challenge with projects of this scale is to find a simple, straightforward platform that communicates with everything and works with all the systems involved,” says Lee Copland, Managing Director EMEA, Maxxess. “By keeping it simple, and integrating with the widest choice of technologies, Maxxess removes the complexity.” The Wasl Tower project is the latest of a growing number of mixed-use developments, including hotels, retail, office and residential complexes to use eFusion to streamline security, safety and facilities management. Last year Maxxess won an Intersec Award for its major eFusion implementation at Bluewaters Island.
PINs protect, just ask your credit card company. How many rooms at your office shouldn’t offer an open access, free-for-all? Probably quite a few. But expecting everyone to keep them locked, and the key-carrying and-tracking that entails, is unrealistic. This is when you need Code Handle. Access control system This simple, secure, easy-to-fit handle works with your current door lock. There is no need for you to change the door lock mechanism; just replace the existing handle to add PIN security to an office door. With Code Handle, there is no wiring, no expensive access control system and no need for cumbersome physical keys. Two screws fit a Code Handle to almost any interior office, meeting room, archive or storage room door. The inbuilt electronic PIN pad does the security work for you. Press a 4-digit code on the handle’s integrated keypad and the door opens. Code Handle comes with a Master Code and 9 different user PINs, so you can restrict access to a select group of people — senior managers, the IT department or the office cleaners, for example. User-friendly security Code Handle keeps sensitive documents, meeting rooms and personal belongings safe at your workplace Code Handle also locks itself. Auto-locking ensures an office, storage room or staff toilet is always secure when you close the door. You know for sure nobody has seen the new org chart you left on your desk, nor entered the stationery cupboard without authorization. With Code Handle, user-friendly security comes with clean, elegant design. Forget about ugly push-button-and-twist mechanical PIN locks. The low-profile Code Handle is brushed in stainless steel and satin chrome zinc, in a sleek design to blend with any modern office décor. All the security you need is in the handle. Two standard batteries (CR2) slot inside, and typically last for 30,000 lock/unlock cycles before you need to replace them. An indicator tells you when it’s time to change them. Code Handle comes in left- and right-hand versions. fire tested It is fire tested and enables free exit from the inside of a room. Code Handle keeps sensitive documents, meeting rooms and personal belongings safe and secure at your workplace. You can’t lock every room, nor install CCTV everywhere. With Code Handle, you don’t need to. To learn more about Code Handle, please visit: https://campaigns.assaabloyopeningsolutions.eu/codehandle
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organize up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardizing security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
Hospitals, medical centers, university training centers, clinics and other healthcare institutions are exposed to legal liability, ethical concerns, and subject to litigation and lawsuits, as well as changing regulation worldwide. Facilities have drugs and medical equipment onsite, making them a tempting target for crime. Healthcare Industry Challenges At the same time, aging populations in developed nations will drive increased demand for patient treatment. Rising populations and economic growth are naturally driving healthcare expenditures higher in developing markets. The frequency of physician, medical service provider, and hospital/clinic visits are all likely to rise considerably in the future in both developed and emerging markets. All of this drives the need for video surveillance for security and for active medical treatment activities Arecont Vision megapixel cameras are deployed by healthcare facilities of all sizes and types around the world to increase the quality and coverage of video while driving down costs of installation and ongoing operation. Arecont Vision Deployment Examples Arecont Vision IP megapixel camera technology, both single-sensor and multi-sensor products, has been proven around the world for a variety of healthcare sector needs. Entrances and exits to buildings, grounds, parking structures, car parks and facilities Office areas, emergency rooms, nursing stations, treatment centers, clinics, operating rooms, procedure rooms, morgues and patient wards Pharmacies, drug storage areas, records storage, store rooms, laundry Public areas, reception, lobbies, hallways, cafeterias, kitchens, retail areas Protection from slip-and-fall, workman’s compensation, malpractice, lawsuits and other litigation and compliance Perimeter, parking surveillance and license plate recognition Facial recognition, people counting, movement monitoring Access control and staff identification Visitor, patient and staff safety What Arecont Vision’s Healthcare Customers Say “Due to the exceptional resolution provided by Arecont Vision’s megapixel cameras, and the deployment of several panoramic cameras, we have easily expanded our coverage capabilities using fewer cameras with outstanding results." "The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua," said Paul M. Sarnese, System Safety Director, Virtua Health The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua" “Performance sold us on Arecont Vision megapixel cameras. We are using the video surveillance system to look for recorded video of suspicious persons after a description is given. We are also using it to review slip-and-fall complaints and to address issues of employee accountability," said Michael J. Matroni, Emergency Preparedness and Security Manager, Sacred Heart Health System. “The quality of Arecont Vision cameras more than satisfies our requirements for image quality. The system is working very well for us and Arecont Vision is extremely responsive to our needs.” "The International Hi-Tech Healthcare Park will be the first integrated healthcare development in Vietnam to provide a comprehensive healthcare environment employing high tech medical equipment and a professional medical staff. Our new video surveillance system is an important element of that environment," said Lai Voon Hon, General Director of Hoa Lam-Shangri-La, Vietnam.
The internet helped revolutionize the security industry, and technology continues to evolve at a speed and depth that is changing the way people protect their premises. Vanderbilt Flagship Products Cloud technology has resulted in a society that is always connected. For the security industry, this means it is now possible to remotely monitor many locations from hundreds of miles away. This is an area where Vanderbilt solutions carry particular depth. A browser and an internet connection are all that is required to access Vanderbilt’s flagship cloud products, ACT365 and SPC Connect. ACT365 is an integrated access control and video management solution while SPC Connect is one of the strongest intrusion detection solutions on the market. Remote Monitoring Instant Execution Remote monitoring is a backbone feature of these solutions. This ability allows for the elimination of once laborious tasks that are now capable of instant execution through the quick click of a button on cellphones, tablets, or PCs. For example, Travix, an online travel company that use ACT365 at their London offices, wanted remote connectivity with their site through smart devices. ACT365 is delivering this by giving users control of access points via any major web browser or ACT365’s app. When not at the premises, Travix managers also have visibility of access requests to their external doors and diagnostics for door status throughout their offices.Remote monitoring also means both SPC Connect and ACT365 allow for technical queries to be diagnosed and resolved on the go Diagnosing And Resolving Technical Queries Remote monitoring also means both SPC Connect and ACT365 allow for technical queries to be diagnosed and resolved on the go, delivering ultimate control to site security. This enables site issues to be dealt with efficiently, minimizing disruption as these can be addressed immediately and around the clock. SPC Connect provides the ability for a caretaker that oversees maintenance for multiple buildings to manage alarms remotely. If an alarm is triggered at one of these sites while the caretaker is working at a different location and getting to the incident is logistically difficult, they simply take out their smartphone, access the SPC Connect app, view the event, and turn off the alarm. Remote monitoring also means both SPC Connect and ACT365 allow for technical queries to be diagnosed and resolved on the go Keeping Up With Consumer Needs SPC Connect provides the ability for a janitor that oversees maintenance for multiple buildings to manage alarms remotely. If an alarm is triggered at one of these sites while the janitor is working at a different location and getting to the incident is logistically difficult, they simply take out their smartphone, access the SPC Connect app, view the event, and turn off the alarm. Essentially what remote monitoring boils down to is providing ease of use and convenience. Remote monitoring through cloud solutions saves time and money and brings peace of mind. With technology continuing to embed itself into our everyday life, it’s important the security industry proves its agility, adaptability, and dependability in keeping up with consumer needs and remote and instant access to security solutions are an obvious list topper here. In that sense, the remote monitoring provided by SPC Connect and ACT365 are proof that Vanderbilt’s ear is to the ground in 2017. To learn more about Vanderbilt’s SPC Connect and ACT365 solutions, visit www.vanderbiltindustries.com.
The IDIS solution has given MOL the powerful, highly effective surveillance system it required In early 2016, Secom plc, a fire and security specialist, was appointed to deliver a customized high-definition video surveillance solution for a new customer, Mitsui OSK Lines (MOL). As one of the world’s leading shipping companies, MOL is listed on the Nikkei and is part of Japan’s Mitsui Group, the major multinational corporate conglomerate.MOL has been navigating the oceans since 1884. During this time, it has grown and developed to become one of the world’s largest full-line marine transport groups. It has done this by anticipating the needs of its customers and constantly innovating to meet the demands of the future global economy. As a multi-modal marine transport and logistics group, its business encompasses an extensive fleet including bulk carriers, container ships, LNG carriers, oil tankers, car carriers, ferries and domestic transport. The company employs approximately 9,600 people worldwide with key European corporate functions based in London.Ensuring State-Of-The-Art SurveillanceMOL needed a comprehensive surveillance solution for new European administrative offices located within an iconic building in London’s commercial city district. Secom’s challenge was to design and deliver a futureproof solution combining resilience, high-quality images, and ease-of-use. Secom prides itself in going the extra mile so it needed to design a solution with the optimal mix of hardware and software guaranteed to deliver consistently reliable performance.It also had to ensure a low total cost of ownership without the high recurring annual license fees associated with many video management software solutions. Given the importance of usability, a key priority was to specify HD cameras that could easily be configured and operated via very simple intuitive instructions by non-experts to avoid all potential user issues and minimize the need for call-outs. The solution would also need to be integrated with MOL’s internal IT network and offer the built-in flexibility to scale and accommodate future requirements.IDIS Center Video Management Software "MOL had been impressed with all the IDIS demonstrations, but there’s no substitute for the real thing” The Secom surveillance solution comprised a tailored suite of IDIS IP equipment. The solution includes 32 full high-definition (HD) flat dome cameras, a 32-channel network video recorder (NVR) and IDIS Center video management software (VMS), which is bundled as part of the package with no additional license fees. The Secom team found the solution very straightforward to implement from an engineering perspective. For MOL, ease-of-use has been achieved with a highly intuitive and user-friendly platform that can be easily accessed by in-house personnel. The cameras provide comprehensive visibility throughout the offices and the VMS enables easy retrieval of high-quality HD images, backed by detailed reporting.Flexible, Future-Proof SecurityThe solution has given MOL the powerful, highly effective surveillance system it required. "MOL had been impressed with all the IDIS demonstrations, but there’s no substitute for the real thing. MOL were not disappointed. The IDIS hardware and software more than lived up to expectations and everything has been running very smoothly. It is delivering high-quality images, reliable performance, and excellent value – everything that our customer wanted. Furthermore, it was easy to install and is proving very simple for the in-house team at Mitsui OSK Lines to use to meet their day-to-day surveillance needs, both now and for the future,” said Keith Sharman, Regional Sales Manager at Secom.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
We asked this week’s Expert Panel: What are the limitations on where video cameras can be placed because of privacy? With hundreds of new cameras installed every day, the likelihood increases exponentially that a camera will be placed in a location where it violates privacy. In fact, threats to privacy are often among the largest objections when video surveillance is proposed, whether in a public area or in the workplace. Allaying fears about undermining privacy is a basic requirement to make such systems acceptable to the public. It’s a touchy subject, but one our Expert Panel is willing to address.
What lessons, if any, are there to be learned from the recent attacks in Paris? Recent events in Paris highlight the deadly and changing face of terrorism in 2015. Two gunmen armed with AK-47 assault rifles attacked the Paris offices of satirical magazine Charlie Hebdo on 7 January, killing 12 people in all, including eight Charlie Hebdo employees and two national police officers. Two days later, the terrorism continued with a hostage crisis at a printing firm at Dammartin-en-Goel and at a kosher supermarket in Paris, where four hostages were murdered before the assailant was killed by police. The world has been shocked by the events, and many are evaluating what we can learn from them to help us prevent or minimise such future attacks. We asked our panel if there are lessons to be learned specific to the security industry.
3 Reasons To Migrate To A New Access Control SystemDownload
Schooling the Market on Education SecurityDownload
Lawrence, Massachusetts Deploys FLIR Video System For SafetyDownload