From robots to drones to counter-drone solutions, a range of new technologies will be displayed at ISC West 2019. The Unmanned Security Expo will return, including a dedicated complimentary education theater for attendees offering sessions on a range of topics. UAVs, UGVs And Autonomous Systems Also included will be demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. The market growth for unmanned technologies be...
Senstar, a global provider of video management and perimeter intrusion detection solutions (PIDS), is pleased to announce the release of Symphony 7.2, the latest version of its intelligent video management software (VMS). The award winning Senstar Symphony delivers an all-in-one solution for video management, video analytics, PIDS integration, and alarm management for deployments of all sizes. Key Highlights: Securely share video clips with 3rd parties with integrated cloud video upload fea...
It’s the first quarter of a New Year and businesses are already busy reviewing budgets for ways to save money. One line item that can impact business the most – loss. Employee theft alone is a crime that costs U.S. businesses $50 billion annually*, according to Statistic Brain. So if you aren’t sure who is keeping watch over your property and assets, and how they reduce preventable loss, it might be time for a security audit. According to GuardOne, the security patrol and remo...
Southwest Microwave is pleased to announce the appointment of John Gilbert as Eastern Regional Manager – USA, serving clients in states east of the Mississippi River. Vast experience John joins Southwest Microwave after a successful 17-year career at EV Group, a producer of industry-leading equipment for the semiconductor industry, where he successfully increased market penetration in the Eastern US and contributed to significant revenue growth for the company. John served in vari...
How does France organize its rescue services? What does civil defense look like in Italy? And what are the techniques and tactics used by American firefighters to combat forest fires? The answers to these and other questions will be provided at the upcoming Interschutz trade fair, which runs from 15 to 20 June 2020 in Hanover, Germany. On three dedicated days of the six-day show, individual countries will be in the spotlight – France on Tuesday, Italy on Wednesday and the United States on...
Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting Existing Hardware Today, low-co...
OPTEX Corporation Ltd, global sensor manufacturer, has launched a new series of outdoor PIRs in EMEA (Europe Middle East and Africa) and in South and North America that offer 180° detection coverage and 12m/40ft radius to detect any intrusion around a residential or commercial building. Outdoor Intruder Detection Sensors The WX Infinity series comprises two wired and two wireless models available either as the standard or anti-masking version. The new models are built upon OPTEX’s extensive track record in providing outstanding sensing performance for outdoor intruder detection applications, while the wide (180°) detection area coverage brings a new feature that is ideal for protecting larger residential grounds. Outdoor warning technology can help prevent crimes by detecting and reporting intruders before they attempt to break into a building" “Outdoor warning technology can help prevent crimes by detecting and reporting intruders before they attempt to break into a building,” says Hiraku Shibuya, Section Chief, Sales and Marketing Department, Security Division at OPTEX Global Headquarters. “Early intrusion detection is what OPTEX has been focusing on for the last 40 years by delivering an extensive line-up of outdoor intruder detection sensors that provide reliable outdoor security.” Two 90° 12m/40ft Detection Areas The WXI sensors can provide two, independent 90° 12m/40ft detection areas, one for the left side and one for the right. The detection distance ranges from 2.5m (8ft) to 12m (40ft), and the sensitivity and alarm output can be set up independently for these left and right areas. For instance, the left output can trigger for a simple awareness alarm while the right-side output prompts CCTV camera system to set an event index. A patent pending area-masking shutter allows a sliding mechanism to quickly mask an area and makes the detection area narrower to avoid obstructions such as swaying vegetation. The set-up procedure has been made easier by including an automatic walk test mode to ensure a quicker and more accurate installation. WXI Motion Sensors All WX Infinity models feature a tamper-proof back panel to detect if anyone is attempting to move the sensor from the wall The WXI motion sensors benefit from OPTEX’s sensing analytics that filter out noises that are common in outdoor environments, and also distinguishes between humans and small- to medium-sized animals thanks to its Super Multidimensional Analysis (SMDA) logic. The sensors also include temperature compensation and double conductive shielding to ensure best performance in sunny and hot outdoor environments. The selectable pulse count also has the option to enhance the sensor sensitivity when needed. All WX Infinity models feature a tamper-proof back panel to detect if anyone is attempting to move the sensor from the wall, and the anti-masking models (WXI-AM/ WXI-RAM) will alert when anyone tries to cover the lens to block its view. 180° Outdoor PIR Sensor Series “We are pleased to bring our first 180° outdoor PIR series to the market that complements our existing 90° and curtain sensor range,” adds Hiraku Shibuya. “We first presented the first WXI models at Securex in South Africa in May 2018 and had a fantastic response from installers. We are now in a position to roll out the complete WXI series across the whole European and African and Middle East (EMEA) region, as well as in North and South America.”
OPTEX, renowned global sensor manufacturer, will demonstrate the recently enhanced long-range RLS-3060 LiDAR series live on its stand, as well as showcase its new 180-degree outdoor sensor ideal for boundary protection. OPTEX LiDAR And REDSCAN Series Sensors “OPTEX’s LiDARs have been successfully deployed in the Middle East region for years, for a number of applications ranging from perimeter security to roof and asset protection. At this year’s Intersec we are looking forward to showing the new functionalities of our long-range REDSCAN series which will make it more flexible and compelling for perimeter security,” says Gaurav Mahajan, Divisional Manager for OPTEX in Middle East. The advanced RLS-3060-SH model has been designed for harsher environments and extends the detection area to 50m radius in horizontal mode The long-range RLS-3060L has a detection range of up to 30 metres, and now features four detection areas that can be independently adjusted via an analog connection, and up to eight areas that can be adjusted via an IP connection. The inclusion of area allocation and masking functions enable these detection zones to be precisely defined. The advanced RLS-3060-SH model has been designed for harsher environments and extends the detection area to 50m radius in horizontal mode. When in vertical detection mode, it can detect a standing or squatting person over 100m away. WXI 180-Degree Outdoor PIR Sensors The event is also the opportunity for OPTEX to showcase its new 180-degree outdoor sensor, ideal to protect the boundary of residential and commercial premises. The new WXI 12m 180-degree outdoor PIR has left and right alarm outputs that trigger alarm signals from both sides individually, making it ideal for PTZ activation, direction, recognition and changing detection pattern by day and night. The WX Infinity series features advanced Super Multidimensional Analysis (SMDA) logic to differentiate between human beings and animals, advanced temperature compensation, an area masking shutter, and a single or dual pulse count. The new series is available as both hard wired and battery-operated models. With the launch of our new 180-degree PIR, we are complementing our boundary protection range" “With the launch of our new 180-degree PIR, we are complementing our boundary protection range,” says Masaya Kida, Managing Director of OPTEX EMEA. “We are now able to offer single sided and double-sided curtain PIRs, 90-degree volumetric and 180-degree volumetric sensors, covering all areas around the building.” Fiber Optic Perimeter Fence Detection System Also, on the stand, OPTEX’s sister company Fiber Sensys will be showcasing its compact radar range which offers object tracking and object categorizing that differentiates between vehicles, people and drones. It complements its fiber optic perimeter fence detection system by offering protection for wide open areas. Masaya says the company is looking forward to exhibiting again at Intersec and having the opportunity to present its range of perimeter protection sensors: “A delegation from OPTEX EMEA will be attending the show including technical engineers, marketing specialists, Middle East and Africa sales managers, and our Strategic Alliance Manager. This gives visitors to Intersec a great opportunity to connect with the OPTEX team and discuss their projects.”
CHeKT announces a partnership with OPTEX, the supplier of outdoor sensors for intrusion security. CHeKT delivers a visual-monitoring platform for alarm monitoring centers. This partnership with Optex will significantly advance the protection capabilities of security integrators globally. The solution relies on ‘The CHeKT Bridge’, the first product brought to market by CHeKT. With years of development, the CHeKT Bridge premiered in April 2018 at the ISC West trade show. The vision of CHeKT is to allow an integrator to provide visual monitoring services at prices that compete with a traditional intrusion alarm. CHeKT’s President, Wes Usie says, “In today’s culture, when an integrator installs an alarm system and a video surveillance system at a location, there’s no reason why we shouldn’t provide that client with visual monitoring services.” Amplifying The Value Of Sensors With CHeKT’s innovation, OPTEX has found technology that instantly amplifies the value of our sensors and creates truly proactive security systems"“There’s a recognized need in our industry for this exact technology,” said Mac Kokobo, president, and CEO of OPTEX Americas. “With CHeKT’s innovation, OPTEX has found technology that instantly amplifies the value of our sensors and creates truly proactive security systems.” OPTEX will co-sell their existing and new products with the CHeKT Bridge in North America through its current distribution channels. Pricing of the device was not disclosed, but the companies expect to offer the CHeKT Bridge at a cost that allows integrators to remain competitive with existing alarm systems and provide a much higher level of service to the end user. Both companies recognize that a visual monitoring solution must be affordable, scalable and adaptable. Integration Of Alarms And ONVIF Video System “We’re thrilled to partner with OPTEX,” said John Milliron, CHeKT’s Vice President of Sales. “For OPTEX to invest in CHeKT is a tremendous validation of our innovation. The industry is changing rapidly and Integrators must decide if they will adopt innovative technologies to meet escalating consumer demands, police response requirements and false alarm ordinances. “Ring, Nest and others have started a disruption that integrators may not yet have a strategy to address. The CHeKT Visual Verification solution provides an adoptable smart integration of any alarm system and ONVIF video system, existing or new, providing a CS Operator a view of what caused an alarm to occur in just seconds. Together, we intend to reset the Alarm Industry’s best practices.” Quick Access To The Visual Verification Video The platform agnostic Bridge manages cameras locally allowing an operator to access video instantly, unencumbered by firewalls and login credentialsThe CHeKT Bridge pairs on-site cameras with sensors, on new or existing security panels. The platform agnostic Bridge manages cameras locally allowing an operator to access video instantly, unencumbered by firewalls and login credentials. When a sensor of any kind goes into an alarm state, the alarm panel communicates the signal to the monitoring center. Simultaneously, the bridge sends the applicable video to the cloud for viewing by the operator processing the alarm, enabling visual verification of the situation and premises within 5 seconds. This powerful simplistic approach allows central stations to provide a much higher level of service without increasing signal traffic or increasing the time an operator spends processing an alarm signal. The operator can forward the clip, via SMS text, to the emergency contacts when additional verification is necessary, and to the police responding to the alarm. Formidable And Affordable Security Solution “We’re impressed that CHeKT understands the needs of every stakeholder in the security space – end users, integrators and installers, the operators who processes alarms and the emergency responders. This product is an exceptional response to those needs and, paired with our sensors, makes a formidable yet affordable security solution,” said Rob Blair, president of OPTEX’s Security Division. CHeKT has overcome these barriers and dealers can freely design a true security solution that detects a crime before a break-in happensOPTEX’s outdoor rated sensors create reliable detection across a premises’ exterior, detecting motion within inches of a building. With the Bridge connecting sensors and cameras and sending video immediately, “an operator can see troublesome behavior before a person breaks in through the door or window,” Blair said. “When you can communicate to the police that you are watching apparent criminal behavior, instead of reporting an alarm with no other context, the response is much quicker.” Detecting Crime Before A Break-In Barriers into the visual monitoring space were over complicated setups that did not scale into the existing security system and monitoring centers. CHeKT has overcome these barriers and dealers can freely design a true security solution that detects a crime before a break-in happens. “The sensors and alarm systems were doing their jobs, and the camera systems were recording. However, those systems have worked in parallel, not in unison,” Usie said. “Past efforts to create visual monitoring have been cumbersome, slow and expensive. We couldn’t find what was needed…that’s how CHeKT was born, a technology that enables operators to immediately visualize what tripped an alarm.”
Senstar, global perimeter intrusion detection and video management solutions provider, is pleased to announce its Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system has received the Fixture Seal of Approval (FSA) from the International Dark Skies Association (IDA). IDA is the recognized authority on light pollution. Its mission is to preserve and protect the nighttime environment and the heritage of dark skies through environmentally responsible outdoor lighting. To help accomplish this, IDA developed the FSA program to provide objective, third-party certification for lighting that minimizes glare, reduces light trespass and doesn’t pollute the night sky. Hybrid Perimeter Intrusion Detection System The Senstar LM100 combines two key security functions in one cutting-edge product, acting as a powerful deterrent against intruders by detecting and illuminating them at the fence line. Its engineered lighting is environmentally friendly (its power-efficient LED technology uses 95% less power than traditional security lighting systems) and is specially-designed to minimize light pollution. “The minimized light pollution of the LM100 makes it ideal for deployment in urban and residential environments where legislation is changing, and general environmental awareness continues to grow,” said Product Manager Todd Brisebois. “Senstar takes pride in developing high quality products that take into consideration environmental impact and receiving the FSA is testament to our commitment to environmental preservation. Thank you to the IDA for this approval.”
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's prisons, particularly as a means of smuggling. SPYNEL 360° Thermal Imaging Sensors To protect prisons, borders and critical infrastructures from smuggling and terrorism, Electro Optical Industries upgraded their most powerful 360° thermal imaging sensors SPYNEL-X and SPYNEL-S, integrating a visible channel and a laser rangefinder to the thermal cameras. The new V-LRF option aims to facilitate the tracking and the identification of a detected threat, thanks to the full HD visible cameras’ optical zoom (x30). The exact distance of the threat is provided by the laser rangefinder in real time, an option particularly adapted to the detection, tracking and recognition of the smallest targets, like UAVs. SPYNEL & its V-LRF option ensure no blind sector for a real 360° coverage in all surveillance phases: detection & identification An innovation it is, as all other systems on the market must use separate sensors to get similar functions: one sensor for detection, a radar for instance, and another sensor for identification, such as a PanTiltZoom (PTZ) camera. Xavier Elbaz, Sales Manager at Electro Optical Industries explains: "With separate systems, it is hardly possible to ensure a real 360° coverage for detection and identification because of blind sectors created by the mechanical supports. Moreover, separate sensors must be integrated and calibrated to properly operate together. SPYNEL & its V-LRF option ensure no blind sector for a real 360° coverage in all surveillance phases: detection & identification." SPYNEL V-LRF With CYCLOPE Detection Software In addition, most of the time, UAVs' small size and low electromagnetic signature go unregistered by traditional detection measures. With SPYNEL's thermal imaging technology, it is impossible for a drone to go unnoticed: any object, hot or cold will be detected by the 360° thermal sensor, day and night. SPYNEL V-LRF and its automatic detection & tracking software CYCLOPE are easy to deploy and to use, and the system is easily interfaceable for multi-sensor protection of critical infrastructure like prisons. Data is smoothly merged with other sensors’ data like radars, AIS, fence vibration sensors, etc., and displayed on the same interface, whereas separate sensors must be integrated and calibrated to operate properly together.
Eagle Eye Networks, global provider of cloud-based video surveillance solutions, announced that it has enhanced the video analytics offered within the Eagle Eye Cloud VMS. Customers can easily and instantly activate analytics on their cameras without having to install additional hardware or software. No on-site technicians or system upgrades are needed to immediately receive analytic alerts and data. Eagle Eye Cloud VMS Eagle Eye Cloud VMS customers can enable analytics from the dashboard for any camera in their account. Eagle Eye Analytics will function on any camera that is supported by the Eagle Eye Cloud VMS – no analytic functions of the camera are required. Eagle Eye Analytics will even operate with analog cameras. The ability to deploy analytics quickly and without upfront hardware or software investment shows the long-term advantages of a cloud-based solution. The following analytics are now available: Intrusion detection is used to generate a notification when an object enters that forbidden area Line Crossing – Detects when an object crosses a virtual line. Direction may be specified, and notifications may be generated. It is useful for receiving notifications when a security boundary (fence, restricted area, and one-way road) is crossed. It is also well suited for monitoring building entrances, loading docks, and parking lots. Intrusion Detection – Detects when an object enters a customer defined area. Intrusion detection is used to generate a notification when an object enters that forbidden area. Object Counting – Counts how many objects cross a line in either direction. This can be used for counting cars, people, or other objects. Total count per day, per direction, and current delta of the count are maintained and displayed. Loitering – Monitors a defined area and triggers an alert if an object lingers longer than the pre-configured dwell time. Eagle Eye Gallery Viewer In the enhanced Eagle Eye analytics experience, customers are able to track and view up to twenty-five analytic events in Eagle Eye’s intuitive Gallery Viewer. The Eagle Eye Gallery Viewer is an exceptional tool for quickly finding video of interest and viewing active motion and analytic events. In addition, the improved Eagle Eye Cloud VMS gives customers the ability to gain further operational insight by generating customized period graphs of the enhanced data from five minutes to seven days. The enhanced Eagle Eye Analytics are immediately available and can be enabled within the Eagle Eye Dashboard on a camera-by-camera basis. Customers do not need to replace their existing cameras to have access to Eagle Eye Analytics.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational Awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognize potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security Best Practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organizations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology In School Security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-Hour Monitoring Solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar Detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorized to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting And Landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing Physical Environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve.However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfill a gap in the industry event calendar and provide something new and fresh to a disillusioned audience. Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from?What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take on board all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham. We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split. Q: What conference programming is being planned to augment the trade show event? Norman: Content will be delivered across three focused theaters, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights. All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the program. We look forward to announcing those in coming weeks. Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC? Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational program for the visitors. Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website. The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer. Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor? Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far. We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward. The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?The Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc. We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event. Q: How would you expect/hope the show would continue to evolve in coming years? Norman: I hope over the next few years The Security Event cements itself as the industry’s favorite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. Here’s a quick rundown of integrator companies acquired by ADT: Protec, a Pacific Northwest commercial integrator (Aug. 2017); MSE Security, the USA’s 27th largest commercial integrator (Sept 2017); Gaston Security, founded in 1994 as a video surveillance integration company and whose services have since expanded to include intrusion, access control, and perimeter protection (Oct. 2017); Aronson Security Group (ASG), which delivers risk and security program consultants and offers advanced integration services, consulting and design engineers and a National Program Management team (March 2018); Acme Security Systems, among the largest privately held security systems integrators in the Bay Area, focusing on electronic security systems, access control, video networks and more (March 2018); Access Security Integration, a regional systems integrator specializing in design, delivery, installation and servicing of electronic security systems including enterprise-level access control, video and visitor management solutions, perimeter security and security operation command centers (Aug. 2018); In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity with the following two acquisitions: Datashield, specializing in Managed Detection and Response Services (Nov 2017); Secure Designs, Inc., specializing in design, implementation, monitoring, and managing network defense systems, including firewall services and intrusion prevention, to protect small business networks from a diverse and challenging set of global cyber threats (Aug. 2018). ADT has acquired more than a half-dozen security system integration firms in the last year or so For additional insights into ADT’s game plan and the strategy behind these acquisitions, we presented the following questions to Chris BenVau, ADT’s Senior Vice President of Enterprise Solutions. Q: ADT has been actively acquiring regional integrators this year – more than a half a dozen to date. Please describe the history of how ADT came to embrace a strategy of acquiring regional integrators as a route to growth? ADT's acquisition of Red Hawk is set to close in December, and brings premiere fire and life/safety solutions BenVau: Our acquisition strategy started at Protection 1 when we embarked on our journey to build out our commercial and national account business and add enhanced integration capabilities to our portfolio. The merger of Protection 1 and ADT brought that foundation to ADT which up to that point was primarily a residentially and SMB-focused company. After the merger, we set out to identify and acquire additional regional integrators that would continue to build on that foundation and deliver enhanced technical solutions, advanced technologies and an expanded service, install and support footprint. Through our acquisitions we now operate two Network Operations Centers and three Centers of Excellence. We are also unique in the industry with the number and variety of certifications, like Cisco and Meraki, our engineers hold which ultimately allows us to offer Managed Security as a Service. They have also enhanced our operational capabilities. Q: What criteria do you use to evaluate whether an integrator is a good “fit” for ADT? BenVau: First and foremost, we look at the culture of the companies. The companies that we target for acquisition must be metrics- and customer service-driven. Secondly, we look at the leadership teams. ADT view their acquisitions more like mergers and take a patient approach to integrating them into their business We have been fortunate in the fact the leadership of the companies we acquired remain with us today in key management and executive positions helping to drive continued growth within their organizations. We also evaluate their current customer base, unique solutions and their ability to complement and enhance our portfolio with the goal of becoming a leading full-service, enterprise commercial provider. Our acquisitions have bolstered our network capabilities, brought enterprise risk management services, and a broader solution set in high-end video and access control solutions. Our most recent acquisition – Red Hawk, set to close in December – brings us premiere fire and life/safety solutions. Q: What changes are typically needed after an integrator is acquired in order to adapt it to the ADT corporate model? BenVau: We view our acquisitions more like mergers and take a patient approach to integrating them into ADT while taking into account their culture. We want to ensure that we find the right positions for their people, embrace the right messaging and put the right processes in place. We acquire these companies because they are the best in their respective businesses and geographies and bring their knowledge and experience in markets or with solutions that we may not have had previous access to. ADT can support clients with their own in-house technicians which helps to ensure a consistent security program Q: How can regional integrators benefit from the ADT brand? Have your newly acquired integrators realised additional growth? BenVau: The companies we have acquired, generally, have exceeded expectations and surpassed initial goals. ADT brings expanded opportunities for these companies as well with our national footprint. Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver. These integrators help to deliver on that. In the past, the regional players may have had to rely on sub-contractors to service their larger clients. With ADT, we can now support those clients with our own in-house technicians which helps to ensure a consistent security program across multiple locations.Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver" Q: Are additional integrator acquisitions planned this year and into 2019? How much is enough and when will it end (or slow down significantly)? BenVau: We expect to close on our latest acquisition, Red Hawk, before the end of 2018. Red Hawk brings a national footprint focused on fire/life safety and security to ADT. While ADT already had a robust security offering, Red Hawk will contribute significantly to the fire side of the business. In addition, we will continue to evaluate the companies in the industry to determine if additional acquisitions make sense. Q: Do you expect greater consolidation of the integrator channel in the industry as a whole? Why is this a good time for consolidation? Is it a good M&A market for buyers like ADT? BenVau: We will continue to evaluate companies in the industry to determine if further acquisitions make sense. As for the industry, we can only speak for ourselves. Q: What other trend(s) do you see in the industry that will impact ADT (on the commercial side) in the next year or so, and how?Our focus is on investing in our field organization, in particular our service technicians, engineers and project management teams" BenVau: Networking is a big one. As we continue to drive integration of devices and services, from AI, “the cloud,” machine learning and even analytics, there will be more focus on the network they ride on. A deeper knowledge of network design, bandwidth impact, and system integration will be critical. As part of our acquisition strategy, we focused on talent to add to the team and have been able to add to our bench strength in this area. Q: Any other comments/insights you wish to share about ADT’s strategy, future, and role in the larger physical security marketplace? BenVau: Our focus is on investing in our field organization, in particular our service technicians, engineers and project management teams. The cornerstone of our success lies in our ability to deliver outstanding customer support and service. It starts with sales and the ability to deliver security and life safety technologies, but it ends with a delighted customer who partners with us to help secure the things that matter most to them. Our recent acquisitions have more than doubled our commercial field operations teams and are key to establishing the ADT Commercial brand as a leading full-service provider of enterprise solutions to the marketplace.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced Visitor Experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognized a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimeter wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding Perimeter Protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centers, sports centers, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat Mitigation With Soft Target Approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labor reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving Security Posture At Event Venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Wide Area Monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Matrix IP Bullet And Dome Cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
A video surveillance system installed by Daemon Fire & Security, based on an AMG Systems-supplied Ethernet switch network, is helping to protect the UK’s first new inland rail freight hub for over a decade: iPort Rail. The iPort project near Doncaster, South Yorkshire, offers 6 million square feet of space across 337 acres. The massive park is already home to enormous distribution facilities for companies like Amazon, CEVA, Fellowes and Lidl, and its occupancy is set to expand in the coming years. The newly developed iPort Rail terminal, located on its own 30-acre site within iPort, is connected to the electrified East Coast Main Line via the South Yorkshire Joint Line. It offers integrated access to iPort, meaning occupiers can directly approach the rail terminal using their own specialist vehicles on the facility’s private roads. Implementing Video Surveillance System The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System"The terminal can handle up to six trains a day, operating 24-hours, six days a week. Each train can be the maximum UK length of 775m. iPort Rail has an 800m reception siding and two 400m handling sidings, with storage capacity for 1,500 shipping containers. With iPort Rail playing such a crucial role in developer Verdion’s iPort transportation strategy, there was a pressing need to ensure that the terminal has effective ongoing video monitoring. Buckingham Group Contracting Ltd was responsible for the work on iPort Rail, and they worked with CCTV specialist Daemon Fire & Security to implement the video surveillance system for the perimeter of the terminal. Chris Tattersall, Technical Director at Daemon, said the system runs on a redundant fiber optic network. “AMG Systems assisted us with the fiber optic network design.” Tattersall said. “The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System. The cameras are on towers from Altron, and the networking is from AMG.” Cameras For Intrusion Detection The cameras utilize Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through"There are 32 cameras mounted on 18 towers around the rail terminal site perimeter. Tattersall explained that the cameras are primarily used as detectors to monitor for trespass or intrusion. “The cameras utilize Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through,” he said. “The cameras are monitored live by the 24-hour security team in the site gatehouse. The system is networked using equipment and expertise from AMG Systems. Daemon and AMG designed a failsafe fiber optic ring system together,” Tattersall said. “From the gatehouse there’s a fiber optic cable which goes and loops around every camera tower and goes back to the gatehouse,” he said. “It’s a redundant ring, so if they get a fault or deliberate cut, everything will carry on working. We’re using industrial PoE Ethernet switches in the towers so they can withstand low temperatures, which is particularly important during cold winters in a relatively open site like this.” Operative In Extreme Temperatures The industrial managed switches are able to operate in temperatures ranging from -40 deg C to 75 deg CThe industrial managed switches, 20 of which were used in this project, are able to operate in temperatures ranging from -40 deg C to 75 deg C and are designed for medium to large network environments to strengthen network connections. AMG Business Development Director Sara Fisher said AMG was thrilled to be involved in this project. “We were delighted to be asked by Daemon to contribute our design and product expertise to help protect this important and growing freight hub,” she said. Daemon’s video surveillance project took around 10 weeks in total, including implementation and commissioning. It was handed over on time and installed on target. Tattersall said the smooth running of the project could be put down to Daemon’s good working relationship with contractor Buckingham, distributor Pro-Vision, networking and transmission expert AMG Systems, and product suppliers Bosch and Altron.
Amthal has created a scalable program of works to upgrade security at St Albans School and ensure staff and pupils can inspire learning and develop values and skills to the highest standards, in a secure environment. With former students including the renowned Professor Stephen Hawking, St Albans School, ‘the first school in Hertfordshire’ has a rich history as a celebrated independent boys’ school and co-educational Sixth Form. With an architectural mixture of buildings dating back from the Roman-era cellar, to modern extensions built in the 1990s, alongside a well-equipped field study center and sports facilities, the grounds-care team was keen to ensure security was kept up-to-date. Co-Curricular Facilities Amthal was able to present an all-encompassing solution right from the perimeter systems through to CCTV and internal access control" Gary Douglas, Estates Manager at St Albans School commented: “As a school catering for over 860 pupils, it is our priority to deliver a robust level of security for everyone who works and learns here. In addition, the historical significance of the School is something we are immensely proud of and we are committed to ensuring the buildings and facilities are cared for at every level.” “With a view to upgrading our security to enable smarter solutions, Amthal was able to present an all-encompassing solution right from the perimeter systems through to CCTV and internal access control. These enhancements were carefully planned into a program of works that is scaleable to work around learning timetables and the continued projects designed to further our excellent academic and co-curricular facilities.” Right Security Systems Amthal worked closely with the team at St Albans School right from the initial design process, acting in a project management capacity to ensure the right security systems were selected to suit the school. Not only did this require solutions that offered the smartest capability for the perimeter systems, where Avigilon CCTV was installed, but also working within school buildings and including Paxton Access Control that could be installed seamlessly, all without compromising on the historical ambience of the architecture throughout the site. Today, St Albans School is one of the leading day schools in the country, a centre of educational excellence" Paul Rosenthal, Sales Director at Amthal added: “There has been a school on the Abbey Gateway site for more than 1,000 years. Today, St Albans School is one of the leading day schools in the country, a centre of educational excellence, occupying a campus that has been transformed and continues to grow.” Expandable Solution “It is an absolute privilege as a local company to be on board to support the Estates Team to secure the School. We were very careful in our planning and design stages to structure a full team approach with leading suppliers, and present an expandable solution with the capacity to integrate with the requirements of this very impressive multi-dimensional educational institution.” Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire & security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.)
A two-year program to transform security at Heriot-Watt University campuses around the world, facilitated by CriticalArc’s SafeZone technology, has been recognized with one of the UK’s top security industry awards. The innovative partnership between Heriot-Watt and CriticalArc has been named as ‘Security Project of the Year’ in the 2018 Security & Fire Excellence Awards run in association with IFSEC International and Firex International. The award, sponsored by the British Security Industry Association, is highly competitive and a major accolade for the winners. Improving Service Response Two years ago, Les Allan, Heriot-Watt’s Director of Safety and Security Services and his team at the university embarked on a strategy to transform all aspects of their operations. They wanted to modernize their service across five campuses, in the UK, Dubai, and Malaysia to provide much greater care for students and staff. A key factor in the team’s success has been the way it uses CriticalArc’s SafeZone technology across all five international campuses It was an ambitious undertaking, but it has already delivered impressive results, measurably improving service response times by over fifty percent, upgrading security department capabilities and skills and raising the job status and remuneration for officers involved. A key factor in the team’s success has been the way it uses CriticalArc’s SafeZone technology across all five international campuses, making Heriot-Watt the first university department to take this global approach. Real-Time Incident Management SafeZone technology has transformed the way officers interact with students and staff wherever they are - on campus or and when traveling off-site – so they can provide assistance in case of emergencies or other incidents. Les Allan’s team has already responded to serious medical emergencies using the system and now they have the tools to manage a full range of live-incident risks. “SafeZone lets my team communicate quickly with individuals and groups,” explains Les Allan, Heriot-Watt, Director of Safety and Security Services. “Using it they can receive alerts and pinpoint the location of anyone needing assistance. They can deploy officers more quickly and keep track of ongoing situations as they develop. It’s really letting them do things they couldn’t have dreamed of before.” Better Support For Students & Staff The Heriot-Watt team is also using new technology to support staff and students on campus while traveling and during fieldwork. They can ‘geo-fence’ additional areas as required. Between 1 August 2017 and 31 July 2018, a total of 5398 security incidents were attended at the Edinburgh Campus The result has been a significant improvement in engagement between the security department – now restyled as Safeguarding Services – students and staff. Between 1 August 2017 and 31 July 2018, a total of 5398 security incidents were attended at the Edinburgh Campus (the first to adopt SafeZone); 3542 of these incidents (66%) involved assisting or interacting with students (rising from 33% in 2013). Efficient, Responsive And Capable Services The results have been impressive but Les Allan, who is currently also serving as Chair of the Association of University Chief Security Officers (AUCSO) in Scotland, says his ambition is to go much further. “We are delighted at our incredible success at the Security and Fire Excellence Awards as winners of the Security Project of the Year category. This joint award for Heriot-Watt University and our friends at CritcalArc is a testimony to the power of working in partnership for mutual benefit and delivery of excellence with a world-leading solution. We are committed to continuing development and enhancement of our partnership with CriticalArc.” Darren Chalmers-Stevens, CriticalArc, Managing Director, EMEA and APAC, noted: “I’m delighted that the forward-looking partnership between Heriot-Watt University and CriticalArc has been so clearly successful. This major award is further proof of how we work closely with all our customers and are leading the way in providing better protection and enabling more efficient, responsive and capable services.”
Students of all ages in state schools are entitled to a safe learning environment. If students don't feel safe, they are not able to stay focused during classroom lessons and activities. That’s why Narre Warren South. P-12 College has upgraded its security with the installation of a sophisticated SALTO access control and ID pass system. Located south east of Melbourne, Australia, Narre Warren South P-12 College is a unique school on one campus with two sub schools, Primary, (Prep to Year 6) and Secondary, (Years 7 to 12). It follows the P-12 Curriculum which is designed to provide diversity and pathway opportunities, ensuring students maximize opportunities that exist after school and ensure people achieve their learning goals in a fun and supportive learning environment. Mechanical Key System The College previously used a mechanical key system for its security needs Home to over 2000 students and 200 staff, cultural diversity is a feature of the College with at least 50 ethnic groups being represented speaking 68 languages. A third of the College’s student population come from families where the language background is other than English. The College previously used a mechanical key system for its security needs; however this was increasingly complicated to manage as keys multiplied, and it was difficult to guard against key duplication and copying. Another negative was the cost of re-keying and replacing locks to maintain security if keys were lost or not handed back. Security Arrangements The College also had a number of challenges when it came to managing and limiting traffic flow through the staff car parks, both inside and outside school hours. To alleviate such problems, the College decided to look into upgrading its security arrangements and called in local security specialists Eclipse Security Systems. Director Greg Flood takes up the story. “We met with Brett Dyer, (the College’s Property and Maintenance Manager), and explained how SALTO solutions are in use around the world in educational environments including universities, university housing, schools, research institutes, academies, kindergartens and more where they provide security, access control and campus management.” Cost-Effective Package Brett liked the fact that SALTO could offer a solution that was education proven" “Replacing keys with smart access control would give the school much more control over its security. For instance installing smart online wireless locks on main entrance doors would enable the school to incorporate these doors into its lock down procedure. At busy student drop off and pick up times in the morning and afternoon, the school gates could be automated to improve traffic flow and ease congestion.” “And since Narre Warren South P-12 like almost all state schools hire out their sports, meeting facilities etc to third party groups outside of school hours, the new access control solution would make it much easier to manage access for such short term visitors. Brett liked the fact that SALTO could offer a solution that was education proven and offered a secure, flexible way to have all the above benefits and more in a versatile, cost-effective package that was future proof and gave a great return on the schools investment dollars.” Scheduled Automatic Locking Most external doors have a mix of offline and online SALTO XS4 escutcheons" “The removal of the old system and the upgrade to smart locks was smooth and straightforward, and we’ve now retro-fitted in excess of 100 doors and automated a number of perimeter gates. Most external doors, plus the addition of a number of internal office doors across all the blocks, have a mix of offline and online SALTO XS4 escutcheons, as well as control units and wall readers.” “The most important thing for us is to ensure that we are doing everything we can to safeguard our children. Our new access control system furthers this goal” says Brett Dyer. “We went with Greg’s recommendation of SALTO for its functionality and value for money. We particularly like how easy it is to use and program, especially the issue and management of contactless smartcards for external user groups." "The scheduled automatic locking and unlocking of external doors and gates is a huge time saver, and so far we’re pleased with the product and the capabilities it now gives us.”
Senstar, a global provider of video management and perimeter intrusion detection solutions, announces that its Symphony video management software and Face Recognition video analytic are helping to protect Cosmo Music. Working with integrator Northern Alarm Protection (NAP) Ltd., Richmond Hill, Ontario, Canada-based Cosmo Music selected Senstar after comprehensive research and testing to replace its 20-year-old analog video system. “Senstar Symphony delivers an all-in-one solution for video management, video analytics, perimeter intrusion detection system integration, and alarm management for deployments of all sizes,” said Justin Shorn, Senstar’s Vice-President of Product Management. “We are glad that Symphony’s core features and ease-of-use, along with our Face Recognition analytic, were able to meet Cosmo Music’s needs.” Flag Suspicious Customers Senstar’s Face Recognition analytic adds an additional layer of security to any video surveillance deployment and is a powerful tool for retail loss prevention. At Cosmo Music, the analytic is used to identify and flag suspicious customers and provide real-time alerts if a flagged individual enters the store, with the goal to prevent theft. “(During testing) one of our staff had a full beard one day and it was shaved off the next day and the system still picked him up,” said Rudi Brouwers, Vice-President and COO of Cosmo Music. “That’s what sold me on it.”
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analyzing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realize its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?
It seems there are more “bad things” happening than ever before. We hear news every day of workplace shootings and terrorist attacks, of smash-and-grab thefts and child abductions. Beyond the possible human tragedy involved, such events pose a persistent question to anyone involved in the realm of security: Could we have prevented it? The first step toward prevention is to predict or foresee an event before it happens. Too often, technology enters the picture after the fact, most commonly the use of forensic video. Isn’t there more our industry can do before such events occur? We put the question to this week’s Expert Panel Roundtable: How can security systems be used to predict bad things before they happen?