Alcatraz AI, developer of secure frictionless access control platforms, has named security industry veteran Josh Jackson as Regional Vice President, Strategic Partnerships. Based in Florida, Jackson will oversee sales, business development, customer service, marketing, and operations for Alcatraz AI. “We’re excited to have a security industry pro lead our East Coast sales operations as we continue to build our innovative frictionless access control platforms,” said Alcatraz AI...
Keysight Technologies has announced Breach Defense, a security operations (SecOps) platform designed to improve operational security effectiveness. An integral element of the new platform is the Threat Simulator breach and attack simulation solution which enables network and security operations teams to measure the effectiveness of operational security by safely simulating the latest attacks and exploits on live networks. Security operations teams are faced with an increasingly complex network e...
Attracting trade visitors from across the subcontinent, the region’s most influential trade fair for the security industry, Secutech India, is scheduled to return for its 9th edition from 7 – 9 May 2020 at the Bombay Exhibition Center, Mumbai. With exhibitor registration still open, the fair has already attracted more than 350 of the world’s leading security brands with less than three months remaining before it commences. The 2020 exhibition will feature Axis Communication, C...
Technology start-up Broadstone and the provider of cloud based security workforce management solution, TrackTik, have announced a partnership integration deal. The partnership will see the company integrate with Broadstone’s ‘Labor-as-a-Service’ technology as they go-to-market together to promote this exciting new relationship. Canadian-based TrackTik, helps organizations manage all aspects of their security personnel via a single software solution. Already an established play...
Allied Universal, a security and facility services company in North America, is pleased to announce that Drew Vollero has received the prestigious Orange County Business Journal’s CFO of the Year Award for a private company. Vollero received the honor at the 13th Annual CFO of the Year Awards held at the Hotel Irvine on January 30th. Awards go to Chief Financial Officers for exemplary performance in the preceding fiscal year in five categories. Murray Rudin, Managing Director of Riordan, L...
Matrix has announced its presence in the prestigious trade fair for Security, Safety & Fire Protection - Secura 2020. Organized in North Africa, SECURA is the first international fire, safety & security expo organized in Algeria. With an ambitious regional visibility plan, the expo will be held in Safex - Foire d'Alger, Mohammadia from 11th to 13th February 2020. Matrix aims at exhibiting their indigenous and innovative range of solutions for IP Video Surveillance, Access Control, Time-A...
Barco, a provider of control room solutions, has just released SecureStream, a new media streaming solution to easily and securely share content beyond the control room. Using a very intuitive user interface, control room operators can simply drag and drop video or data sources into a SecureStream channel, allowing the content to be shared with field staff or remote experts. In this way, SecureStream helps authorized people get a complete situational overview, contributing to better and faster decision-making. Typically, the control room is the central intelligence hub of an organization. This is where all the information is collected and visualzed, and where critical decisions are made. Things get more complex, however, when a key decision-maker or expert is located outside of the control room. In order to quickly give these people a better situational overview, the operator can now stream selected content to remote locations. Control room software SecureStream is extremely easy to use from either a web browser or from the control room software. Using the overview of available sources, control room operators can simply drag and drop content into a SecureStream channel and then provide the relevant link to selected receivers. The content can be video, data, or even a CMS perspective (a group of content that logically belongs together). The receiver uses a web browser on laptop or cellphone phone to view this content. SecureStream was designed to couple user-friendliness with the highest level of security. The system uses both on-premise and cloud technology to stream the content to the receivers. This hybrid on-premise and Software-as-a-Service (SaaS) configuration helps to lower the risk of intrusion on the enterprise network, maximizing security. Secure and user-friendly SecureStream was designed to couple user-friendliness with the highest level of security Because this is a one-way system, (only streaming from inside the organization to outside) there is no need to open the enterprise’s firewall to allow inbound remote connections. All services are thus delivered over encrypted outbound-only connections, fully based on proven industry standards. Furthermore, all remote access is managed at an off-site secure entry point. “With SecureStream, we managed to make streaming content outside the control room both secure and user-friendly,” says Jan Willem Brands, Chief Product Officer of Barco Enterprise division. “Based on our experience with streaming solutions in a control room context, we now really raised the ease-of-use for both the operators in the control room and the remote receivers. The integration with Barco’s Control room Management Suite (CMS) is another operational improvement that makes SecureStream more attractive for users.” Integrated Systems Europe SecureStream will be showcased for the first time at the Integrated Systems Europe (ISE) tradeshow at the Amsterdam RAI, from 11-14 February 2020. You will find the company representatives in Hall 12, at Booth F120.
Datrium, pioneer of the secure multicloud data platform for the resilient enterprise, announced that it has expanded the Datrium Global Partner Network to new regions and introduced a new tier, DRaaS Select. With DRaaS Select, partners can better aid customers in their cloud transformation and modernize disaster recovery (DR) and backup processes. The Datrium Global Partner Network has grown rapidly in North America, EMEA, ANZ and APJC, with the addition of 20 new partners in the last six months. According to the State of Enterprise Data Resiliency and Disaster Recovery 2019 report, 50.4% of all organizations surveyed recently experienced a DR event, with ransomware as the leading cause. Ransomware is one of the biggest concerns for IT leaders today and this threat is requiring many organizations to rethink their DR plans. On-demand cloud-native DRaaS solution Datrium’s on-demand cloud-native DRaaS solution with VMware Cloud on AWS makes it simple and far more economical for organizations to recover when disaster strikes. The expansion of the Datrium Global Partner Network enables organizations worldwide to work with specialized resellers and distributors in their region to modernise their data centers, transform DR with a failproof DRaaS solution and free their organizations from the complexity of traditional infrastructure. We’ve experienced high demand from customers looking to transform their data centers with cloud-based solutions" “We’ve experienced high demand from customers looking to transform their data centers with more cloud-based solutions,” said Tim Page, Chief Executive Officer at Datrium. “At Datrium, we pride ourselves on delivering unprecedented flexibility and simplicity to help customers transform their IT. The new and expanded partner program reflects our mission to bring on-demand, failproof and cost-effective DR with VMware Cloud on AWS to enterprises everywhere. This is an exciting time for Datrium and our growing Global Partner Network.” Additional services opportunities The new DRaaS Select tier provides partners with additional services opportunities and enables them to better guide their customers through DR transformation initiatives and protect them from the growing threat of ransomware. DRaaS Select partners receive the highest level of training and certification in DR with VMware Cloud on AWS so they are uniquely equipped to help organizations protect themselves from disasters in an economical way. Participation in the DRaaS Select tier is by invitation only and is limited to an exclusive set of highly skilled partners in specific geographic regions. DRaaS is fundamentally changing the DR market with its cloud-native design, built-in backup, instant Recovery Time Objective (RTO), continuous compliance and an on-demand pay-as-you-go model. This presents a unique opportunity to leverage the public cloud and its elastic capabilities to finally deliver DR done right with Datrium DRaaS with VMware Cloud on AWS. Multicloud deployment strategies Datrium’s commitment to the channel and its partners’ go-to-market efforts are reflected in the following Partner Network levels: DRaaS Select resellers receive advanced training and certification on DRaaS with VMware Cloud on AWS. These partners have the highest level of expertise in DR with built-in backup. DRaaS Select partners can help customers transform their DR processes including providing guidance on Runbook creation and multicloud deployment strategies. Preferred resellers are provided with new service opportunities and a rich set of program benefits, so together with Datrium they can help companies achieve failproof on-demand DR, achieve their DR compliance objectives, quickly recover from ransomware attacks, modernize their data centers, achieve their hybrid cloud objectives, and design and implement data resilience strategies. Authorized resellers can provide services beyond DR, including all around data center modernization, multicloud and hybrid cloud strategies as well as data resilience efforts. Cloud and SaaS-based solutions Datrium has expanded its DRaaS Select Partner ecosystem and garnered interest in DRaaS Preferred With the Datrium Automatrix, which contains DVX at its core, Datrium and its partners can remove IT infrastructure complexity by delivering a platform that converges backup, mobility, DR and encryption in a single platform. “Channel, reseller and distribution partners approach Datrium because they are excited about the transformational products we’re bringing to market for DR and DHCI,” said Joe Vranicar, Chief Revenue Officer at Datrium. “Our partners have embraced our unique approach to DR and have built practices specific to delivering Datrium’s cloud and SaaS-based solutions to customers. Datrium mutually invests in each partnership to ensure the highest level of skills and technical expertise and to capitalize on the unique opportunity we have to deliver a cloud-native DR solution with built-in backup for all VMware workloads. Our goals for the expanded program are to work with specialized resellers and distributors make DR simple, efficient and cost-effective and to free organizations from the complexity of traditional, legacy infrastructures.” Adding new partnerships Since releasing DRaaS to the market in August 2019, Datrium has expanded its DRaaS Select Partner ecosystem and garnered interest in DRaaS Preferred, adding new partnerships across the U.S., Europe, Australia, New Zealand, and the Philippines including ASI Solutions and BEarena NZ, Bytes Software, CDW, Champion Solutions Group, Citrus Solutions, DCNEXT Holland, Epaton, Mindsight, Novulutions, Prodec Networks, PTS Data Center Solutions, SISL, Spinnakar, Technologent, and TrustCo.
Vidsys, a global developer of Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) technology solutions, announces the release of the latest version of its security software platform – Vidsys Enterprise 2020 R1.0. Vidsys Enterprise 2020 R1.0 is the first release of the product’s 2020 iteration, which focuses on continuing to provide security and performance optimizations to better support the user’s experience. Mapping and visualization enhancements This release includes significant mapping and visualization enhancements, robust rules and streamlined RRP (Riskshield Rules) configuration, improved Arabic user interface for better support of users in the Middle Eastern market, and the introduction of automatic reporting in the Enterprise Business Intelligence (EBI) dashboard. Key new features include: Updated map viewing architecture including WMS overlay and Apple Maps support Camera map icon status overlays Camera viewer title bar custom buttons and design updates Situation policy updates for default severities and audio alerts Set maximum concurrent user sessions limit in non-SSO environments Automatically log off idle users Improved Action Plan automation and read-only fields Automatic reports email distribution and other new reports and enhancements
Synology Inc. has announced the availability of the SA3600 storage system, the latest device in the SA family of high-performance and versatile, petabyte-capable network attached storage servers. Built to tackle both existing and future data storage requirements, SA3600 provides businesses with access to faster and larger on-premises storage in a cost-effective package. "In response to the rising demand for on-premises data storage, we built the SA series to help businesses reach petabyte-scale storage," said Michael Wang, Product Manager at Synology Inc. "SA3600 provides massive storage and high performance to meet the ever-growing compute requirements and to facilitate IT transformation for large-scale businesses." Versatile architecture to accelerate workload Powered by an Intel Xeon 12-core processor, the SA3600 is scalable up to 180 drives. SA3600 provides petabyte-scale storage capacity, suitable for massive surveillance deployments, video post-production, and other business environments. Support of both 2.5" and 3.5" SAS/SATA drives increases flexibility and prevents vendor lock-in, minimizing total cost of ownership (TCO). Performance: Over 5,500 MB/s sequential throughput and 176,000 4K random write IOPS1 Scalability: Up to 1,536 TB storage capacity with 7 expansion units2 10GbE built-in: 2 x 10GbE and 4 x 1GbE Ethernet ports PCIe 3.0 expansion: 2 x PCIe slots for additional network interface card support Virtualization-ready: Certified for VMware vSphere, Microsoft Hyper-V, Citrix XenServer, and OpenStack Cinder Easy to deploy by IT departments and greatly simplifies operations with comprehensive tools designed for businesses to safeguard their data. Integrated data protection and availability VM, SaaS, and endpoint protection Centralized backup solution to protect VMware and Windows Server virtual machines, Windows endpoints, Office 365, and G Suite accounts. Manage all the backup tasks from one single console and restore data instantly with flexible recovery methods. Prevent data loss with snapshots and replication Synology Snapshot Manager integrates with VMware and Windows for application-consistent data protection. Snapshot Replication enables Shared Folder and LUN protection for all other workloads. Maximize availability Add in another SA3600 to combine two servers into a single high-availability cluster. The active/passive structure ensures smooth service transition between clustered servers in the event of hardware failure.
UK CCTV camera manufacturer, 360 Vision Technology, announce that its Predator ‘all-in-one’ PTZ range is now an accredited Vision HS camera solution, certified to have completed the CAPSS approval process by the Center for the Protection of National Infrastructure (CPNI). Ensuring cybersecurity measures are capable of protecting against the very real threats faced by surveillance system operators, 360 Vision Technology’s team of software developers is constantly working to ensure that these threats can be averted. Video management software “There has been a lot of negative press relating to the potential vulnerabilities integrators may accidentally introduce into their customers’ surveillance systems,” says Adrian Kirk, Strategic Account Director at 360 Vision Technology. “With concerns over the ease at which some edge devices can be used as an access gateway by cyber criminals, we’re taking cybersecurity seriously and helping integrators to mitigate that risk by specifying Predator UK manufactured cameras and Vision HS video management software." “Action to remove these threats is unlikely to happen fast as the UK market is still flooded by potentially unsafe Far East CCTV cameras that are being sold at bargain basement prices, which make them commercially attractive to some purchasers. The problem is further compounded by installation companies who may have limited expertise when it comes to providing tight network security.” Security and corporate confidentiality 360 Vision cyber security protection ensures surveillance capability is not compromised" "For example, steps should be taken to prevent the edge device’s set-up browser being accessed - enabling a hacker to disable or change critical camera settings, or worse, access the wider corporate network. However, supporting peace of mind for any integrator or end-user, when a 360 Vision Technology Predator camera is deployed at the edge, it cannot be used to enable unauthorized access to a security or corporate network.” Despite the increased emphasis on cybersecurity, and more and more sophisticated cyber-attacks taking place, many leading camera manufacturers still supply easy to get to, direct access points (typically via an RJ45 port), located within a camera’s power supply – but removing this risk is essential to ensure security and corporate confidentiality is not compromised. Cyber security protection “360 Vision cybersecurity protection ensures surveillance capability is not compromised, by removing the risks associated with insecure camera access,” Adrian concludes. “To provide additional protection for our customers, we are proud to announce that the ‘Predator HS’ product range is now an accredited camera solution to work with Vision HS - certified to achieve CAPSS approval by the CPNI.”
Meesons, UK’s entry control innovator, will be unveiling its innovative EasyGate Superb at this year’s International Security Expo (ISE19), Olympia London, 3-4 December, stand K40. At 99mm the EasyGate Superb cabinets are the slimmest of any Speed Gate on the market, accentuating the sleek, minimalistic aesthetics created by the glass wings. EasyGate Superb is an ultra-slim, fully customized Speed Gate that is an ideal solution for controlling access to offices, schools, universities or government buildings. The range includes unique and innovative features, including an optional integrated card collector and QR code/ barcode reader. EasyGate Superb can be specified in colors to match a customer’s corporate identity. Its ultra-slim design has already generated significant interest and Meesons is predicting that it will continue to be a major focal point for visitors to stand K40 at ISE19. Gain independent access The EasyGate Superb is the only Speed Gate on the market with such a slim design yet featuring the ability to integrate an optional card collector with a card return function. Where required, a third-party card reader can be built into the EasyGate Superb. The QR scanner, another optional feature, will help improve the efficiency of visitor management - it will be possible for an external visitor to receive a QR code on their cellphone phone, allowing unimpeded entry to the facility on arrival without having to verify credentials. The QR code reader can also be used by delivery partners where there isn’t a permanently staffed reception. Sending the QR code in advance will mean they are able to gain independent access to specific areas of the facility. Intuitive light guidance The sensors are smart enough to detect when a person is traversing in a wheelchair, wheeling luggage or pushing a baby carriage Both the QR scanner and card collectors are an integral part of the design, meaning they don’t need to increase the cabinet width or be a bolt on like other ranges. This helps maintain sightlines of the ultra-slim cabinets, which are supplied in brushed, polished or bronzed stainless steel, any RAL color or alternative surface finishes, along with tempered glass top lids. Other optional functionality of the EasyGate Superb range includes intuitive light guidance; colored LED illumination of the top lid allows smart settings of light navigation. In addition to standard navigation functions, various lighting effects such as arrow, dots, blending colors and much more can be set. The selection of colors is fully customizable. Safety and security Jonathan Bairam, Commercial Director at Meesons A.I. Ltd, said: “We will have our new EastGate Superb in sleek white on display at ISE19 on 3-4 December. Visitors will be able to view and try this unique new product for themselves. We are expecting a lot of interest especially as its ultra-slim design and minimalistic aesthetic will appeal to specifiers and their clients in a wide range of sectors.” Safety and security are built into EasyGate Superb with 24 pairs of IR sensors that prevent people tailgating their way into a facility without presenting the correct ID or security tag. The sensors are smart enough to detect when a person is traversing in a wheelchair, wheeling luggage or pushing a baby carriage. Optional high glass wings prevent climb-over attempts by would-be intruders.
Small business owners work hard. They are often the first ones there in the morning and the last to leave at night. Even then, they likely bring their work home with them. During that time, everything they do is aimed at making their business as successful as possible. Because of this, many business owners don’t take vacations, and if they do, they spend a lot of time worrying about their business while they’re away. In both cases, the potential for burnout is tremendously high. The primary concern for these individuals is loss, whether from theft, waste, vandalism or other causes. Depending on the degree of the loss, it can have a devastating effect on small business. Therefore, professional security solutions must be top of mind for these businesses. Small business owners can take advantage of advanced technology that can help them work smarter, not harder Video Surveillance For Small Businesses One technology that can address loss, the feeling of helplessness that comes from not being on site and more is video surveillance. Sadly, it’s not always on the radar for small business owners, many of whom think video surveillance is very expensive and out of reach. But that couldn’t be farther from the truth. There are high-quality, relatively inexpensive solutions that don’t require much, if any, configuration, allowing an installer to place cameras, run cable, plug cameras into the recorder and use software to get end users up to speed on remote access. Best of all, almost all of these solutions come with a mobile app or other means of accessing video—both live and recorded—remotely from a smartphone or tablet. In a world where our phones have become our lifeline to a lot of information, including email, banking, inventory management and more, a security system simply has to provide this type of access. Given the availability of cost-effective video surveillance solutions and their ease of use, small business owners can take advantage of advanced technology that can help them work smarter, not harder in a few key areas. Video surveillance solutions come with a mobile app for accessing video remotely from a smartphone or tablet Efficient Incident Monitoring Having a high-quality video surveillance system with proper coverage means that any time an incident or loss occurs, a small business owner can go back and find it on the video and identify exactly what happened. For example, if something goes missing from a retail store, reviewing the video will reveal exactly what happened, when it happened, how it happened and—depending on lighting, camera resolution and field of view—possibly who took it. Video systems can also be valuable from a liability perspective. Slip-and-fall claims are not uncommon, but in many cases they turn out to be false. Thankfully, cameras can provide video that will support or refute a claim. Without video, such incidents could be costly for small businesses. A simple review of recorded videos will solve any mystery and eliminate the potential for a long argument with no evidence Video Recording For Incident Verification Another example would be a customer who claims they were shorted on the change they received from a cashier. Rather than taking the time to count the money in the drawer and reconcile that with receipts, a small business owner could simply review video from a camera placed above the point of sale to determine if the customer’s claim is correct or if they may have been mistaken. This feature can also help alleviate or avoid a potentially awkward or difficult situation when there’s a difference of opinion with a supplier. Say for instance a delivery driver claims he or she brought three cases of product to the back door, but there are only two cases in the stockroom. A simple review of the video that’s been recorded will solve the mystery once and for all and eliminate the potential for a long, drawn-out argument with no evidence one way or the other. Smartphones For Remote Monitoring It’s natural for small business owners to feel stressed when they’re not at their physical location. After all, they’re the ones who have invested in the business and are responsible for making sure it runs smoothly and profitably from day to day. For small business owners with surveillance systems, vacations can become not only a reality but also the relaxing time they are supposed to be. For small business owners with surveillance systems, vacations can become not only a reality but also the relaxing time Rather than sitting on a beach and worrying about whether the store opened on time or if employees are doing what they’re supposed to be doing, an owner can pull out his or her smartphone, log in to remotely to the video system and know for sure. That peace of mind is invaluable for small business owners. This is also helpful for business owners with multiple locations. Because no one can be in two—or more—places at once, a video surveillance system can provide eyes and in some cases ears at a location, which can be accessed at the click of a button. Video Surveillance For Training For a small business, it’s imperative that employees follow established policies and that staffing levels are maintained at the most efficient level possible. These are two other areas where video surveillance can help. If a small business owner sees that something isn’t being done properly, whether by a single employee or if the problem is more widespread, he or she can use video for training purposes. They can sit down with the employee or employees to review the video and explain the proper policies and procedures. Conversely, video can be used to demonstrate proper techniques or even to recognize employees for a job well done. From a staffing standpoint, reviewing video could reveal unexpectedly busy or down times Maintaining Staffing Levels From a staffing standpoint, reviewing video could reveal unexpectedly busy or down times. A business owner can review video from 3 p.m. on a Saturday to see how many customers are in a location and determine the ratio of employees to customers. Looking at a variety of times over a period of weeks or months could help determine optimal staffing levels, which may lead to the decision to increase staffing on Saturday afternoons when a store is busy. This will help improve customer experience and potentially increase sales. Motion Detection For Accurate Access Control Cameras can be deployed with motion-detection sensors to alert business owners when someone enters a certain area, whether during or after business hours. In many cases, detected motion can trigger an alert and/or a video clip to be sent to the business owner’s smartphone so they can review and verify whether something is out of the ordinary. These deployments could be set up to monitor a variety of locations, such as an office, safe, doors and other sensitive areas at all times or just during specific hours. If motion is detected during off hours, the business owner can view video and alert police that an unauthorized individual is at their business. Surveillance videos can be used to demonstrate proper techniques or even to recognise employees for a job well done Cybersecure Video Surveillance Systems From a cybersecurity perspective, manufacturers are constantly releasing firmware updates to protect cameras from malware and/or unauthorized intrusion. Once someone has accessed any device, all systems and devices connected to the same network become vulnerable. Updating these devices tends to be an afterthought for small business owners, who may either forget or simply not have the time to do it. So it should come as no surprise that these important updates often go uninstalled. Today’s advanced video systems overcome this obstacle with easy updating, which can be performed by small business owners or installers to ensure constant protection. Other systems are available with auto-updating capabilities, which remove the onus from small business owners completely. Today’s advanced video systems overcome cyberthreats with easy updating Cost-Effective Surveillance Solutions These are just a few of the many benefits video surveillance systems offer small business owners. What’s important to note is that for each to be successful requires having to have the right camera for the right environment. For instance, a camera positioned at the back door of a business has to have wide dynamic range to deal with changing light levels throughout the day. A camera used to monitor transactions must offer high enough resolution to identify bill denominations. Today’s solutions are cost-effective, easy to use and offer the flexibility to monitor operations from anywhere at any time – giving small business owners the power to work smarter, not harder to grow their bottom line.
Technology is changing the look and function of today’s security control rooms. Old-school CRT (cathode-ray tube) monitors are giving way to the thinner, flat screen monitors in the control room environment, but the transition is gradual. Randy Smith of Winsted still sees many control rooms that need to make the conversion, which is a boon to his company’s business. Furniture today is designed differently to accommodate the thinner monitors, often with larger screens. Need For Integrated Rack Systems With the increase of IP-based systems comes the need for integrated rack systems that include advanced functionality such as cable management, adds Jim Coleman, National Sales Manager, AFC Industries. Server rooms are environmentally controlled by cooling systems and power systems monitored on the IP network. Low-profile flat screens allow centers to utilize space vertically, thus creating a smaller footprint for the consoles. Additionally, with IP-based systems, workstations will have a smaller footprint because there is less cumbersome equipment. In most cases the servers are stored in a secured, climate controlled environment to eliminate overheating of the servers and maintain their security, says Coleman. This environment also helps with cable and power management. AFC builds technical furniture racks that adhere to the precise needs of computer network server room operators. The company designs and fabricates LAN workbenches with versatile functionalities, and server room workstation racks that are scalable. There is a complete line of IT workbenches, IT computer racks and computer server rack mounts with flexible mounting options. In most cases the servers are stored in a secured, climate controlled environment to eliminate overheating of the servers and maintain their security Flexible Control Room Designs Matko Papic, Chief Technology Officer of Evans Consoles, says the transition from bulky CRT equipment to flat-screen (lower profile) monitors was a major disruption in control room design; it changed the whole dynamic. Another evolution is the use of IP video streaming, which allows more flexibility in manipulation of audio-video content, and requires more flexible control room designs. Another shift, driven by larger, higher-definition monitors, is a shift to fewer monitors that display more information. Instead of a smaller monitor for each information stream, larger monitors now consolidate that information into “dashboard” displays. Looking ahead, control rooms will need to be more flexible, both in the initial design and the ability to adapt to changing technology, says Papic. Legacy customers who are currently using PCs may be moving to more remote applications. Sit-stand equipment will continue to be increasingly prevalent. “There will be more emphasis on flexibility, technology integration, and the ability to change over the life of the system,” says Papic. Consolidation Of Multiple Operations Into A Single System A trend in security is consolidation of multiple physical operations into a single system, says Papic. As a result, more customers are taking more interest in alarm management and situational awareness. How is the technology being used in terms of alarm triggers? How can the systems react rapidly and provide information to a larger audience in the control room? These questions impact how control rooms are designed, and Evans Consoles can adapt lessons learned from other markets to these trends in the security arena. Greater use of technology is inevitable, says Coleman of AFC Industries. “It is virtually impossible for humans to monitor all security data at the street level in our cities,” he says. “As computers become more powerful and their programs more all-encompassing, we will see a greater shift to robotic and technology uses that will provide enhanced monitoring capabilities and safety reactions.” Read our Control Rooms series here
Companies that have developed a culture of openness can provide and receive feedback at all levels “The nail that sticks out gets hammered down” is an old Japanese saying that took hold in our post World War II corporate America culture. This phrase encourages an unspoken rule of conformity combined with an authoritarian hierarchical structure. Today it is important for business leaders to consider the impact this has in American workplaces. Brent O’Bryan, SPHR at AlliedBarton Security Services explains that a winning formula for both the organization and an individual is a culture actively exhibiting healthy behaviors and practices, combined with a zero-tolerance policy for any inappropriate or troubling behaviors. Chicago, Baltimore and Philadelphia are examples of metropolitan markets that wrestle with significant violence on the streets. In all three cities, law enforcement and the state attorney’s offices face the headwind of a “stop snitching” culture. When criminals and bullies are accepted as commonplace and have greater influence than the law, their actions will not be reported, and the perpetrators themselves will ultimately not be held accountable for their actions. An anti-snitching philosophy also infiltrates many workplaces as criminals, or at least those who have yet to be found guilty, and bullies become the employees sitting in the next cubicle or office. Or worse, they become the boss. People who feel they are in a safe and secure environment are capable of achieving great things When individuals see something but say nothing, or when organizations discourage, intentionally or otherwise, the active reporting of concerning actions and behaviors, the probability of violence in the workplace increase. So, what can an organization do to transform from a “see something, say nothing” culture to a “see something, say something” culture? Organizational culture, policy and practices need to be objectively evaluated, and if necessary, changed. The culture of an organization will always trump policy when the two are not aligned. And, culture is often best defined by the accepted behaviors and practices in an organization. While the printed or preached culture may be a positive one, if the reality of what is practiced every day is not, senior leadership needs to take steps to make the desired culture a reality. The following are some areas that business leaders in human resources and other senior leadership roles should review, analyze and work collectively to change. Tame Senior Management Bully Squads If leadership fosters a workplace bullying culture, then this attitude and behavior will trickle down, permeate and dramatically alter the work culture in an extremely negative fashion. Human resource leaders, in particular, need to demonstrate to senior management that the adverse culture fails to foster productivity, teamwork and creativity – three vital objectives that every company wants to fulfill. Human resource leaders may consider corporate wide surveys, implemented by a third party vendor, that poll employees anonymously. If employees know that they can vent their frustrations and share feedback anonymously, without fear of losing their job, real change can start to occur. Companies with a secure work environment increase productivity Create Leadership Development Programs Nurturing in-house talent with a well-defined leadership development program makes employees feel more connected to the business, eases the chain of succession and empowers employees to be more creative, connected and engaged. Just as there are companies in many shapes and sizes, leadership development programs differ dramatically from company to company. The end goal of these programs is that employees have an opportunity to improve their skills through classes and workshops, have access to promotional opportunities as they arise, and feel a sense of community and kinship with their company. Leadership development begins with recruiting as human resource professionals seek individuals who can successfully lead their company’s mission. Develop Culture of Openness Companies that have developed a culture of openness can provide and receive feedback at all levels. A 360-degree feedback initiative can be a valuable option but is only recommended after a company has begun its journey to developing an open culture. If the workplace still fosters a "see something, say nothing" ideology, employees will not be forthcoming for fear that their confidence won’t be kept, or that the source of negative or constructive feedback will be too easily identified. A third party survey company should be brought aboard to confidentially assess feedback by employees at all levels of the organization. Establish Reporting Mechanisms It is important for an organization to establish clear reporting lines. These should be made especially clear in policies and procedures and communicated frequently. The expectation that employees report inappropriate, violent or suspicious activity can only be realized when there are measures in place that allow and encourage reporting. Leadership effectiveness is dependent upon the ability to gain the trust of the people who work for them. This also assumes that the one holding the trust – the employee – will perform certain desired behaviors, and that the leader has both the desire and ability to “walk the talk.” People who feel they are in a safe and secure environment are capable of achieving great things. It is up to their leaders to tap into this fundamental optimism and allegiance, and move them forward to success. By building a successful organizational culture where employees feel safe, not threatened, and not maligned by their bosses, they will flourish creatively and be more productive. By developing a culture where employees understand the range and varieties of workplace violence and its warning signs, they will feel empowered to do something about it.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
Security is more-than-ever linked to consumer electronics, especially in the residential/smart home market. CES 2018 in Las Vegas is therefore brimming with news that will have a direct impact on the security market, today and especially looking into the future. Products for the future of security CES is a giant trade show for consumer electronics with 2.75 million net square feet of exhibitor space and featuring more than 3,900 exhibitors, including 900 startups - in contrast, ISC West has some 1,000 exhibitors. During the week-long show welcoming 170,000-plus attendees from 150 countries, more than 20,000 new products are being launched. The products incorporate ingredient technologies such as artificial intelligence and 5G that will also be familiar elements as the future of the security industry unfolds. Familiar players at security shows also have a presence at CES, and many consumer technologies on display offer a glimpse of what’s ahead for security The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. Key Security Technologies At CES 2018 Familiar players at security shows also have a presence at CES. For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? At CES, Johnson Controls is announcing support for Apple HomeKit now offered in their DSC iotega wireless security and automation solution. Consumers can manage both their security system and also other home automation abilities using Apple’s Home app, or Siri on their iPhone, iPad or Apple Watch. Interlogix is announcing new features and components of its UltraSync SmartHome system, including hands-free voice control, high-definition cameras, an LTE cellular module and soon-to-be-released doorbell camera. The areas of consumer electronics and security are closely intertwined Developments In Crime Awareness ADT has a high profile at CES, including the launch of its ADT Go mobile app, equipped with 24/7 emergency response from ADT’s live monitoring agents and backed by Life360’s location technology, providing emergency response, family connectivity, safety assistance and crime awareness. ADT is also unveiling a video doorbell and expanding its monitoring to cybersecurity. IC Realtime is introducing Ella, a cloud-based deep-learning search engine that augments surveillance systems with natural language search capabilities across recorded video footage. Ella enables any surveillance or security cameras to recognise objects, colours, people, vehicles and animals. Ella was designed using the technology backbone of Camio, a startup founded by ex-Googlers who designed a simpler way to apply searching to streaming video feeds. It’s a “Google for video:” Users can type in queries such as “white truck” to find every relevant video clip. Smarter homes and smarter computers Do-it-yourself smart home security company Abode Systems announces iota, an all-in-one system giving customers more freedom and flexibility to build out and monitor their smart home. The new form factor has a built-in full-HD resolution camera enabling customers to see and hear what’s going on in their home 24/7 while a built-in gateway supports hundreds of devices to make homes more convenient, safer and more secure. There is also support for Apple HomeKit. Highly programmable and high-performance platforms will no doubt play a role in the future of video surveillance systems in our market The Z-Wave Alliance will host 30-plus leading smart home brands in the Z-Wave pavilion at CES. A full walk-through home will demonstrate different brands working together to create one cohesive smart home experience. Sigma Designs unveils its 700-Series Z-Wave platform, including numerous performance and technology enhancements in energy-efficiency and RF performance. Personal protection in attendance Self-defence product company SABRE will debut a combination pepper spray with dual sound-effect personal alarm that “alternates between the traditional wailing sound and a primal scream, while a strobe blinks 19 times per second to disorient assailants.” SABRE’s Modern Fake Security Camera includes “sleek, realistic design to deter would-be thieves.” Chip maker Ambarella is introducing the CV1 4K Stereovision Processor with CFflow Computer Vision Architecture. The chip combines environmental perception with advances in deep neural network processing for a variety of applications, including video security cameras and fully autonomous drones. At CES, applications will focus on automotive uses, including advanced driver assistance systems (ADAS), self-driving, electronic mirror and surround view systems. The highly programmable and high-performance platform will no doubt play a role in the future of video surveillance systems in our market. A full walk-through home will demonstrate different brands working together to create one cohesive smart home experience Extending home security and efficiency The Ring whole-house security ecosystem creates a “Ring of Security” around homes and neighbourhoods. Products include “Stick Up” indoor/outdoor security cameras, integrated LED lighting, a “Ring Alarm” integrated bundle for $199 including a base station, keypad, contact sensor, and Z-Wave extender. “Ring Protect Plans” include 24/7 professional monitoring. The “Streety” phone app, from Vivint Smart Home, extends home security into the neighbourhood. Streety makes it easy for neighbours to monitor neighbourhood activity through a network of shared residential cameras. They can keep an eye on kids, cars and property through live video feeds and use recorded video clips to investigate incidents. A new device making its debut at CES is the Walker “commercialised biped robot,” from UBTECH Robotics, which provides a complete home butler service and is designed to ease the day-to-day operations of a busy home or office. The varied of functions includes video surveillance monitoring, security patrol monitoring, motion detection and “instant alarm,” as well as dancing and playing games with children. The company says Walker will “bridge the gap between technologies that were once only available in scientific research institutions and everyday people.”
National Bank of Umm Al Qaiwain (the Bank) is a Public Shareholding Company incorporated in Umm Al Qaiwain by Amiri Decree Number (1) on January 5, 1982, issued by His Highness, the Ruler of Umm Al Qaiwain and commenced its operations with effect from August 1, 1982. The Local government of Umm Al Qaiwain is the largest shareholder and promoter of the bank. The bank is engaged in providing retail and corporate banking services through a network of 14 branches in U.A.E. The Bank carries out Islamic banking operations through Islamic Banking window established in 2005 across its branch network. They were searching for a fool-proof solution that would help them in managing the Time-Attendance and overtime calculation. With offices spread over 14 locations in UAE, management of attendance data was a daunting task. centralized attendance data management All manual work for report generation was eliminated outrightly, simplifying the salary procedure Thus, centralized attendance data management and maintaining a complete record of their employees were a part of their key requirements. Moreover, their payroll processing deployed a software - RAMCO, wherein the attendance data was manually entered. After a comprehensive discussion with the customer, Matrix offered a centralized platform - COSEC CENTRA, to manage all the data centrally. Door controllers - COSEC VEGA FAX installed in all the office entrances. These door controllers are integrated with the central platform that pushes the event data to the server. Furthermore, the Matrix platform is integrated with the payroll system - RAMCO. All manual work for report generation was eliminated outrightly, simplifying the salary procedure. After implementing Matrix solutions, NBQ witnessed drastic changes while following their processes. Customized attendance policy formation Effortless attendance management of multiple locations from the Head Office was prominently one of them. The shift allocation and shift correction processes were streamlined. Their solution included some advanced features like customized attendance policy formation and real item alert on attendance related event & auto-scheduled reporting. This, in turn, ensured efficient employee database management improving productivity. Products and solutions offered: COSEC VEGA FAX A complete Time-Attendance and Access Control solution with a blend of aesthetics, size, connectivity, reliability and ease-of-use. Designed for large enterprises with multi-location organizations. COSEC CENTRA PLT A web-enabled application server that controls the entire system from anywhere in the world. It is the heart of the entire solution and acts as a bridge between applications and the devices. COSEC CENTRA TAM An enterprise-grade solution, designed for organizations the Time-Attendance and Leave Management processes like recording entries and exits, salary processing, etc.
Critical building management and security systems at one of the most advanced super-high-rise towers, the landmark Wasl Tower in Dubai, are to be integrated with Maxxess eFusion technology. The 302-meter multipurpose tower, which will be operated by the Mandarin Oriental Hospitality Group, incorporates offices, guest rooms, public areas and apartments, and is situated in a pivotal Dubai location. The Wasl Tower is designed with advanced sustainability features including natural shading and cooling, adaptive lighting, one of the world’s tallest natural ceramic facades, and a vertical boulevard. eFusion was selected for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. With a modular, building block approach, eFusion provides an umbrella management system and drives service efficiency by removing the need for operators to continually switch between systems. Visitor management system By keeping it simple and integrating with the widest choice of technologies, Maxxess removes the complexity A key use of the technology will be to integrate back-of-house operations at the Wasl guest apartments with front-of-house systems, for maximum ease of use and operational efficiency using the Maxxess unified platform. This eFusion solution comprises a 900-plus reader ASSA ABLOY VingCard access control system, a 1700 camera Hanwha surveillance system, and advanced key management with Deister ProxSafe, and it will use the BACnet protocol to integrate the building management system (BMS). The Tower will also benefit from Maxxess VisitorPoint visitor management system, a Zenitel intelligent communication system and disabled call-to-assist alarms. The VisitorPoint integration will improve the guest and resident experience, reduce administration and front-desk queuing, and ensure smooth running of functions from visitor and contractor management to collections and deliveries, and security. Streamline security, safety and facilities management “The challenge with projects of this scale is to find a simple, straightforward platform that communicates with everything and works with all the systems involved,” says Lee Copland, Managing Director EMEA, Maxxess. “By keeping it simple, and integrating with the widest choice of technologies, Maxxess removes the complexity.” The Wasl Tower project is the latest of a growing number of mixed-use developments, including hotels, retail, office and residential complexes to use eFusion to streamline security, safety and facilities management. Last year Maxxess won an Intersec Award for its major eFusion implementation at Bluewaters Island.
PINs protect, just ask your credit card company. How many rooms at your office shouldn’t offer an open access, free-for-all? Probably quite a few. But expecting everyone to keep them locked, and the key-carrying and-tracking that entails, is unrealistic. This is when you need Code Handle. Access control system This simple, secure, easy-to-fit handle works with your current door lock. There is no need for you to change the door lock mechanism; just replace the existing handle to add PIN security to an office door. With Code Handle, there is no wiring, no expensive access control system and no need for cumbersome physical keys. Two screws fit a Code Handle to almost any interior office, meeting room, archive or storage room door. The inbuilt electronic PIN pad does the security work for you. Press a 4-digit code on the handle’s integrated keypad and the door opens. Code Handle comes with a Master Code and 9 different user PINs, so you can restrict access to a select group of people — senior managers, the IT department or the office cleaners, for example. User-friendly security Code Handle keeps sensitive documents, meeting rooms and personal belongings safe at your workplace Code Handle also locks itself. Auto-locking ensures an office, storage room or staff toilet is always secure when you close the door. You know for sure nobody has seen the new org chart you left on your desk, nor entered the stationery cupboard without authorization. With Code Handle, user-friendly security comes with clean, elegant design. Forget about ugly push-button-and-twist mechanical PIN locks. The low-profile Code Handle is brushed in stainless steel and satin chrome zinc, in a sleek design to blend with any modern office décor. All the security you need is in the handle. Two standard batteries (CR2) slot inside, and typically last for 30,000 lock/unlock cycles before you need to replace them. An indicator tells you when it’s time to change them. Code Handle comes in left- and right-hand versions. fire tested It is fire tested and enables free exit from the inside of a room. Code Handle keeps sensitive documents, meeting rooms and personal belongings safe and secure at your workplace. You can’t lock every room, nor install CCTV everywhere. With Code Handle, you don’t need to. To learn more about Code Handle, please visit: https://campaigns.assaabloyopeningsolutions.eu/codehandle
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organize up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardizing security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
Hospitals, medical centers, university training centers, clinics and other healthcare institutions are exposed to legal liability, ethical concerns, and subject to litigation and lawsuits, as well as changing regulation worldwide. Facilities have drugs and medical equipment onsite, making them a tempting target for crime. Healthcare Industry Challenges At the same time, aging populations in developed nations will drive increased demand for patient treatment. Rising populations and economic growth are naturally driving healthcare expenditures higher in developing markets. The frequency of physician, medical service provider, and hospital/clinic visits are all likely to rise considerably in the future in both developed and emerging markets. All of this drives the need for video surveillance for security and for active medical treatment activities Arecont Vision megapixel cameras are deployed by healthcare facilities of all sizes and types around the world to increase the quality and coverage of video while driving down costs of installation and ongoing operation. Arecont Vision Deployment Examples Arecont Vision IP megapixel camera technology, both single-sensor and multi-sensor products, has been proven around the world for a variety of healthcare sector needs. Entrances and exits to buildings, grounds, parking structures, car parks and facilities Office areas, emergency rooms, nursing stations, treatment centers, clinics, operating rooms, procedure rooms, morgues and patient wards Pharmacies, drug storage areas, records storage, store rooms, laundry Public areas, reception, lobbies, hallways, cafeterias, kitchens, retail areas Protection from slip-and-fall, workman’s compensation, malpractice, lawsuits and other litigation and compliance Perimeter, parking surveillance and license plate recognition Facial recognition, people counting, movement monitoring Access control and staff identification Visitor, patient and staff safety What Arecont Vision’s Healthcare Customers Say “Due to the exceptional resolution provided by Arecont Vision’s megapixel cameras, and the deployment of several panoramic cameras, we have easily expanded our coverage capabilities using fewer cameras with outstanding results." "The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua," said Paul M. Sarnese, System Safety Director, Virtua Health The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua" “Performance sold us on Arecont Vision megapixel cameras. We are using the video surveillance system to look for recorded video of suspicious persons after a description is given. We are also using it to review slip-and-fall complaints and to address issues of employee accountability," said Michael J. Matroni, Emergency Preparedness and Security Manager, Sacred Heart Health System. “The quality of Arecont Vision cameras more than satisfies our requirements for image quality. The system is working very well for us and Arecont Vision is extremely responsive to our needs.” "The International Hi-Tech Healthcare Park will be the first integrated healthcare development in Vietnam to provide a comprehensive healthcare environment employing high tech medical equipment and a professional medical staff. Our new video surveillance system is an important element of that environment," said Lai Voon Hon, General Director of Hoa Lam-Shangri-La, Vietnam.
The internet helped revolutionize the security industry, and technology continues to evolve at a speed and depth that is changing the way people protect their premises. Vanderbilt Flagship Products Cloud technology has resulted in a society that is always connected. For the security industry, this means it is now possible to remotely monitor many locations from hundreds of miles away. This is an area where Vanderbilt solutions carry particular depth. A browser and an internet connection are all that is required to access Vanderbilt’s flagship cloud products, ACT365 and SPC Connect. ACT365 is an integrated access control and video management solution while SPC Connect is one of the strongest intrusion detection solutions on the market. Remote Monitoring Instant Execution Remote monitoring is a backbone feature of these solutions. This ability allows for the elimination of once laborious tasks that are now capable of instant execution through the quick click of a button on cellphones, tablets, or PCs. For example, Travix, an online travel company that use ACT365 at their London offices, wanted remote connectivity with their site through smart devices. ACT365 is delivering this by giving users control of access points via any major web browser or ACT365’s app. When not at the premises, Travix managers also have visibility of access requests to their external doors and diagnostics for door status throughout their offices.Remote monitoring also means both SPC Connect and ACT365 allow for technical queries to be diagnosed and resolved on the go Diagnosing And Resolving Technical Queries Remote monitoring also means both SPC Connect and ACT365 allow for technical queries to be diagnosed and resolved on the go, delivering ultimate control to site security. This enables site issues to be dealt with efficiently, minimizing disruption as these can be addressed immediately and around the clock. SPC Connect provides the ability for a caretaker that oversees maintenance for multiple buildings to manage alarms remotely. If an alarm is triggered at one of these sites while the caretaker is working at a different location and getting to the incident is logistically difficult, they simply take out their smartphone, access the SPC Connect app, view the event, and turn off the alarm. Remote monitoring also means both SPC Connect and ACT365 allow for technical queries to be diagnosed and resolved on the go Keeping Up With Consumer Needs SPC Connect provides the ability for a janitor that oversees maintenance for multiple buildings to manage alarms remotely. If an alarm is triggered at one of these sites while the janitor is working at a different location and getting to the incident is logistically difficult, they simply take out their smartphone, access the SPC Connect app, view the event, and turn off the alarm. Essentially what remote monitoring boils down to is providing ease of use and convenience. Remote monitoring through cloud solutions saves time and money and brings peace of mind. With technology continuing to embed itself into our everyday life, it’s important the security industry proves its agility, adaptability, and dependability in keeping up with consumer needs and remote and instant access to security solutions are an obvious list topper here. In that sense, the remote monitoring provided by SPC Connect and ACT365 are proof that Vanderbilt’s ear is to the ground in 2017. To learn more about Vanderbilt’s SPC Connect and ACT365 solutions, visit www.vanderbiltindustries.com.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
We asked this week’s Expert Panel: What are the limitations on where video cameras can be placed because of privacy? With hundreds of new cameras installed every day, the likelihood increases exponentially that a camera will be placed in a location where it violates privacy. In fact, threats to privacy are often among the largest objections when video surveillance is proposed, whether in a public area or in the workplace. Allaying fears about undermining privacy is a basic requirement to make such systems acceptable to the public. It’s a touchy subject, but one our Expert Panel is willing to address.
What lessons, if any, are there to be learned from the recent attacks in Paris? Recent events in Paris highlight the deadly and changing face of terrorism in 2015. Two gunmen armed with AK-47 assault rifles attacked the Paris offices of satirical magazine Charlie Hebdo on 7 January, killing 12 people in all, including eight Charlie Hebdo employees and two national police officers. Two days later, the terrorism continued with a hostage crisis at a printing firm at Dammartin-en-Goel and at a kosher supermarket in Paris, where four hostages were murdered before the assailant was killed by police. The world has been shocked by the events, and many are evaluating what we can learn from them to help us prevent or minimise such future attacks. We asked our panel if there are lessons to be learned specific to the security industry.
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals