AOPEN, a global technology company that specializes in smart products and services for cloud-based applications, announces the launch of the AOPEN Heat Finder Thermal Imaging Solution − a dual-camera system that quickly and accurately detects elevated body temperatures. "With so many industries facing unique, unprecedented challenges, thermal imaging technology has become more important than ever," says Aaron Pompey, President, AOPEN Pan America. "The new safety-conscious consumer ex...
The unprecedented global impact of COVID-19 has taken its toll on all of us, but as cases of the virus thankfully recede, employers are now forced to confront how they can enable a safe return to work for employees. For many employers, this means they will have to carry out a COVID-19 risk assessment, redesign workspaces to maintain social distances, carry out more frequent cleaning, manage the transmission risk and find alternatives to touch-based security devices. Protecting workplace occupan...
Returning to work after the global pandemic will not be business as usual, and security systems are an important asset when it comes to helping to keep occupants and buildings safe. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. These foot-traffic patterns can inform settings for a variety of devices – like ventilation and temperature controls – and even he...
Now that Europe is taking the first steps towards economic and social recovery after the COVID-19 crisis, it is also time to rethink the future. European politicians and institutions are now joining forces to present a recovery plan that builds on existing plans and ambitions to make the society healthier, more environmentally friendly, more energy efficient and safer. Euralarm calls on policymakers to take measures to increase the security of renovated buildings and to strengthen the cohesion...
Identiv, Inc. announced the availability of Hirsch Velocity Software with Contact Tracing. Available via download for Hirsch customers, the free feature has been launched to support worldwide office re-openings with improved health and safety management tools. Based on the Centers for Disease Control and Preventions’ (CDC) recommendations, contract tracing is a key strategy for preventing further spread of the novel coronavirus (COVID-19). Hirsch Velocity Software with Contact Traci...
Covid-19 can be stopped right at the entrance to office buildings, schools, hospitals, factories and in public transportation using the hi-tech infection control products launched by Gunnebo, the Swedish global provider of smart access control solutions. The new family of access control solutions supports the smooth return to a safe working environment by providing automated infection prevention through contactless processes, maximized social distancing, and enforcement of body temperature and...
With Hub 2, a user will no longer need to live under round-the-clock camera surveillance to know why an alarm has gone off. Like the first generation of hubs, Hub 2 protects the user’s property against burglars, fire, and flood. But unlike its predecessors, it sends not only alarm notifications but also animated series of images from MotionCam motion detectors. Thanks to the optional Wings radio protocol, a built-in battery, and two SIM card slots, Hub 2 is independent of the guarded facility infrastructure. It will continue protecting the user’s family and property, even if the building has lost power and Internet connection. Hub 2 is a control tool for safe homes, offices, shops, or even industrial facilities. The control panel can manage up to a 100 of Ajax detectors and devices on a distance of up to 2000 meters. Protection of any scale And this is not the limit - the ReX radio signal range extender boosts the hub’s coverage area to up to 16 km². The new hub has three channels to communicate with the users and security companies: Ethernet and two slots for SIM cards. The second slot allows users to improve stability by choosing two different GSM operators. And thanks to the instantaneous switching between communication channels, Hub 2 is guaranteed to transmit photos and alarms even with an unstable Internet connection. The list of features of the Ajax hubs expands every year with the regular updates of the OS Malevich operating system. To ensure the future development of the Hub 2, Ajax Systems has increased the amount of ROM and RAM and equipped it with a fast processor.
Maximize the effectiveness of the installed security system by providing the family and business with an even higher level of protection. The SVGS Series is a shock, vibration and glass break sensor, designed to provide early warning of an attempted intrusion by sensing forced entry before a burglar actually enters the property. This wireless shock sensor is lightweight and easy to install on any glass window, door, roof, or safety box and capable of detecting two different types of forcible attacks, a single major shock event, or accumulated consecutive minor shock attacks. The SVGS F1 models leverage Climax’s industry renowned RF technology to accelerate the speed of signal transmission and deliver reliable, extensive communication range, allowing users to stay in touch, in control, and provide a peace of mind. Smart home system The SVGS Series is a broadly applicable device ready to make users home or business safer and smarter When the SVGS Series are linked with security or smart home system, it can activate a siren, turn on lights, music, or start video recordings when the glass is tampered with, which is often enough to send an intruder running. The SVGS Series’ discreet design makes it unobtrusive and has three adjustable sensitivity threshold levels to choose for different situations and locations. The SVGS-5 model features two-way signal, allowing for setting configurations to be easily adjusted through the security gateway or control panel. The SVGS Series is a broadly applicable device ready to make users home or business safer and smarter. Features Early detection of break-in attempts of glass windows, doors, roof, or safety boxes Detects major shock attack or accumulated minor shock attacks Adjustable sensitivity threshold levels: Low, Medium, High F1 technology accelerate the speed of signal transmission, reliability, and boots communication range. (F1 models only) LED indicator Setting configuration locally on device (SVGS-3 only) Setting configuration remotely on device via Control Panel (SVGS-5 only) Wireless and lightweight for easy installation Works on glass, plywood and safety box Low battery indicator Regular supervision signals to check system integrity Suitable for residential and commercial security usage Specifications SVGS-3-F1 Frequency - 868MHz / 869MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 5.5 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm SVGS-3 Frequency - 868MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 3.5 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm SVGS-5-F1 Frequency - 868MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 5 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm SVGS-5 Frequency - 868MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 2.6 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm Ordering Information SVGS-3-F1 - Shock / Vibration & Glass Break Sensor, compatible with Climax F1 Control Panels and extensive RF range SVGS-3 - Shock / Vibration & Glass Break Sensor, setting configuration on device SVGS-5-F1 - Shock / Vibration & Glass Break Sensor, setting configuration on Gateway or Control Panel, compatible with Climax F1 Control Panels and extensive RF range SVGS-5 - Shock / Vibration & Glass Break Sensor, setting configuration on Gateway or Control Panel
OM Security has achieved a host of benefits having consolidated its employee scheduling, patrol monitoring and mobile workforce management software requirements into a single system. Since the adoption of SmartTask, the company has gained increased visibility and control over 200 security officers, significantly freeing up management time, reducing operating costs and enhancing service delivery The cloud-based solution has also enabled OM Security to launch a new 24/7 control room, further expanding its offering to customers. Monitor proof of attendance “By automating and streamlining our workforce-based processes using SmartTask, we are able to make best use of our resources while providing complete transparency for customers,” explains Jay Jagatia, Director of OM Security. “The software delivers a comprehensive management, rostering and reporting system that is giving us a clear edge and competitive advantage within the security sector.” SmartTask is helping manage the team of security officers – across the OM Security and Premier Services operations SmartTask is helping manage the team of security officers – across the OM Security and Premier Services operations – that provide a range of services including manned guarding, mobile patrol and alarm response at over 1,000 customer sites nationwide. SmartTask enabled smartphones monitor proof of attendance, completed patrol checkpoints and lone worker welfare, with GPS location tracking for added accuracy and peace of mind. Streamlining financial procedures Security officers are also using SmartForms to capture electronic data and photos for inspections and incident reporting. OM Security’s new 24/7 control room, based at its office location in Ascot, Berkshire, is underpinned by SmartTask’s live monitoring features. The interactive dashboard provides a real-time overview of how the business is performing, with at-a-glance visibility of the attendance, status and safety of all security guards. This allows the company to quickly identify where critical issues are occurring and respond quickly to any operational issues and incident alerts. SmartTask’s advanced reporting is also enabling OM Security to simplify billing and payroll by accessing highly accurate timesheet and activity data. Not only is this streamlining financial procedures, but also dramatically reducing incoming calls from customers and staff including a 98 per cent and 80 per cent reduction respectively in invoice and wage queries. Individual security operation The team at SmartTask are continually looking at new ways to update and improve the software" Meanwhile, clients can access service delivery details through a web-based customer portal for total transparency of their individual security operation. “With SmartTask, we have everything needed, right at our fingertips, so we can maximize performance, operate efficiently and share vital information both internally and with customers. However, the team at SmartTask are continually looking at new ways to update and improve the software, developing new features based on our feedback and their detailed understanding of the marketplace,” adds Jagatia. Mobile workforce management software Paul Ridden, CEO of SmartTask commented: “The unrivalled functionality of SmartTask means businesses within the security sector are now able to bring together a wide range of business and operational requirements into a single system." "This is why a growing number of SME, mid-sized and top 30 security companies are already benefiting from the strong return on investment, delivered by the most comprehensive employee scheduling and mobile workforce management software currently available.”
To limit the spread of COVID-19, many governments, municipalities and enterprises world-wide are introducing new health and safety measures to ensure that all entrants to public buildings are screened for above average temperatures. In response to these new measures, Pangea, a global supplier of digital identity and security solutions is announcing the integration of thermal imaging technology as part of its biometric access control and incident management solution. The thermal imaging technology implemented by Pangea, was first introduced during the SARS outbreak in Asia in 2002 and enables security personnel to scan a continuous flow of people entering a public space or building. Thermal Imaging Access Control technology is faster and more suitable for the movement of masses of people as it does not require people to stop and line in line while their temperature is taken. Thermal imaging technology Biometric and Thermal imaging technology initiatives have been implemented as part of South Korea’s response to COVID-19, helping the country to ‘flatten the curve’. South Korean government ministries have been working together using a ‘Coronvirus Data Hub’ to provide accurate data about those infected by COVID-19, which has helped manage the spread and reduce new incidences of COVID-19. South Korea’s experience shows that “diagnostic capacity at scale is key to epidemic control,” says Raina MacIntyre, an emerging infectious disease scholar at the University of New South Wales, Sydney. Automated thermal imaging technology This technology offers a non-intrusive, non-contact solution for controlling the spread of viral infections “Our Geriatric Hospital serves residents with a high risk of contracting COVID-19,” said Deborah Goldberg, Head Nurse, Beit Hadar Geriatric Medical Center. “The installation of the Pangea Bio-Thermal Imaging Access Control solution gives us and our residents another solution for protection against the virus in these troublesome times.” For Pangea, a company with over 25 years’ experience in the deployment of complex large-scale digital identity and security projects, the integration of automated thermal imaging technology is an obvious next step. This technology offers a non-intrusive, non-contact solution for controlling the spread of viral infections in large-scale public spaces including office buildings, shopping malls, educational campuses, sports arenas and cultural centers. Security infrastructure solution For the enterprise organization, Pangea can integrate these digital heat sensors with other corporate digital security mechanisms such as biometric face recognition to create a more robust security infrastructure for corporate facilities. “The outbreak of COVID-19 has changed the world and is expected to have a significant impact on our daily lives, today and in the future,” says Rafi Kaminer, CEO and founder of Pangea. “We think government and enterprise organizations need to take on a new “social role and responsibility” to keep people safe from potential COVID-19 individuals who may infect others." "In Israel, only Pangea has the expertise and technology to help public and private sector organizations roll out an automated bio-thermal imaging solution as part of our broader safety and security infrastructure solution for any type of facility, at any scale, anywhere in the world.”
ExtraHop, a provider of cloud-native network detection and response, announced the results of a SANS Institute survey, Network Visibility and Threat Detection. According to the report, more than 64 percent of respondents reported suffering at least one successful attack within the last year, and 59 percent believe a lack of network visibility poses a high or very high risk to their operations. Perhaps most concerning in light of the recent large-scale shift to remote work, 44 percent of respondents see employee desktops as the most likely attack vector. As enterprise organizations and government agencies grapple with how to enable, manage, and secure newly distributed remote workforces, network visibility is more critical than ever as they adjust to the new IT reality. Accessing enterprise resources The survey exposes key gaps in enterprise security, including that 98 percent of respondents are concerned about their ability to see into encrypted traffic, while over 80 percent identified east-west traffic and network connected devices as areas of opacity. “Having visibility of every device and how they are meant to behave on your network is crucial to understanding what constitutes normal traffic and what could be considered a deviation,” writes survey author Ian Reynolds. Bryce Hein, SVP of Marketing at ExtraHop, concurs. “At a time when organizations are rapidly transitioning to remote work and cloud usage is surging, network visibility has never been more critical,” said Hein. “Organizations need to be able to see into east-west traffic to identify threats in the growing number of cloud workloads, as well as get visibility into which devices are accessing enterprise resources. The fewer tools, less time, and less friction required to get that visibility, the better.” Cloud-based systems In addition to identifying critical gaps in network visibility, key survey findings include: 40 percent of respondents identified cloud-based systems as a potential entry point for malicious actors Growing complexity within the enterprise environment. Over 93 percent of respondents indicated that they manage more than a thousand endpoints, and almost 90 percent manage between hundreds to thousands of servers. Lack of cloud visibility affects security posture. 40 percent of respondents identified cloud-based systems as a potential entry point for malicious actors. At the same time, only 17 percent reported high visibility into their lateral communication inside their network (east–west traffic), including all cloud traffic. Need to reduce tool sprawl. The majority of companies use tooling from more than 10 vendors, with nearly one-fifth utilizing more than 20.68 percent of respondents expressed a desire to reduce the complexity of their systems by reducing the overall number of tools involved in their operations. More network visibility The survey also found that, while organizations want more network visibility, there are operational impediments. Lack of staff (62 percent), lack of time, including having other issues with greater importance, (51 percent) and lack of appropriate skills in the existing staff (46 percent) were the leading concerns. According to Reynolds, machine learning will play a key role in overcoming these challenges. “Choose tools that use machine learning to provide improved analytics for access to the right data in less time,” he writes. “This might assist in meeting staffing concerns and provide faster resolution of unexpected behaviors, threats and incidents.”
Alcatraz AI, developer of secure frictionless access control platforms, has named security industry veteran Josh Jackson as Regional Vice President, Strategic Partnerships. Based in Florida, Jackson will oversee sales, business development, customer service, marketing, and operations for Alcatraz AI. “We’re excited to have a security industry pro lead our East Coast sales operations as we continue to build our innovative frictionless access control platforms,” said Alcatraz AI Chief Executive Officer and Founder Vince Gaydarzhiev. “Josh Jackson has earned a high level of respect throughout his career with leading roles with international security companies and professional organizations. His colleagues consistently report that he is hard-working, dedicated, and very skilled at relaying complex technical processes like those we are developing.” Focusing on video surveillance Josh comes to Alcatraz AI with a wealth of security industry experience. He most recently served as Regional Vice President North America with RightCrowd Software. After focusing primarily on video surveillance he joined STANLEY Security as Director of Global Product Integration leading those efforts in their product business. He has served as Director of Strategic Accounts for Pelco by Schneider Electric and helped start the EMEA Center of Excellence while on assignment in Paris. Josh took a role in the Physical Security Interoperability Alliance (PSIA) global security consortium trying to move away from proprietary systems and into the open standards world. He was a member of the team that took the PLAI (Physical Logical Access Interoperability) specification from an idea on a whiteboard to a commercially available solution. He served as a board member for seven years and Vice Chairman for three of those years. Future of access control The future of access control is in the ability to deliver security without compromising on friction “As a longtime security industry professional, I’ve witnessed many impressive technological advances, but access control in physical security has not been innovating at a pace consistent with the demands of digital transformation. With Alcatraz AI, there is a product to change the way access control ties into the site access experience strategies of many enterprise organizations adding frictionless access, but without compromising the validation and identity assurance required." "That is why I am thrilled to join Alcatraz AI to lead the way in getting the offering to market,” said Jackson. “The future of access control is in the ability to deliver security without compromizing on friction and Alcatraz AI has developed an incredible product that will improve access and overall security for a variety of vertical markets.” Highly secure and frictionless entry Developed by Gaydarzhiev, a former Apple hardware engineer, the Alcatraz Rock is a 3D facial authentication product that works with any access control system. It replaces badging as an access point identification method with facial recognition, 3D sensing, and artificial intelligence to enable highly secure and frictionless entry into physical locations. The Rock uses secure facial authentication, an intelligent enrollment that switches to face-only identification after it has learned an employee’s face, and guards against tailgating.
Small business owners work hard. They are often the first ones there in the morning and the last to leave at night. Even then, they likely bring their work home with them. During that time, everything they do is aimed at making their business as successful as possible. Because of this, many business owners don’t take vacations, and if they do, they spend a lot of time worrying about their business while they’re away. In both cases, the potential for burnout is tremendously high. The primary concern for these individuals is loss, whether from theft, waste, vandalism or other causes. Depending on the degree of the loss, it can have a devastating effect on small business. Therefore, professional security solutions must be top of mind for these businesses. Small business owners can take advantage of advanced technology that can help them work smarter, not harder Video Surveillance For Small Businesses One technology that can address loss, the feeling of helplessness that comes from not being on site and more is video surveillance. Sadly, it’s not always on the radar for small business owners, many of whom think video surveillance is very expensive and out of reach. But that couldn’t be farther from the truth. There are high-quality, relatively inexpensive solutions that don’t require much, if any, configuration, allowing an installer to place cameras, run cable, plug cameras into the recorder and use software to get end users up to speed on remote access. Best of all, almost all of these solutions come with a mobile app or other means of accessing video—both live and recorded—remotely from a smartphone or tablet. In a world where our phones have become our lifeline to a lot of information, including email, banking, inventory management and more, a security system simply has to provide this type of access. Given the availability of cost-effective video surveillance solutions and their ease of use, small business owners can take advantage of advanced technology that can help them work smarter, not harder in a few key areas. Video surveillance solutions come with a mobile app for accessing video remotely from a smartphone or tablet Efficient Incident Monitoring Having a high-quality video surveillance system with proper coverage means that any time an incident or loss occurs, a small business owner can go back and find it on the video and identify exactly what happened. For example, if something goes missing from a retail store, reviewing the video will reveal exactly what happened, when it happened, how it happened and—depending on lighting, camera resolution and field of view—possibly who took it. Video systems can also be valuable from a liability perspective. Slip-and-fall claims are not uncommon, but in many cases they turn out to be false. Thankfully, cameras can provide video that will support or refute a claim. Without video, such incidents could be costly for small businesses. A simple review of recorded videos will solve any mystery and eliminate the potential for a long argument with no evidence Video Recording For Incident Verification Another example would be a customer who claims they were shorted on the change they received from a cashier. Rather than taking the time to count the money in the drawer and reconcile that with receipts, a small business owner could simply review video from a camera placed above the point of sale to determine if the customer’s claim is correct or if they may have been mistaken. This feature can also help alleviate or avoid a potentially awkward or difficult situation when there’s a difference of opinion with a supplier. Say for instance a delivery driver claims he or she brought three cases of product to the back door, but there are only two cases in the stockroom. A simple review of the video that’s been recorded will solve the mystery once and for all and eliminate the potential for a long, drawn-out argument with no evidence one way or the other. Smartphones For Remote Monitoring It’s natural for small business owners to feel stressed when they’re not at their physical location. After all, they’re the ones who have invested in the business and are responsible for making sure it runs smoothly and profitably from day to day. For small business owners with surveillance systems, vacations can become not only a reality but also the relaxing time they are supposed to be. For small business owners with surveillance systems, vacations can become not only a reality but also the relaxing time Rather than sitting on a beach and worrying about whether the store opened on time or if employees are doing what they’re supposed to be doing, an owner can pull out his or her smartphone, log in to remotely to the video system and know for sure. That peace of mind is invaluable for small business owners. This is also helpful for business owners with multiple locations. Because no one can be in two—or more—places at once, a video surveillance system can provide eyes and in some cases ears at a location, which can be accessed at the click of a button. Video Surveillance For Training For a small business, it’s imperative that employees follow established policies and that staffing levels are maintained at the most efficient level possible. These are two other areas where video surveillance can help. If a small business owner sees that something isn’t being done properly, whether by a single employee or if the problem is more widespread, he or she can use video for training purposes. They can sit down with the employee or employees to review the video and explain the proper policies and procedures. Conversely, video can be used to demonstrate proper techniques or even to recognize employees for a job well done. From a staffing standpoint, reviewing video could reveal unexpectedly busy or down times Maintaining Staffing Levels From a staffing standpoint, reviewing video could reveal unexpectedly busy or down times. A business owner can review video from 3 p.m. on a Saturday to see how many customers are in a location and determine the ratio of employees to customers. Looking at a variety of times over a period of weeks or months could help determine optimal staffing levels, which may lead to the decision to increase staffing on Saturday afternoons when a store is busy. This will help improve customer experience and potentially increase sales. Motion Detection For Accurate Access Control Cameras can be deployed with motion-detection sensors to alert business owners when someone enters a certain area, whether during or after business hours. In many cases, detected motion can trigger an alert and/or a video clip to be sent to the business owner’s smartphone so they can review and verify whether something is out of the ordinary. These deployments could be set up to monitor a variety of locations, such as an office, safe, doors and other sensitive areas at all times or just during specific hours. If motion is detected during off hours, the business owner can view video and alert police that an unauthorized individual is at their business. Surveillance videos can be used to demonstrate proper techniques or even to recognise employees for a job well done Cybersecure Video Surveillance Systems From a cybersecurity perspective, manufacturers are constantly releasing firmware updates to protect cameras from malware and/or unauthorized intrusion. Once someone has accessed any device, all systems and devices connected to the same network become vulnerable. Updating these devices tends to be an afterthought for small business owners, who may either forget or simply not have the time to do it. So it should come as no surprise that these important updates often go uninstalled. Today’s advanced video systems overcome this obstacle with easy updating, which can be performed by small business owners or installers to ensure constant protection. Other systems are available with auto-updating capabilities, which remove the onus from small business owners completely. Today’s advanced video systems overcome cyberthreats with easy updating Cost-Effective Surveillance Solutions These are just a few of the many benefits video surveillance systems offer small business owners. What’s important to note is that for each to be successful requires having to have the right camera for the right environment. For instance, a camera positioned at the back door of a business has to have wide dynamic range to deal with changing light levels throughout the day. A camera used to monitor transactions must offer high enough resolution to identify bill denominations. Today’s solutions are cost-effective, easy to use and offer the flexibility to monitor operations from anywhere at any time – giving small business owners the power to work smarter, not harder to grow their bottom line.
Technology is changing the look and function of today’s security control rooms. Old-school CRT (cathode-ray tube) monitors are giving way to the thinner, flat screen monitors in the control room environment, but the transition is gradual. Randy Smith of Winsted still sees many control rooms that need to make the conversion, which is a boon to his company’s business. Furniture today is designed differently to accommodate the thinner monitors, often with larger screens. Need For Integrated Rack Systems With the increase of IP-based systems comes the need for integrated rack systems that include advanced functionality such as cable management, adds Jim Coleman, National Sales Manager, AFC Industries. Server rooms are environmentally controlled by cooling systems and power systems monitored on the IP network. Low-profile flat screens allow centers to utilize space vertically, thus creating a smaller footprint for the consoles. Additionally, with IP-based systems, workstations will have a smaller footprint because there is less cumbersome equipment. In most cases the servers are stored in a secured, climate controlled environment to eliminate overheating of the servers and maintain their security, says Coleman. This environment also helps with cable and power management. AFC builds technical furniture racks that adhere to the precise needs of computer network server room operators. The company designs and fabricates LAN workbenches with versatile functionalities, and server room workstation racks that are scalable. There is a complete line of IT workbenches, IT computer racks and computer server rack mounts with flexible mounting options. In most cases the servers are stored in a secured, climate controlled environment to eliminate overheating of the servers and maintain their security Flexible Control Room Designs Matko Papic, Chief Technology Officer of Evans Consoles, says the transition from bulky CRT equipment to flat-screen (lower profile) monitors was a major disruption in control room design; it changed the whole dynamic. Another evolution is the use of IP video streaming, which allows more flexibility in manipulation of audio-video content, and requires more flexible control room designs. Another shift, driven by larger, higher-definition monitors, is a shift to fewer monitors that display more information. Instead of a smaller monitor for each information stream, larger monitors now consolidate that information into “dashboard” displays. Looking ahead, control rooms will need to be more flexible, both in the initial design and the ability to adapt to changing technology, says Papic. Legacy customers who are currently using PCs may be moving to more remote applications. Sit-stand equipment will continue to be increasingly prevalent. “There will be more emphasis on flexibility, technology integration, and the ability to change over the life of the system,” says Papic. Consolidation Of Multiple Operations Into A Single System A trend in security is consolidation of multiple physical operations into a single system, says Papic. As a result, more customers are taking more interest in alarm management and situational awareness. How is the technology being used in terms of alarm triggers? How can the systems react rapidly and provide information to a larger audience in the control room? These questions impact how control rooms are designed, and Evans Consoles can adapt lessons learned from other markets to these trends in the security arena. Greater use of technology is inevitable, says Coleman of AFC Industries. “It is virtually impossible for humans to monitor all security data at the street level in our cities,” he says. “As computers become more powerful and their programs more all-encompassing, we will see a greater shift to robotic and technology uses that will provide enhanced monitoring capabilities and safety reactions.” Read our Control Rooms series here
Companies that have developed a culture of openness can provide and receive feedback at all levels “The nail that sticks out gets hammered down” is an old Japanese saying that took hold in our post World War II corporate America culture. This phrase encourages an unspoken rule of conformity combined with an authoritarian hierarchical structure. Today it is important for business leaders to consider the impact this has in American workplaces. Brent O’Bryan, SPHR at AlliedBarton Security Services explains that a winning formula for both the organization and an individual is a culture actively exhibiting healthy behaviors and practices, combined with a zero-tolerance policy for any inappropriate or troubling behaviors. Chicago, Baltimore and Philadelphia are examples of metropolitan markets that wrestle with significant violence on the streets. In all three cities, law enforcement and the state attorney’s offices face the headwind of a “stop snitching” culture. When criminals and bullies are accepted as commonplace and have greater influence than the law, their actions will not be reported, and the perpetrators themselves will ultimately not be held accountable for their actions. An anti-snitching philosophy also infiltrates many workplaces as criminals, or at least those who have yet to be found guilty, and bullies become the employees sitting in the next cubicle or office. Or worse, they become the boss. People who feel they are in a safe and secure environment are capable of achieving great things When individuals see something but say nothing, or when organizations discourage, intentionally or otherwise, the active reporting of concerning actions and behaviors, the probability of violence in the workplace increase. So, what can an organization do to transform from a “see something, say nothing” culture to a “see something, say something” culture? Organizational culture, policy and practices need to be objectively evaluated, and if necessary, changed. The culture of an organization will always trump policy when the two are not aligned. And, culture is often best defined by the accepted behaviors and practices in an organization. While the printed or preached culture may be a positive one, if the reality of what is practiced every day is not, senior leadership needs to take steps to make the desired culture a reality. The following are some areas that business leaders in human resources and other senior leadership roles should review, analyze and work collectively to change. Tame Senior Management Bully Squads If leadership fosters a workplace bullying culture, then this attitude and behavior will trickle down, permeate and dramatically alter the work culture in an extremely negative fashion. Human resource leaders, in particular, need to demonstrate to senior management that the adverse culture fails to foster productivity, teamwork and creativity – three vital objectives that every company wants to fulfill. Human resource leaders may consider corporate wide surveys, implemented by a third party vendor, that poll employees anonymously. If employees know that they can vent their frustrations and share feedback anonymously, without fear of losing their job, real change can start to occur. Companies with a secure work environment increase productivity Create Leadership Development Programs Nurturing in-house talent with a well-defined leadership development program makes employees feel more connected to the business, eases the chain of succession and empowers employees to be more creative, connected and engaged. Just as there are companies in many shapes and sizes, leadership development programs differ dramatically from company to company. The end goal of these programs is that employees have an opportunity to improve their skills through classes and workshops, have access to promotional opportunities as they arise, and feel a sense of community and kinship with their company. Leadership development begins with recruiting as human resource professionals seek individuals who can successfully lead their company’s mission. Develop Culture of Openness Companies that have developed a culture of openness can provide and receive feedback at all levels. A 360-degree feedback initiative can be a valuable option but is only recommended after a company has begun its journey to developing an open culture. If the workplace still fosters a "see something, say nothing" ideology, employees will not be forthcoming for fear that their confidence won’t be kept, or that the source of negative or constructive feedback will be too easily identified. A third party survey company should be brought aboard to confidentially assess feedback by employees at all levels of the organization. Establish Reporting Mechanisms It is important for an organization to establish clear reporting lines. These should be made especially clear in policies and procedures and communicated frequently. The expectation that employees report inappropriate, violent or suspicious activity can only be realized when there are measures in place that allow and encourage reporting. Leadership effectiveness is dependent upon the ability to gain the trust of the people who work for them. This also assumes that the one holding the trust – the employee – will perform certain desired behaviors, and that the leader has both the desire and ability to “walk the talk.” People who feel they are in a safe and secure environment are capable of achieving great things. It is up to their leaders to tap into this fundamental optimism and allegiance, and move them forward to success. By building a successful organizational culture where employees feel safe, not threatened, and not maligned by their bosses, they will flourish creatively and be more productive. By developing a culture where employees understand the range and varieties of workplace violence and its warning signs, they will feel empowered to do something about it.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
Security is more-than-ever linked to consumer electronics, especially in the residential/smart home market. CES 2018 in Las Vegas is therefore brimming with news that will have a direct impact on the security market, today and especially looking into the future. Products for the future of security CES is a giant trade show for consumer electronics with 2.75 million net square feet of exhibitor space and featuring more than 3,900 exhibitors, including 900 startups - in contrast, ISC West has some 1,000 exhibitors. During the week-long show welcoming 170,000-plus attendees from 150 countries, more than 20,000 new products are being launched. The products incorporate ingredient technologies such as artificial intelligence and 5G that will also be familiar elements as the future of the security industry unfolds. Familiar players at security shows also have a presence at CES, and many consumer technologies on display offer a glimpse of what’s ahead for security The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. Key Security Technologies At CES 2018 Familiar players at security shows also have a presence at CES. For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? At CES, Johnson Controls is announcing support for Apple HomeKit now offered in their DSC iotega wireless security and automation solution. Consumers can manage both their security system and also other home automation abilities using Apple’s Home app, or Siri on their iPhone, iPad or Apple Watch. Interlogix is announcing new features and components of its UltraSync SmartHome system, including hands-free voice control, high-definition cameras, an LTE cellular module and soon-to-be-released doorbell camera. The areas of consumer electronics and security are closely intertwined Developments In Crime Awareness ADT has a high profile at CES, including the launch of its ADT Go mobile app, equipped with 24/7 emergency response from ADT’s live monitoring agents and backed by Life360’s location technology, providing emergency response, family connectivity, safety assistance and crime awareness. ADT is also unveiling a video doorbell and expanding its monitoring to cybersecurity. IC Realtime is introducing Ella, a cloud-based deep-learning search engine that augments surveillance systems with natural language search capabilities across recorded video footage. Ella enables any surveillance or security cameras to recognise objects, colours, people, vehicles and animals. Ella was designed using the technology backbone of Camio, a startup founded by ex-Googlers who designed a simpler way to apply searching to streaming video feeds. It’s a “Google for video:” Users can type in queries such as “white truck” to find every relevant video clip. Smarter homes and smarter computers Do-it-yourself smart home security company Abode Systems announces iota, an all-in-one system giving customers more freedom and flexibility to build out and monitor their smart home. The new form factor has a built-in full-HD resolution camera enabling customers to see and hear what’s going on in their home 24/7 while a built-in gateway supports hundreds of devices to make homes more convenient, safer and more secure. There is also support for Apple HomeKit. Highly programmable and high-performance platforms will no doubt play a role in the future of video surveillance systems in our market The Z-Wave Alliance will host 30-plus leading smart home brands in the Z-Wave pavilion at CES. A full walk-through home will demonstrate different brands working together to create one cohesive smart home experience. Sigma Designs unveils its 700-Series Z-Wave platform, including numerous performance and technology enhancements in energy-efficiency and RF performance. Personal protection in attendance Self-defence product company SABRE will debut a combination pepper spray with dual sound-effect personal alarm that “alternates between the traditional wailing sound and a primal scream, while a strobe blinks 19 times per second to disorient assailants.” SABRE’s Modern Fake Security Camera includes “sleek, realistic design to deter would-be thieves.” Chip maker Ambarella is introducing the CV1 4K Stereovision Processor with CFflow Computer Vision Architecture. The chip combines environmental perception with advances in deep neural network processing for a variety of applications, including video security cameras and fully autonomous drones. At CES, applications will focus on automotive uses, including advanced driver assistance systems (ADAS), self-driving, electronic mirror and surround view systems. The highly programmable and high-performance platform will no doubt play a role in the future of video surveillance systems in our market. A full walk-through home will demonstrate different brands working together to create one cohesive smart home experience Extending home security and efficiency The Ring whole-house security ecosystem creates a “Ring of Security” around homes and neighbourhoods. Products include “Stick Up” indoor/outdoor security cameras, integrated LED lighting, a “Ring Alarm” integrated bundle for $199 including a base station, keypad, contact sensor, and Z-Wave extender. “Ring Protect Plans” include 24/7 professional monitoring. The “Streety” phone app, from Vivint Smart Home, extends home security into the neighbourhood. Streety makes it easy for neighbours to monitor neighbourhood activity through a network of shared residential cameras. They can keep an eye on kids, cars and property through live video feeds and use recorded video clips to investigate incidents. A new device making its debut at CES is the Walker “commercialised biped robot,” from UBTECH Robotics, which provides a complete home butler service and is designed to ease the day-to-day operations of a busy home or office. The varied of functions includes video surveillance monitoring, security patrol monitoring, motion detection and “instant alarm,” as well as dancing and playing games with children. The company says Walker will “bridge the gap between technologies that were once only available in scientific research institutions and everyday people.”
A used car lot owner had re-occurring issues with intruders cutting holes in the perimeter fence during night-time hours and vandalizing or burglarizing the area. The intruders would not enter the small office building, so the security system was never triggered. The customer did own a video surveillance system and it would record criminal activity but it did not prevent or deter crime. Integrating motion detectors Using the existing intrusion alarm panel (Interlogix NX8-v2 panel) and the existing video system, the system integrator introduced two OPTEX Visual Verification Bridges and four OPTEX Redwall SIP-3020 Outdoor PIR motion detectors. The motion detectors were installed over the two main perimeter light poles pointing into the lot with IP cameras located directly above each of the motion detectors. Access to camera visual With the two Visual Verification Bridges installed, the integrator can provide operators immediate access to eight live cameras during every alarm event. The Redwall SIP-3020 provided up to 30m of distance coverage and 20m width, complete with anti-masking and vandal tampers. With this simple but effective solution, the integrator was able to provide their customer with immediate visual verification of alarm sensors, only when the alarm panel is armed. Wireless key fobs were provided so the dealer can arm and disarm the system from outside the gate helping to eliminate false alarms during arming and disarming. Reduced false alarms Since the completion of this installation, there have been several nuisance alarms caused by cats that were immediately disregarded. Due to the visual verification solution there was no intrusion and the client has not had any vandalism or crime since. Per the customer’s request, the OPTEX Bridge has been installed on three additional car lots.
National Bank of Umm Al Qaiwain (the Bank) is a Public Shareholding Company incorporated in Umm Al Qaiwain by Amiri Decree Number (1) on January 5, 1982, issued by His Highness, the Ruler of Umm Al Qaiwain and commenced its operations with effect from August 1, 1982. The Local government of Umm Al Qaiwain is the largest shareholder and promoter of the bank. The bank is engaged in providing retail and corporate banking services through a network of 14 branches in U.A.E. The Bank carries out Islamic banking operations through Islamic Banking window established in 2005 across its branch network. They were searching for a fool-proof solution that would help them in managing the Time-Attendance and overtime calculation. With offices spread over 14 locations in UAE, management of attendance data was a daunting task. centralized attendance data management All manual work for report generation was eliminated outrightly, simplifying the salary procedure Thus, centralized attendance data management and maintaining a complete record of their employees were a part of their key requirements. Moreover, their payroll processing deployed a software - RAMCO, wherein the attendance data was manually entered. After a comprehensive discussion with the customer, Matrix offered a centralized platform - COSEC CENTRA, to manage all the data centrally. Door controllers - COSEC VEGA FAX installed in all the office entrances. These door controllers are integrated with the central platform that pushes the event data to the server. Furthermore, the Matrix platform is integrated with the payroll system - RAMCO. All manual work for report generation was eliminated outrightly, simplifying the salary procedure. After implementing Matrix solutions, NBQ witnessed drastic changes while following their processes. Customized attendance policy formation Effortless attendance management of multiple locations from the Head Office was prominently one of them. The shift allocation and shift correction processes were streamlined. Their solution included some advanced features like customized attendance policy formation and real item alert on attendance related event & auto-scheduled reporting. This, in turn, ensured efficient employee database management improving productivity. Products and solutions offered: COSEC VEGA FAX A complete Time-Attendance and Access Control solution with a blend of aesthetics, size, connectivity, reliability and ease-of-use. Designed for large enterprises with multi-location organizations. COSEC CENTRA PLT A web-enabled application server that controls the entire system from anywhere in the world. It is the heart of the entire solution and acts as a bridge between applications and the devices. COSEC CENTRA TAM An enterprise-grade solution, designed for organizations the Time-Attendance and Leave Management processes like recording entries and exits, salary processing, etc.
Critical building management and security systems at one of the most advanced super-high-rise towers, the landmark Wasl Tower in Dubai, are to be integrated with Maxxess eFusion technology. The 302-meter multipurpose tower, which will be operated by the Mandarin Oriental Hospitality Group, incorporates offices, guest rooms, public areas and apartments, and is situated in a pivotal Dubai location. The Wasl Tower is designed with advanced sustainability features including natural shading and cooling, adaptive lighting, one of the world’s tallest natural ceramic facades, and a vertical boulevard. eFusion was selected for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. With a modular, building block approach, eFusion provides an umbrella management system and drives service efficiency by removing the need for operators to continually switch between systems. Visitor management system By keeping it simple and integrating with the widest choice of technologies, Maxxess removes the complexity A key use of the technology will be to integrate back-of-house operations at the Wasl guest apartments with front-of-house systems, for maximum ease of use and operational efficiency using the Maxxess unified platform. This eFusion solution comprises a 900-plus reader ASSA ABLOY VingCard access control system, a 1700 camera Hanwha surveillance system, and advanced key management with Deister ProxSafe, and it will use the BACnet protocol to integrate the building management system (BMS). The Tower will also benefit from Maxxess VisitorPoint visitor management system, a Zenitel intelligent communication system and disabled call-to-assist alarms. The VisitorPoint integration will improve the guest and resident experience, reduce administration and front-desk queuing, and ensure smooth running of functions from visitor and contractor management to collections and deliveries, and security. Streamline security, safety and facilities management “The challenge with projects of this scale is to find a simple, straightforward platform that communicates with everything and works with all the systems involved,” says Lee Copland, Managing Director EMEA, Maxxess. “By keeping it simple, and integrating with the widest choice of technologies, Maxxess removes the complexity.” The Wasl Tower project is the latest of a growing number of mixed-use developments, including hotels, retail, office and residential complexes to use eFusion to streamline security, safety and facilities management. Last year Maxxess won an Intersec Award for its major eFusion implementation at Bluewaters Island.
PINs protect, just ask your credit card company. How many rooms at your office shouldn’t offer an open access, free-for-all? Probably quite a few. But expecting everyone to keep them locked, and the key-carrying and-tracking that entails, is unrealistic. This is when you need Code Handle. Access control system This simple, secure, easy-to-fit handle works with your current door lock. There is no need for you to change the door lock mechanism; just replace the existing handle to add PIN security to an office door. With Code Handle, there is no wiring, no expensive access control system and no need for cumbersome physical keys. Two screws fit a Code Handle to almost any interior office, meeting room, archive or storage room door. The inbuilt electronic PIN pad does the security work for you. Press a 4-digit code on the handle’s integrated keypad and the door opens. Code Handle comes with a Master Code and 9 different user PINs, so you can restrict access to a select group of people — senior managers, the IT department or the office cleaners, for example. User-friendly security Code Handle keeps sensitive documents, meeting rooms and personal belongings safe at your workplace Code Handle also locks itself. Auto-locking ensures an office, storage room or staff toilet is always secure when you close the door. You know for sure nobody has seen the new org chart you left on your desk, nor entered the stationery cupboard without authorization. With Code Handle, user-friendly security comes with clean, elegant design. Forget about ugly push-button-and-twist mechanical PIN locks. The low-profile Code Handle is brushed in stainless steel and satin chrome zinc, in a sleek design to blend with any modern office décor. All the security you need is in the handle. Two standard batteries (CR2) slot inside, and typically last for 30,000 lock/unlock cycles before you need to replace them. An indicator tells you when it’s time to change them. Code Handle comes in left- and right-hand versions. fire tested It is fire tested and enables free exit from the inside of a room. Code Handle keeps sensitive documents, meeting rooms and personal belongings safe and secure at your workplace. You can’t lock every room, nor install CCTV everywhere. With Code Handle, you don’t need to. To learn more about Code Handle, please visit: https://campaigns.assaabloyopeningsolutions.eu/codehandle
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organize up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardizing security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
Hospitals, medical centers, university training centers, clinics and other healthcare institutions are exposed to legal liability, ethical concerns, and subject to litigation and lawsuits, as well as changing regulation worldwide. Facilities have drugs and medical equipment onsite, making them a tempting target for crime. Healthcare Industry Challenges At the same time, aging populations in developed nations will drive increased demand for patient treatment. Rising populations and economic growth are naturally driving healthcare expenditures higher in developing markets. The frequency of physician, medical service provider, and hospital/clinic visits are all likely to rise considerably in the future in both developed and emerging markets. All of this drives the need for video surveillance for security and for active medical treatment activities Arecont Vision megapixel cameras are deployed by healthcare facilities of all sizes and types around the world to increase the quality and coverage of video while driving down costs of installation and ongoing operation. Arecont Vision Deployment Examples Arecont Vision IP megapixel camera technology, both single-sensor and multi-sensor products, has been proven around the world for a variety of healthcare sector needs. Entrances and exits to buildings, grounds, parking structures, car parks and facilities Office areas, emergency rooms, nursing stations, treatment centers, clinics, operating rooms, procedure rooms, morgues and patient wards Pharmacies, drug storage areas, records storage, store rooms, laundry Public areas, reception, lobbies, hallways, cafeterias, kitchens, retail areas Protection from slip-and-fall, workman’s compensation, malpractice, lawsuits and other litigation and compliance Perimeter, parking surveillance and license plate recognition Facial recognition, people counting, movement monitoring Access control and staff identification Visitor, patient and staff safety What Arecont Vision’s Healthcare Customers Say “Due to the exceptional resolution provided by Arecont Vision’s megapixel cameras, and the deployment of several panoramic cameras, we have easily expanded our coverage capabilities using fewer cameras with outstanding results." "The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua," said Paul M. Sarnese, System Safety Director, Virtua Health The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua" “Performance sold us on Arecont Vision megapixel cameras. We are using the video surveillance system to look for recorded video of suspicious persons after a description is given. We are also using it to review slip-and-fall complaints and to address issues of employee accountability," said Michael J. Matroni, Emergency Preparedness and Security Manager, Sacred Heart Health System. “The quality of Arecont Vision cameras more than satisfies our requirements for image quality. The system is working very well for us and Arecont Vision is extremely responsive to our needs.” "The International Hi-Tech Healthcare Park will be the first integrated healthcare development in Vietnam to provide a comprehensive healthcare environment employing high tech medical equipment and a professional medical staff. Our new video surveillance system is an important element of that environment," said Lai Voon Hon, General Director of Hoa Lam-Shangri-La, Vietnam.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
We asked this week’s Expert Panel: What are the limitations on where video cameras can be placed because of privacy? With hundreds of new cameras installed every day, the likelihood increases exponentially that a camera will be placed in a location where it violates privacy. In fact, threats to privacy are often among the largest objections when video surveillance is proposed, whether in a public area or in the workplace. Allaying fears about undermining privacy is a basic requirement to make such systems acceptable to the public. It’s a touchy subject, but one our Expert Panel is willing to address.
What lessons, if any, are there to be learned from the recent attacks in Paris? Recent events in Paris highlight the deadly and changing face of terrorism in 2015. Two gunmen armed with AK-47 assault rifles attacked the Paris offices of satirical magazine Charlie Hebdo on 7 January, killing 12 people in all, including eight Charlie Hebdo employees and two national police officers. Two days later, the terrorism continued with a hostage crisis at a printing firm at Dammartin-en-Goel and at a kosher supermarket in Paris, where four hostages were murdered before the assailant was killed by police. The world has been shocked by the events, and many are evaluating what we can learn from them to help us prevent or minimise such future attacks. We asked our panel if there are lessons to be learned specific to the security industry.
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload