Genetec Inc., a renowned provider of unified systems for enhanced security, operations and intelligence, has announced a new series of expert webinars designed of help end users and system integrators to navigate these testing times. The sessions outline ways customers from various industries are repurposing their existing physical security systems to solve specific pandemic related issues. In addition, they cover ways Genetec is evolving its solutions to address critical new requirements. The...
New dates have been announced for Intersec Saudi Arabia, with the Kingdom’s trade fair for security, safety, and fire protection, now scheduled to take place from 15-17 March 2021 at the Riyadh International Convention and Exhibition Center. The three-day event is organized by Saudi-based ACE Group under license from Dubai-headquartered Messe Frankfurt Middle East. The new dates come after extensive feedback and consultation with the venue, exhibitors, visitors, trade partners and associa...
Hikvision, an IoT solution provider with video as its core competency, has announced a brand-new addition to its DeepinView camera line: the Dedicated Subseries. This unprecedented new addition loads a batch of AI-powered deep learning algorithms into each unit, boasting stunning performance and cost-effective pricing. Dedicated DeepinView Cameras Over the last few years, Artificial Intelligence (AI) has been applied in many ways in security markets. As technology advances, AI chipset performa...
Acquisition of business units of South African electronics and solution provider to complement HENSOLDT’s portfolio and expand footprint in Africa. HENSOLDT South Africa has signed an agreement to acquire the Air Traffic Management (ATM) and Defense & Security business units of Tellumat. The acquisition will see HENSOLDT further expand its portfolio as well as its presence in Africa. The agreement was signed by Rynier van der Watt, Managing Director of HENSOLDT South Africa and Andre...
ISC West 2020, scheduled to take place from October 5th to October 8th 2020 in Las Vegas, Nevada, has been canceled due to industry and market circumstances. While the organizers cannot convene in person in 2020, Reed Exhibitions, along with Premier Sponsor, SIA (Security Industry Association), will transform ISC West 2020 into an all-virtual event that has been scheduled for October 5th to October 7th, 2020 to serve the security and public safety community. ISC West 2020 event canceled During...
The U.S. Chemical Safety and Hazard Investigation Board (CSB) has announced issuing a video safety message and a safety alert entitled ‘2020 Hurricane Season: Guidance for Chemical Plants During Extreme Weather Events’. Video and safety alert The video and safety alert highlight recent actions by the Center for Chemical Process Safety (CCPS) to produce industry guidance meant to help hazardous chemical facilities better prepare for extreme weather events. CSB Chairman Katherine Le...
The Partnership for Priority Verified Alarm Response (PPVAR) is pleased to announce Tom Nakatani, IT VP of Customer Monitoring Technology for ADT, has been elected President. Nakatani officially began his two-year term at the June 10th PPVAR member’s meeting after serving as Vice President. He succeeds Joey Rao-Russell, President and CEO for Sonitrol-Kimberlite, who will now serve on the PPVAR Board as an immediate past President and Treasurer. “I am honored to take on the role of PPVAR President and to work with the distinguished and influential group of industry thought leaders, public safety leaders, and key partners on our Board of Directors,” said Tom Nakatani. Changing verification technology use Tom adds, “The use of verification technology is fundamentally changing the relationship between the alarm industry and public safety for the better. We’re thrilled to be involved with the development of industry standards that will provide more actionable information for first responders. This information will improve officer safety while prioritizing their impact.” Tom Nakatani also sits on the Board of Directors for the Security Industry Association Nakatani started his career at ADT in 1991 and has held a number of positions with the company including global monitoring technology, monitoring standards, program management, operational reporting, M&A, and product delivery. He also sits on the Board of Directors for the Security Industry Association and participates on a number of industry and regulatory committees. Promoting the value of verification As PPVAR continues to work toward its mission of promoting the value of verification during the dispatch process, it is expanding the composition of its Board of Directors to increase the number of public safety representatives. This change will ensure that the PPVAR board will represent a balanced team of professionals with excellent relationships across both public and private sectors as they work together on the issues related to alarm response process. Three of the public safety and partner members were introduced and spoke at the virtual meeting, including: David L. Holl is the Director of Public Safety for Lower Allen Township, PA. Director Holl oversees the police department, emergency medical services, is liaison to two Township volunteer fire companies, and serves as the municipal Emergency Management Coordinator. He sees his involvement in PPVAR as a way to directly impact false alarm issues and is looking forward to influencing the future of responding to emergencies. Frank G. Fernandez, is the retired Chief of Police from Miami and Hollywood Police. He is the former Director of Public Safety and Assistant City Manager for the City of Coral Gables, Florida. He is currently president of Blueprints 4 Safety (B4S) Strategies Group LLC, a security and risk assessment consulting group specializing in vulnerability assessments, strategic planning and best practice policing/public safety strategic development. He chose to become involved in PPVAR because he sees the opportunity to increase situational awareness for police when responding to emergencies and to bring awareness to his public safety colleagues about the alarm industry. John Chiaramonte is President of Mission Critical Partners’ Consulting Business where he leads more than 80 dedicated and specialized public safety professionals in improving his clients’ emergency response outcomes. He is a subject matter expert in emergency communications, 911 and next generation 911. One of his goals in participating with PPVAR is to improve emergency response outcomes as new technology brings changes to emergency dispatch centers. Strengthening public safety partnership With a bold vision for the future for PPVAR, new President Nakatani plans to continue to build on the work of the previous presidents by helping improve collaboration with public safety and other partners. This vision for the future includes expansion of the PPVAR Board, educating public safety and industry members, creating a framework for alarm verification scoring, and collaborative work with PSAPs to incorporate the next generation of technologies.
ASIS International, the globally renowned association for security management professionals, has announced its decision to move Global Security Exchange (GSX) 2020 to a fully virtual experience, titled Global Security Exchange Plus (GSX+), which includes more than 80 industry renowned education sessions, a robust exhibition marketplace, and unique peer-to-peer networking opportunities. Global Security Exchange Plus Following months of careful evaluation of the risks associated with convening an event of 20,000 professionals from across the globe during the COVID-19 pandemic, ASIS leadership concluded that transitioning GSX to a virtual-only environment for its 2020 event was the correct course of action, in the best interests of its members, attendees, speakers, exhibitors, and the public. Previously scheduled to take place from 21-23 September 2020 in Atlanta, Georgia, USA, the new online GSX+ will bring together a global audience with live and on-demand features from 21-25 September 2020. Virtual-only experience “Launching GSX+ as a virtual-only experience will provide our members, exhibitors, sponsors and others with a one-of-a-kind approach that will advance security worldwide,” says Godfried Hendriks, CPP, President of the ASIS Global Board of Directors. Godfried adds, “While circumstances dictate that we must forgo an in-person meeting this year, we are excited for GSX+ to deliver to a wider global audience the exceptional security networking, marketplace, education, and training that truly set GSX apart. There is a growing demand for a comprehensive experience that helps the entire security profession learn and grow together.” Fully virtual forum for the global security community GSX+ will deliver every element of a live event in an online environment GSX+ will deliver every element of a live event in an online environment: Community, Content, Commerce, and Connection. GSX+ provides a new, fully virtual forum for the global security community to connect and engage with live discussions on the most pressing industry issues, CPE-eligible education sessions, a robust marketplace, and peer-to-peer networking. Unlike other security-industry events, GSX+ is produced by ASIS International, the world’s renowned association for security management professionals. By the industry and for the industry, GSX+ is where a global audience of top professionals and partners showcase their knowledge, products, and services through an easy-to-use, safe, and secure platform. Workplace violence and behavior detection Topics of education sessions will range from workplace violence and behavior detection to return to remote work, pandemic lessons learned and well-being of security personnel. “We are pleased to unveil our new GSX+ model, which will deliver the same number of CPEs as GSX, more accessibility with a lower cost to participate, and will live online for several weeks after an initial 5-day live event,” Peter J. O’Neil, FASAE, CEO, ASIS International. Peter adds, “It’s never been more important for organizations to focus on risk management and business continuity. GSX+ offers a new way for professionals to come together, discover new technologies and approaches, and dive into important discussions around global best practices.”
Proxyclick, the globally renowned provider of enterprise visitor management software, has launched ‘Touchless Check-in’ to provide enterprises with a contactless check-in solution at the front desk for every step of the visitor journey. "Visibility into who is entering or leaving your premises has become more critical than ever during this global crisis," said Gregory Blondeau, Founder and CEO of Proxyclick. ‘Touchless Check-in’ contactless solution Gregory adds, "Companies are realizing that understanding who's potentially come into contact with the virus is the only way to ensure employees their workplace is safe. Our mission since the onset of the COVID-19 crisis has been to give companies this level of insight, and our new contactless check-in solution serves as a natural extension of our efforts to help companies worldwide provide a safe return to work for their employees." With millions of employees, visitors, and contractors set to re-enter corporate premises around the world, Proxyclick's solution will allow organizations to perform sufficient due diligence to mitigate liability risks. The new offering introduces a completely contactless solution with no physical interaction necessary from check-in to check-out of a facility. Primary benefits and features include: Screening: Visitors can be screened according to each company's health and safety protocol, via Proxyclick's remote registration Physical check-ins happen with a unique QR code assigned to each visitor once they've passed the screening process. Security: It's fully integrated with all Proxyclick security features, including access control integration possibilities with Nedap, Lenel, C-CURE 9000, S2, Genetec, etc. Compliance: Data retention periods can be automated for any visitor information collected during the screening process. Effective visitor management system We've been able to use Proxyclick quite efficiently in how we manage visitors" "We're dealing with a combination of distribution centers, warehouses, manufacturing facilities, and admin sites. We've been able to use Proxyclick quite efficiently in how we manage visitors," said Deborah Pangallo, AVP of Facility Safety at L'Oréal. Deborah adds, "We've been able to quickly change our visitor workflows and develop health and safety questionnaires, present them to management, and roll it out to all 34 sites." User provisioning and single sign-on authentication The Touchless Check-in can be implemented quickly with Proxyclick's user provisioning and single sign-on authentication. This is especially important for global enterprises with large headcounts needing quick and easy onboarding for their employees. "We understand that a safe return to work is a priority worldwide," said Geoffroy De Cooman, Proxyclick's Co-Founder and Chief Product Officer. He adds, "It starts with implementing the right technology at the front desk so you don't have to sacrifice efficiency and privacy." This new release comes on the heels of significant company momentum. This past January, the company closed a US$ 15 million Series B funding round led by Five Elms Capital with participation from Series A investor JOIN Capital.
ExtraHop, provider of cloud-native network detection and response, announced that it has been identified as a ‘Representative Vendor’ in the second annual Gartner’s Market Guide for Network Detection and Response (NDR) report. NDR solutions “Enterprises should strongly consider NDR solutions to complement signature-based tools and network sandboxes. Many Gartner clients have reported that NDR tools have detected suspicious network traffic that other perimeter security tools had missed,” wrote Gartner security analysts, Lawrence Orans, Jeremy D’Hoinne, and John Chessman. “We live in a post-compromise world in which prevention-based approaches to security leave organizations woefully unprotected,” said Bryce Hein, Chief Marketing Officer (CMO) at ExtraHop. Full-spectrum detection, investigation and intelligent response Bryce adds, “With the rise of multi-cloud environments, the proliferation of IoT devices, and increasingly distributed operations, the ability to analyze East-West traffic is now a must have.” He further stated, “ExtraHop’s powerful combination of full-spectrum detection, advanced investigation, and intelligent response capabilities have quickly established Reveal(x) as the go-to network detection and response solution.” ExtraHop Reveal(x) ExtraHop Reveal(x) provides the visibility, speed, and scale that enterprises need to secure multi-cloud environments ExtraHop Reveal(x) provides the visibility, speed, and scale that enterprise security teams need to secure complex hybrid and multi-cloud environments against advanced multi-stage attacks. The approach uses stream processing to auto-discover and classify every transaction, user, session, device, and asset in the hybrid enterprise at up to 100 Gbps, with line-rate SSL/TLS decryption and continuous packet capture. Network detection and response ExtraHop Reveal(x) also uses the scalable computing resources of the cloud for Machine Learning and AI, applying millions of models to over 5,000 features of data derived from 4-plus petabytes of anonymized threat telemetry collected from more than 15 million devices and workloads worldwide every day. With the recently introduced Reveal(x) 360, ExtraHop now offers network detection and response as a fully hosted and managed SaaS solution.
Bandweaver announces the release of the Horizon 10km Distributed Acoustic Sensing (DAS) system. Bandweaver received a number of requests from the customers for a DAS product in this range variant, and with the commitment to supporting customers at the core of the business, was to be able to expand the portfolio to offer broader choice for customers. Users can expect the same full functionality of the existing range, including 1 and 2 channel configurations, as well as a Deep Neural Network (DNN) artificial intelligence, providing an improved performance through responsive, dynamic machine learning. Useful for longer range perimeters This system is useful for perimeter intrusion detection systems (PIDS) for longer range perimeters; these could include airports and other large industrial complexes. The new Horizon 10 is well suited for short to medium-length pipelines for third party intrusion (TPI) detection as well as leak detection. For security solutions for critical power cables, including fault location in addition to protection from third party interference, (such as damage due to unauthorized construction) then Horizon 10 is the ideal solution. Alongside this new variant, Bandweaver has taken this opportunity to rename and reclassify the existing product range so that the customers can more quickly ascertain the number of channels and the radial range of each unit. Bandweaver wanted to provide more clarity to the customers by taking a more logical, structured approach. New names are also more consistent with the naming conventions of the Bandweaver range of DTS.
Customers may know it as DMP’s enhanced all-in-one system — and until now, the XTLtouch has only been available to Verizon customers. DMP is pleased to announce that the XTLtouch Wireless Control Panel with AT&T LTE is here. “We’re very excited about this,” says DMP’s Vice President of Sales Mark NeSmith. “No other all-in-one offers the same powerful and flexible solution. For areas that require AT&T service, this allows our dealers to much more aggressively compete in the residential and small commercial markets.” Graphic touchscreen keypad All XTLtouch installation options offer Entry Check-In Protection included at no extra price The XTLtouch combines DMP’s elegant and intuitive 5-inch graphic touchscreen keypad with the popular XTLplus. The installer can place it in the best location with the option of wireless sirens and wireless keypads exactly where their customers want them. All the keypads have the exact same interface so users can learn them quickly and move from one to another easily. Plus, it’s competitively priced. In fact, all in a single small footprint, the XTLtouch comes standard with: 99 zones of DMP’s 900 MHz Two-Way Wireless LTE AND Wi-Fi communication Six Areas or Home/Sleep/Away Arming or All/Perimeter Remote control via DMP’s Virtual Keypad app or VirtualKeypad.com Built-in Z-Wave support for up to 140 Z-Wave Plus devices Custom Actions - up to 20 different user programable scripts that can be programed into the XTLtouch Video integration with multiple options via the Virtual Keypad app or browser Proactive safeguard Compared to other all-in-one systems, the XTLtouch offers much more, including: Entry Check-In Protection All XTLtouch installation options offer Entry Check-In Protection included at no extra price. In the event of an intrusion, this is a proactive safeguard against a burglar’s fast tactic to disable the security system before it can send a signal. “Entry Check-In Protection is based on the same reliable check-in technology that we’ve used for years for our high-security customers,” NeSmith explains. External 110dB Wireless Sirens The XTLtouch’s external 110dB wireless siren can be placed anywhere. When it comes to real security, this can make a resounding difference. “The first thing an intruder would typically do is try to disable the soundmaker,” NeSmith says. “But with the XTLtouch, since the siren won’t be coming from the main panel, it’s not alerting the intruder to where the main system is; therefore, it’s more secure.” Fast and flexible installations And they remind, that the XTLtouch offers table-top and wall-mount installation options to fit the customer’s preferences. And, depending on where they find the best cell reception or wireless coverage, the installer will be able to place the panel wherever it works best with the option of installing up to eight wireless sirens, as well as seven additional keypads. Those keypads all have identical user interface as the main unit and can be placed exactly where the customer wants them.
COVID-19 has sparked a flurry of criminal activity across the country, with a particular increase in petty crimes perpetrated against UK healthcare facilities. Bike theft, slashed ambulance tyres and stolen oxygen canisters are just some of the misdemeanours which have significantly grown in frequency since the coronavirus lockdown began in March 2020. Given the constant, essential work carried out by health services, it’s clear the utmost must be done to protect its physical assets, and staff, from physical attack. Fundamentally, it’s the responsibility of the facilities managers and specifiers to incorporate and carefully balance physical security strategies around healthcare sites to protect patients, visitors, property and assets. The challenge is that many of these sites are continually increasing in size and complexity to meet the higher demand from the population. Fencing, gates, storage enclosures and access control are part of a solution in securing this service sector to enable it to operate effectively 365 days a year. Effective access control Hospitals are fast-paced environments where life and death outcomes often hang in the balance of only a couple of minutes. Efficient, seamless access is therefore key. All gates and access points around the perimeter must be assessed and considered and these access points should be installed and controlled centrally, or regularly monitored. Fencing, gates, storage enclosures and access control are part of a solution in securing this service sector Consider the types of vehicles that require access; the appropriate solution should ensure that, where necessary, emergency vehicles can get in and out of the site unhindered. Effective design for maximum security If automated gates are specified, underground operators are highly recommended to remove any visible signs of surveillance on display. When designing pedestrian and vehicular access: gates should be DDA (Disability Discrimination Act) compliant. Crucially, the design of fencing and gates must accommodate rapid evacuation and access for emergency services. With regards to the car park, it may require rising arm barriers or bollards to secure it. These solutions control access and separate pedestrians from vehicle traffic whilst protecting different buildings, such as specialist units and emergency wards. Promoting wellness through aesthetics Creating a welcoming environment is a core priority when specifying security options for hospitals. Razor or barbed wire may be effective deterrents to potential trespassers, but they create an intimidating and unwelcoming aesthetic, far removed from the sense of wellbeing these developments should promote. A solution that offers both visual appeal and high levels of security is vertical bar security fencing or welded mesh panels. Both provide strong boundary protection and excellent visibility for surveillance, while offering greater protection than other alternatives. Recreational areas For areas requiring a 'softer' appearance, such as gardens and outdoor recreational areas, timber fencing is an ideal option. Timber has a natural, welcoming appearance and promotes a sense of wellbeing and privacy. As well as offering a pleasing aesthetic, it can also provide a high level of noise protection. This makes it well suited for acoustic fencing, which can improve recreational and recovery areas by protecting them from high levels of noise, transforming them into little oases of calm ideal for recuperation. Outdoor storage areas Hospitals and other medical facilities produce a large amount of medical waste which requires secure outdoor areas and bin stores to hold hazardous materials on-site before they're taken away. Hospitals have a responsibility to ensure these areas are secured using risk-appropriate fencing to avoid potentially dangerous materials getting into the wrong hands. Risk assessments Creating a welcoming environment is a core priority when specifying security options for hospitals Risk assessments are key to ensuring a risk-appropriate solution is installed. For facilities at risk of criminal activity, products accredited by standards including Secured by Design or the Loss Prevention Standards Board’s LPS 1175 are proven to reduce the likelihood of crime. It’s also best practice to locate storage areas in areas away from climbing aids such as lamp posts or trees. The fence should also be high enough to deter attempts at climbing. There are many effective and easy-to-install options on offer when it comes to specifying security for healthcare infrastructures. It is important that each site is judged individually. Every institution is different and will require a unique plan of security structures to ensure it is safe for all personnel.
COVID-19 has been a thorn in the side of countless companies within the security industry and far beyond. Here, we speak with Richard Huison, Regional General Manager for the UK and Europe at Gallagher Security, who summises his personal experience from these recent months and how Gallagher has adapted in the face of pandemic-induced adversity. How has the COVID-19 crisis impacted Gallagher on a day-to-day basis? Gallagher was actually well placed as a result of work already in progress with a number of visionaries and innovators within our business, such as our CIO Neville Richardson. They are determined to put the business on the front foot, making it more digital and proactive in delivering high speed change and we had already been migrating to Microsoft Teams before COVID-19 first reared its ugly head. It’s part of our philosophy to make our business and the solutions we create as stable, reliable and resilient as possible. Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world It means Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world. When lockdown was imposed, we set about prioritising our clients’ needs and delivering on our commitments as a critical supplier. The Gallagher leadership team quickly rolled out the means to stay connected, positive and safe as each region went into isolation. Effective communication, both internally and externally, has always been a critical success factor for our business. That hasn’t changed with the more remote and virtual nature of our communication now and, if anything, it’s even more important both for business continuity and for the personal wellbeing of each and every one of our colleagues. We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done in new ways, such as using the emojis on Microsoft Teams. Perhaps the most striking example of this is our new European marketing manager Bethan Thompson, who joined Gallagher on 1 April, little over a week after lockdown was imposed in the UK. She has enjoyed the richest and most comprehensive introduction to the business from the safety of her own home armed with just a laptop and Teams. What can be the benefits of having employees working from home? There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done To be honest, before COVID, we didn’t disconnect enough, close the laptop, switch off our technology and allow ourselves NOT to respond instantly. But trust is an integral part of our culture at Gallagher and we can easily and effectively continue to champion the right balance and support for the team moving forward. How can employees ensure they keep a healthy work/life balance? Working from home can require some personal discipline around taking regular breaks and disconnecting from technology. I encourage all my colleagues to stay active and get regular exercise during the day. Taking time out allows you to process ideas with greater clarity, to be more creative, to plan your day and use your time more effectively – all of which is part of achieving that balance. And it’s important that we do switch off and close our laptop at the end of the day, which requires some discipline when you work for a business headquartered in New Zealand, where they are 11 hours ahead. It’s good to cultivate hobbies and welcome distractions that you are passionate about, to switch off from work more effectively. Personally, I love to be outside on a long dog walk with no technology. It’s liberating. Are you seeing that businesses are already beginning to think differently about their security? We have to remember why security is important. We all have a different view on how we should maintain business continuity. Yes, properties need a reliable detection and defense solution to resist the opportunist. With the mass migration to work remotely, business leaders are concerned that their IT systems are vulnerable to attack and we read daily about the growth in cyber-attacks. It’s common sense to protect your business with a suitable access control and intrusion detection system and the pandemic has proven to business the value of being truly resilient and able to still operate whatever circumstances ensue. What will be the biggest security challenges facing businesses over the next six months? In that timeframe, I don’t see us returning to how things were prior to the pandemic, so businesses will have to adapt to a new normal. We will have to adopt a more holistic view of security, encompassing safety, security and wellbeing, with our teams at the heart of that. In the new world, how can we maintain our teams’ safety at home, or limit them to certain floor space or introduce rotas for office attendance and keep surfaces virus free while they’re there? We need to be alert to where the next threat will come from and mitigate risk against both cyber and biological threat as we’ve seen a virus in either domain can be devastating. How is Gallagher meeting the evolving demands of the market? To be honest, Gallagher has always been ahead of the curve. We’ve been talking about competencies, compliance and resilience for decades, long before cyber became the buzzword. Everything we do is related to business resilience and continuity and security is baked in to our products and solutions at source, providing confidence and reliability for all of our customers.
Security managers, installers and integrators look into a wide variety of factors when selecting a remote video monitoring receiving center to provide continued real-time surveillance of their sites. But there’s one factor which isn’t often taken into consideration, when it really should be. That’s the welfare of the video surveillance operators who are tasked with responding to alarms and ensuring on-site incidents are dealt with appropriately. The fact is, in most UK monitoring center those operators are working extremely long hours: typically 12-hour shifts, often four days in a row. The cumulative effect of that regular extreme shift pattern can be a level of fatigue which is detrimental to the performance of the operators, as well as to their own physical health and mental wellbeing. The result is a reduction in effectiveness of client video security systems. If the operators are compromised when it comes to clear decision-making, the entire monitoring operation suffers. The central aspects of concentration and alertness I’ve worked in monitoring centers for most of my adult life, starting just out of school. When I had the opportunity to begin my own video surveillance and security alarm most In UK monitoring centers, those operators are working extremely long hours: typically 12-hour shifts, often four days in a rowmonitoring center with my business partner Andy Saile, we were clear that operator welfare was a priority. After all, the operator’s job is literally to be alert and responsive, so why would we want to do anything to detract from that? That’s certainly not the case at all remote monitoring centers, though. The vast majority follow the 12-hour shift template, usually in four days on, four off patterns. Anyone who has done any job knows that at the end of a 12-hour shift, fatigue kicks in, and the ability to focus diminishes. That’s particularly the case in roles where concentration and alertness are central to the job. For a video surveillance operator in a monitoring center, fatigue starts to affect the ability to work effectively during the stretch between 9 and 12 hours. That’s the danger period. If an operator misses a criminal incident because of fatigue, that means the security system the client is relying on is not working. The operator is the link between the technology and the police. They are a key component of the whole system. If an operator misses a criminal incident because of fatigue, that means the security system the client is relying on is not working Government guidance After working in remote video monitoring centers and experiencing what we considered both good and bad practice, when Andy and I established our business, we were clear that our operators would work in shifts that were no longer than nine hours at most. This delivers the best results for our customers and our staff. Our feeling was backed up by UK government guidance on designing video surveillance control rooms. The Centre for the Protection of National Infrastructure has produced a detailed publication called 'Human factors in video surveillance control rooms: A best practice guide'. This publication says: “12-hour shifts, although common in many settings, rIf the operators are compromised when it comes to clear decision-making, the entire monitoring operation suffersepresent a greater risk to health and performance than 8 hour shifts in terms of higher perceptions of workload, fatigue and stress, risk of more errors and accidents, and higher health risks.” Negative impacts on health and wellbeing It further says: “Research confirms that the interruption of circadian rhythms (the 24 hour natural bodily cycle) by shift work can have a negative impact on both general wellbeing and physical health (short and long term), as well as on performance due to general fatigue (i.e. an increased likelihood of errors). Shift-patterns are often designed to meet commercial and operational requirements, but serious consideration should be given to minimizing negative effects on health and well-being by the use of appropriate shift patterns.” The majority of our shifts cover seven or eight hours, and our operators never work more than four in a row. That allows for an average of three or four days between each batch of shifts. The idea is to avoid running staff into the ground, and that in turn makes our company more efficient and effective in the service of our clients. We’ve seen the results in practice: our operators only took four sick days in the past year. That’s four sick days in total, not per operator. It’s a Video surveillance operators have intense jobs, responsible for monitoring and responding to video surveillance and intruder alarm events from commercial and domestic propertiesremarkably low figure in the remote video monitoring industry. Full readiness Video surveillance operators have intense jobs, responsible for monitoring and responding to video surveillance and intruder alarm events from commercial and domestic properties. They liaise with the police, the customer keyholder, end users and any relevant authorities as required. Our customers are equipped with both cameras and motion sensors, which generate alarms on movement. When a movement in a specified zone occurs, the alarm is raised directly with the operator responsible for that site. The response differs from customer to customer depending on their own protocols. If there are dome cameras in place, for instance, they can be utilised to provide additional situational awareness. Escalating risks Traditional intruder alarm monitoring centers required the operator to react to an alarm by calling a keyholder, who would then respond to the incident. But remote monitoring requires concentration, focus, and deductive skills. The information required to make an informed decision isn’t immediately obvious – the The operator must be able to snap to full focus at any point over the course of their shift, and it’s tiringoperator must work out what has moved and establish its cause. There’s no one to provide extra detail. The operator’s art is in working out for themselves what is relevant information in a scene and what isn’t. That requires their full attention. When operators work four days of 12-hour shifts in a row, risks escalate as a result. The risk that the wrong decision can be made. The risk that customers or police are not notified when they should be. There is a real-world cost associated with those decisions. The operator must be able to snap to full focus at any point over the course of their shift, and it’s tiring, whether there’s an incident to respond to or whether the operator is simply prepared to act. Operator skills are diluted if their shift patterns are not considered. Why would you hire someone based on their skillset, and then work them into the ground until they’re too tired to execute those skills? Choosing a monitoring center Security systems and modern technology are crucial ingredients in protecting people and property, but they also require interpretation. A video surveillance operator is an Security systems and modern technology are crucial ingredients in protecting people and property, but they also require interpretationinvestigator and a conduit, bridging the divide between images, alarms and authorities, be they police, security guarding operations or keyholders. To run them into the ground is to diminish their ability to make intelligent decisions. It makes sense, then, to opt to work with a monitoring center which puts the welfare of its operators at the forefront of its business. Start by asking your prospective RVRC about their shift patterns. A monitoring center with respected and happy staff is a monitoring center best able to provide a fully effective service, optimising your security systems and maximizing your investment.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cybersecurity, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analog cameras. A higher percentage of commercial customers use cellphone applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies Prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organization (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
Multiple Construction sites in the Albuquerque area are managed by Shumate Constructors, Inc., an Albuquerque, New Mexico-based construction contractor, that is also renowned for building educational facilities. In addition to building schools from the ground up, Shumate Constructors completes school additions and remodels. Construction site thefts Three years ago, the company began having problems keeping thieves out of its construction sites during non-working hours. Unwatched construction sites are hot beds for a variety of thefts - from copper pipes and wire to hand tools to heavy-duty machinery. The loss of machinery, such as front-end loaders, would cost hundreds-of-thousands of dollars. Sometimes workers will arrive to a site in the morning only to find materials, such as copper pipe, gone along with their tools. Enhancing construction site security The sites also presented a challenge due to changing construction conditions The result is the loss of a whole day and sometimes multiple days of work. On top of the lost time, the contractor has to cover the cost of replacing materials, file an insurance claim for each theft and complete additional administrative paperwork that they weren’t planning to invest time in. The sites also presented a challenge due to changing construction conditions. Equipment or storage containers are delivered and removed, the sites are graded/re-graded and as sections of build were completed, tools, materials and supplies were moved to different areas. Flexible, reliable wireless solution At a contractor trade show a few years ago, Mark Shumate, President of Shumate Constructors met Dave Meurer, President of Albuquerque’s Armed Response Team. Meurer introduced Shumate to the idea of a flexible, reliable wireless solution that could continually monitor the entire site without the need to trench around the perimeter. “Mark [Shumate] was fed up with theft at his construction sites so we started to discuss some prevention ideas,” said Meurer, adding “I knew this was a great fit for the combined Inovonics transmitter and Optex sensor solution.” Optex sensors installed He further said, “At the Armed Response Team, we refer to this solution as the never sleeping, non-blinking eye. Shumate was not aware of any reliable solutions that could provide this type of theft prevention, but we explained that we were very confident in this application and he was definitely interested.” To install each combined sensor, the Armed Response Team attached the Optex sensors to a freestanding steel post with a base plate on it and deployed them throughout the site. This allowed the flexibility to be easily moved to accommodate site changes. Once installed, a signal was easily achieved. iSeries Optex/Inovonics sensors The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary The sensors in the combined solution often need to communicate as far as an entire city block and the perimeters can be several thousands of feet. The iSeries Inovonics/Optex solution was able to easily accomplish this feat. The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary. For some sites, it can be as few as a dozen, and others it can be as many as 30 or more. “Together, the products offer a great solution,” noted Meurer, adding “The Optex sensors can handle varying weather conditions and Inovonics’ wireless connectivity offers less signal drop and more consistent reporting signal than any of the other transmitters we’ve tried.” Efficient perimeter security solution “Between the perimeter technology by Inovonics and Optex, and the Armed Response Team’s follow-up, we have seen zero thefts for all projects since installation. With the integrated wireless solution, the construction sites are monitored on a real-time basis and immediately notify the Armed Response Team upon unauthorized access,” said Mark Shumate, President of Shumate Constructors. He adds, “We look at the perimeter security solution as a great investment. Annually, the cost of manpower, replacement of lost or stolen items and damage repairs could easily cost three times more than we spend on Armed Response Teams’ services with the Optex and Inovonics solution.”
Optex installs intrusion detectors at a gated, luxury motor coach resort community in the desert area of Southern California. The property features a clubhouse, fitness room, community pool, and 141 "Casitas": 1200 sq ft. custom-built living spaces with waterfront motor coach pad. Because most owners were on site only a portion of the year, the property faced an increasing issue with trespassers in the off- season months. The increase in trespassing also lead to an increase in vandalism and theft cases. The large perimeter, combined with the desert heat, required a robust, long distance solution that would stand up to the elements. Detection range of 650 feet The integrator worked directly with OPTEX to plan out a perimeter system that would overcome the challenges faced on the site. Because power was readily available and a long distance solution was required, hardwired AX-650TF beams with a detection range of 650ft. were selected. After discussing possible mounting options with the OPTEX sales representative, the integrator decided on the AX-TW200 photobeam tower. Because the customer provided a site plan, OPTEX was able to pre-build the towers and mount the beams in them at no additional charge. Once installed, the tower and beam solution provided full perimeter protection by activating strobes and notifying an on-site guard to the location of an intrusion. The result was a huge decrease in the amount of unknown trespassers, thus greatly reducing reports of theft and vandalism.
A private residence and its grounds comprises a variety of different perimeters including fences, bushes and walls with large areas of vegetation and pets roaming around freely. The home-owner sought to protect his property from intrusion using a discreet early-warning detection technology linked to a networked CCTV system. The system had to provide 100% ground coverage in a precise detection pattern and be immune to false activations by the home-owner’s pets and vegetation. Precise intrusion detection Other solutions were deemed unsuitable for the task: it was difficult to set the detection areas of a PIR or a microwave detector precisely enough; Video Analysis is expensive and could be affected by environmental conditions, such as light and shadows; and a buried cable sensor would have been costly and disruptive to install. Redscan was chosen because it was easy and quick to install and possible to set up a precise detection area easily, which would not be affected by the type of the boundary or the environment with very low false alarms. Optex made an installation of 17 Redscan RLS-3060SH Class-1 Laser Detectors to protect perimeter and integrate with cameras.
Renowned consultants have specified OPTEX's REDSCAN laser detector as their choice for securing medical marijuana Grow Op facilities. U.S. retail cannabis sales will rise more than five-fold over the next five years, from an estimated $2.2-$2.6 billion in 2014 to $7.4-8.2 billion in 2018, according to new financial data released in the 2014 edition of the Marijuana Business Factbook. Because of this growth, local governments are setting strict regulations including detailed security specifications to prevent theft or diversion of medical marijuana at “Grow Op” facilities. In addition, security specifications outline how companies communicate, assist and alert local law enforcement of unlawful activities. Part of this specification outline focuses on perimeter intrusion and surveillance systems. Video Management Software REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications To meet perimeter intrusion and surveillance system requirements, the renowned consultants have specified OPTEX’s REDSCAN Laser Detectors as their choice for securing medical marijuana Grow Op facilities. With large deployments across North America, REDSCAN has proven to be highly effective due to its flexible motion detection capabilities, IP integration into leading Video Management Software (VMS) and its ability to be deployed across multiple perimeter applications utilizing indoor and outdoor functions. REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications and is both UL and FDA approved. Effective IP intrusion REDSCAN can detect an object's size, speed and distance with precision accuracy. It provides a number of flexible detection applications within the Grow Op's perimeter. It can be mounted horizontally to actively detect and track objects or vertically mounted to create invisible laser walls triggering cameras to preset positions. Because all remotely monitored security systems rely on a motion trigger, REDSCAN works seamlessly with surveillance cameras preventing and/or recording theft and diversion of medical marijuana. Because Redscan is integrated with all the popular video management software, its users now have highly effective IP intrusion, surveillance and security event management options.
Burglaries from outdoor ‘smash and grab’ have been costing retailers millions of dollars of loss. In order to detect if someone is trying to penetrate retail store buildings, retailers need to deploy a detection system that triggers activity and activate cameras and authorities. Redscan RLS02020S detectors Utilizing the OPTEX Redscan RLS02020S vertical mode detection with Genetec RSA allowed the national retail company to achieve just this. OPTEX installed first 12 stores for a total of 105 RLS-2020S detectors for the initial project. Redscan covered the sides of the buildings as well as key areas of the roofs where needed. It was integrated into the Genetec RSA plugin that unifies OPTEX Redscan detectors with cameras creating full control of video recording and security events. Enhancing retail security Next opportunities are for installing RLS-2020S at 100’s of stores across the United States in 2020-2021. Due to the success of Redscan, the national systems integrator is now introducing the value of this application for other large retail end users.
Gated aviation fuel farm adjacent to operation building. Client wanted to create a multi-purpose IP solution to detect intrusion from asset theft activating CCTV cameras and create an access control system for a 24-hour operation. Following a thorough site survey, the integrator was able to create a solution that achieved all of its client’s goals. Using 4 Redscan laser detectors in horizontal mode, the integrator was able to secure the fenced perimeter using CCTV surveillance into an IP network that is monitored by the end user. Using unique rules available through VMS, the integrator used a vertically mounted Redscan laser detector to activate/deactivate the intrusion system when a fuel truck would enter and leave the gated fuel farm.
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload