OPTEX, renowned global sensor manufacturer, will demonstrate the recently enhanced long-range RLS-3060 LiDAR series live on its stand, as well as showcase its new 180-degree outdoor sensor ideal for boundary protection. OPTEX LiDAR And REDSCAN Series Sensors “OPTEX’s LiDARs have been successfully deployed in the Middle East region for years, for a number of applications ranging from perimeter security to roof and asset protection. At this year’s Intersec we are looking forwar...
CHeKT announces a partnership with OPTEX, the supplier of outdoor sensors for intrusion security. CHeKT delivers a visual-monitoring platform for alarm monitoring centers. This partnership with Optex will significantly advance the protection capabilities of security integrators globally. The solution relies on ‘The CHeKT Bridge’, the first product brought to market by CHeKT. With years of development, the CHeKT Bridge premiered in April 2018 at the ISC West trade show. The vision of...
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all o...
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numer...
Senstar, global perimeter intrusion detection and video management solutions provider, is pleased to announce its Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system has received the Fixture Seal of Approval (FSA) from the International Dark Skies Association (IDA). IDA is the recognized authority on light pollution. Its mission is to preserve and protect the nighttime environment and the heritage of dark skies through environmentally responsible outdoor lighting....
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's p...
Eagle Eye Networks, global provider of cloud-based video surveillance solutions, announced that it has enhanced the video analytics offered within the Eagle Eye Cloud VMS. Customers can easily and instantly activate analytics on their cameras without having to install additional hardware or software. No on-site technicians or system upgrades are needed to immediately receive analytic alerts and data. Eagle Eye Cloud VMS Eagle Eye Cloud VMS customers can enable analytics from the dashboard for any camera in their account. Eagle Eye Analytics will function on any camera that is supported by the Eagle Eye Cloud VMS – no analytic functions of the camera are required. Eagle Eye Analytics will even operate with analog cameras. The ability to deploy analytics quickly and without upfront hardware or software investment shows the long-term advantages of a cloud-based solution. The following analytics are now available: Intrusion detection is used to generate a notification when an object enters that forbidden area Line Crossing – Detects when an object crosses a virtual line. Direction may be specified, and notifications may be generated. It is useful for receiving notifications when a security boundary (fence, restricted area, and one-way road) is crossed. It is also well suited for monitoring building entrances, loading docks, and parking lots. Intrusion Detection – Detects when an object enters a customer defined area. Intrusion detection is used to generate a notification when an object enters that forbidden area. Object Counting – Counts how many objects cross a line in either direction. This can be used for counting cars, people, or other objects. Total count per day, per direction, and current delta of the count are maintained and displayed. Loitering – Monitors a defined area and triggers an alert if an object lingers longer than the pre-configured dwell time. Eagle Eye Gallery Viewer In the enhanced Eagle Eye analytics experience, customers are able to track and view up to twenty-five analytic events in Eagle Eye’s intuitive Gallery Viewer. The Eagle Eye Gallery Viewer is an exceptional tool for quickly finding video of interest and viewing active motion and analytic events. In addition, the improved Eagle Eye Cloud VMS gives customers the ability to gain further operational insight by generating customized period graphs of the enhanced data from five minutes to seven days. The enhanced Eagle Eye Analytics are immediately available and can be enabled within the Eagle Eye Dashboard on a camera-by-camera basis. Customers do not need to replace their existing cameras to have access to Eagle Eye Analytics.
Check Point announces a technology integration with Amazon Web Services (AWS) Security Hub, a unified security service, which centralises view and management for security alerts. This integration, together with the addition of Dome9 to the CloudGuard portfolio, following its recent acquisition by Check Point, allows enterprises to access multi-layered security and nearly continuous compliance capabilities from the central console of AWS Security Hub. By leveraging AWS Security Hub, Check Point can provide a nearly seamless experience to customers in providing additional protection to their AWS environments against advanced cyber-threats in real time and mitigating compliance risks at any scale. Enhanced Threat Prevention CloudGuard IaaS adds contextual information such as asset tags, security groups and availability zones to dynamically update security policies AWS Security Hub provides users with a comprehensive view of their high-priority security alerts and compliance status by aggregating, organizing, and prioritising alerts, or findings, from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector, and Amazon Macie as well as from AWS Partner Network (APN) security solutions. The findings are then visually summarised on integrated dashboards with actionable graphs and tables. The Check Point CloudGuard solution natively integrates with AWS Security Hub to provide customers with better visibility into gaps in their security and compliance posture, and context-rich security intelligence for enhanced threat prevention. CloudGuard IaaS adds contextual information such as asset tags, security groups and availability zones to dynamically update security policies and provide AWS Security Hub with visibility into threat alerts based on deep event correlation and rule-based cloud intrusion detection. To complete the picture, customers leveraging the CloudGuard Dome9 solution can analyze and respond to events triggered by its sophisticated nearly continuous compliance and governance framework. Continuous Network Monitoring Enterprises using it benefit from powerful features that prevent 5th generation cyber-attacks in their hybrid environments. These features include: Threat prevention of both North-South and East-West cyber-attacks based on contextual awareness and attribution of network traffic to cloud-native ephemeral services Real-time alerts on network vulnerabilities, with nearly continuous network monitoring and alerting based on easily customisable policies Comprehensive visibility into cloud assets and security configurations Nearly continuous compliance monitoring and enforcement of security posture Fully integrated security capabilities, including firewall, IPS, application control, IPsec VPN, antivirus, anti-bot and more Unified management of security policies across hybrid environments (datacenter, private and public clouds) Manage Cloud Environments Check Point has been at the forefront of cloud security automation solutions that have built deep integrations with a broad range of AWS security services" “AWS is a leader among cloud services providers, delivering powerful security capabilities that help enterprises deploy and manage cloud environments with enhanced security features at scale,” says Itai Greenberg, Vice President of Product Management at Check Point Security. “Check Point has been at the forefront of cloud security automation solutions that have built deep integrations with a broad range of AWS security services. We are privileged to offer integration with AWS Security Hub to deliver comprehensive visibility into ongoing security and compliance risks, and end-to-end workflows to mitigate risks.” “We are happy to have Check Point as a launch APN Partner integrating the CloudGuard IaaS solution with AWS Security Hub,” said Dan Plastina, Vice President, Security Services, Amazon Web Services, Inc. “Check Point offers advanced threat prevention capabilities to AWS customers. The integration with support for AWS Security Hub makes it even easier for our shared customers to access and act on their cloud security insights.”
ASSA ABLOY Electronic Security Hardware and ASSA ABLOY Group brand Adams Rite announces the release of the HES 9800 and Adams Rite 7800 Electric Strike. The HES 9800/Adams Rite 7800 Series is a low-profile, surface mounted electric strike designed specifically to work with the Adams Rite 8800 & 8700 Series Narrow Stile Rim Exit Devices and the EX88 Interlocking Rim Exit Device. As the only electric strike compatible with the unique Adams Rite Starwheel and Interlocking latching mechanism, the new HES 9800/Adams Rite 7800 easily electrifies openings on aluminum storefronts, commercial perimeter doors and high-occupancy commercial facilities, and provides an electrification option for the Adams Rite EX88. Dedicated Power Supply “As one product offered by both legacy brands, the HES 9800/Adams Rite 7800 Electric Strike extends ASSA ABLOY’s commitment to provide more electric strike solutions for more applications,” explained Matt Branson, Product Manager, ASSA ABLOY Electronic Security Hardware. “Customers loyal to either HES or Adams Rite can use the HES 9800 or Adams Rite 7800 as a cost-effective way to upgrade an opening from mechanical to electrical. With no need for door modification, a dedicated power supply or wire transfers, there is less labor time spent installing the hardware.” The HES 9800 Electric Strike expands the HES 9000 Family of surface mounted electric strikes to offer a new option to easily electrify a retrofit project HES products lead the access control industry with electric strikes for any type of lockset application. The HES 9800 Electric Strike expands the HES 9000 Family of surface mounted electric strikes to offer a new option to easily electrify a retrofit project that utilizes Adams Rite Starwheel or Interlocking rim exit devices. Cost-Effective Solution Adams Rite is the Aluminum Hardware Authority, specializing in door and door hardware solutions for narrow stile aluminum applications. The Adams Rite 7800 Electric Strike is designed to offer an electrification option for narrow stile aluminum applications that require a life-safety rim exit device. The Adams Rite 7800 Electric Strike adds a no-cut surface mounted electric strike to the product portfolio, providing loyal Adams Rite customers with a cost-effective solution to electrify the Adams Rite EX88 Exit Device. The HES 9800/Adams Rite 7800 exceeds Grade 1 standards for strength and performance. All functions are performed within the ½” thick strike body, which is protected by a sleek stainless steel cover to conceal the mounting screws and provide the most aesthetic appearance. The HES 9800/Adams Rite 7800 is dual voltage, field selectable for fail secure or fail safe operation, and comes with one 1/16” and one 1/8” spacer plate to accommodate varying door gaps.
The International Fire & Security Exhibition and Conference (IFSEC) India Expo, South Asia's largest security, civil protection and fire safety show by UBM India, is gearing up for its 12th edition which is slated for December 5th - 7th, 2018 at Pragati Maidan, New Delhi. Supported by the Asian Professional Security Association (APSA), American Society for Industrial Security (ASIS), Electronic Security Association of India (ESAI), Overseas Security Advisory Council (OSAC) and the Associated Chambers of Commerce and Industry of India (ASSOCHAM) among others, the show will see participation from over 20 countries such as UK, USA, China, Taiwan, Malaysia, Australia, Canada, Singapore, Korea, Russia and will bring together over 300 domestic and globally renowned brands, key government officials, consultants and business experts. Prioritizing Security And Surveillance The Government of India recognizes this vulnerability and has introduced strict regulations and guidelines" The visitor profile of the expo will include professionals such as CSOs, Admin Heads, CIOs, CTOs, Facility Heads, Purchase Managers, System Integrators and Dealers & Distributors of organizations. Speaking on the announcement of the 12th edition of the IFSEC India Show, Mr. Yogesh Mudras, Managing Director, UBM India said, "The South Asia region, which the IFSEC India Expo brings within its radar, is a vulnerable as well as a progressive zone with ongoing threats to homeland security, rising urbanization, proliferating crimes, and low people-to-police ratio being some of the most significant factors. The Government of India recognizes this vulnerability and has introduced strict regulations and guidelines that promote the use of security and surveillance in the country -- the security of children within school premises, and the growing need for women's safety being noteworthy instances.” Electronic Security Market “Besides, in a bid to make the country truly modern and secure, it has till date invested around ₹ 48,000 crores for its Smart City initiative that aims to create at least 100 smart cities in India. Owing to these factors, it comes as no surprise that the electronic security market in India is expected to witness a tremendous growth with a projected CAGR of nearly 13 per cent over the next decade." "IFSEC India 2018 aims to act as a catalyst for the progress and vision of this proliferating industry, as it provides a platform for industry players to collectively ideate, innovate, spot trends and enable the shift in India's security paradigm from a defensive approach to a monitoring and responsive one," he further added. Ever-Evolving Industry The IFSEC India Expo provides high-impact, informative demos and a wealth of opportunities for the visitors IFSEC India will include in its already formidable repertoire, products and technologies pertaining to CCTV & Surveillance, Biometrics & RFID, Integrated Systems, Access Control, GPS Systems, Video Management, Parking Automation, Transport, Perimeter Protection, IoT, Smart Homes, Security & Safe Cities in addition to surveillance for the knowledge of end users and providers. Key global brands & distributors include Premier Plus Partners: Aditya Infotech, Advik, Dahua, eSSL, Globus, Hikvision, Mark, Nuctech, Realtime, TVT and Zkteco; Premier Partners such as Axestrack, Biomax, Honeywell, Mantra, Panasonic, Road Point, Seagate, Timewatch, Unique Electrovision, Vantage, and Western Digital, among others. Significantly, in an industry where upgradation of technology is the very key to surviving the competition, IFSEC India Expo provides high-impact, informative demos and a wealth of opportunities for the visitors to network and learn about new technologies, industry best practices and trends, challenges, market insights and discover the best solutions to keep their business and clients secured. High Octane Business One of the novel ways by which the expo this year is encouraging this vital interaction between key exhibitors with cutting-edge innovations to offer and big ticket buyers is through the creation of the Regalia Lounge, an exclusive, private 5 star lounge, meant solely for one-on-one interactions and high octane business on a 'By Invitation Only' basis. IFSEC India 2018 has decided to proactively decipher relevant insights gained in the global security market as well as latest technology With security in India continuing to be an onerous task, IFSEC India 2018 has decided to proactively decipher relevant insights gained in the global security market as well as latest technology such as aerial vehicles and drones by conducting a two-day conference with the theme 'Unraveling the Evolution in Security Tech' alongside the exhibition. Security Veterans The conference will witness the presence and participation of eminent industry personalities including Shri D.R. Karthikeyan, Chairman, Assocham Homeland Security Council; Capt. Raghu Raman, President - Risk, Security and New Ventures, Reliance Industries Ltd.; Shri M.S. Upadhye, IPS, Chief Security Commissioner, Delhi Metro Rail Corporation; Lt. and Gen. Sudhir Sharma, PVSM, AVSM, YSM, VSM, Former Quartermaster General, Indian Army, among others. Some of the trending topics scheduled to be discussed at the conference are - 'Corporate Risk Management: Integrating Standards and BeSomst Practices into Operations' , 'The Evolving Role of a CSO in Crisis Management and in Ensuring Business Continuity', 'Regulatory Compliance Requirements Related to Corporate Security', 'Industry Best Practices in the Manufacture of Security Products by Bureau of Indian Standards', 'Technology-Enabled Disruptions', 'Emerging Paradigms in Security Architecture', 'How AI & IoT Add Value to Video Surveillance Systems', 'The Threat of Cyber Attacks on Security & Surveillance Systems', and 'How Drones and Unmanned Aerial Vehicles Can be Effectively Used to Enforce Homeland Security'. Impressive Industry Growth The awards will recognize the excellence and innovations of CSOs & Security officers who continuously work behind the scenes This year, IFSEC India is all set to host the 3rd edition of the IFSEC India Awards. With the impressive growth of the Electronic Security Industry in India, the awards have been crafted to specially get the minds behind electronic security in various industry verticals like BFSI, Retail, Manufacturing, Energy, Healthcare, PSUs, IT & ITES and Infrastructure in the limelight. The awards will recognize the excellence and innovations of CSOs & Security officers who continuously work behind the scenes to ensure robust security. The process advisors for the IFSEC India Awards will be Ernst and Young. IFSEC India owes its rich legacy to the 40-year-old IFSEC Global and success to the way the Indian edition has modified itself to suit the specific needs of this region. Recommended by industry experts as the pre-eminent authority on the global security and fire industry, the expo has nudged the industry on the path to a completely secure, smart and digitally enhanced world.
Johnson Controls has added two new appliances to its video security products portfolio: Tyco Analytics Appliance and Tyco Transcoder. When added to existing IP recorders, the hardware offloads video processing from network video recorders, increasing system capabilities without overhauling the infrastructure. The Tyco Transcoder increases transcoding by 14 channels to meet live streaming requirements with constrained network bandwidths while maintaining a small form factor. The simplified set-up reduces installation time and the hardware can be easily deployed in a variety of environments. Reduction In NVR CPU Usage The Tyco Analytics Appliance adds up to 16 useable analytic channels beyond what is available on the network video recorder, reducing NVR CPU usage and resulting in increased performance. The added resource increases business intelligence and revenue opportunities, and also features analytics overlay, live people counter, and analytics dashboard for streamlined viewing. The Analytics Appliance can be configured with four channels devoted to license plate recognition, or up to 16 channels of video intelligence rules such as crowd formation, object detection, perimeter protection, queue length and more. These real-time analytics are ideal for applications seeking to augment processes and overall productivity.
Johnson Controls is introducing a new, more powerful Network Video Recorder (NVR) that will provide the foundation for self-training analytics and, eventually, artificial intelligence. The hardware offers highly accurate people counting and tracking from an overhead view by distinguishing between humans and objects in the camera’s field of view. When combined with the full suite of analytics available through VideoEdge, as well as the command and control of the victor Video Management System, users are able to access insightful business data. This includes rules like crowd formation, heat mapping, perimeter protection and license plate recognition. Capabilities Of VideoEdge 2U NVR The NVR manages analytic reporting with confidence via a graphic processing unit that optimizes performance beyond standard video intelligence. The Deep Intelligence NVR features all the capabilities of the powerful VideoEdge 2U NVR such as maximizing smart streaming resources through triple video streams, H.265 codec support, VideoEdge TrickleStor edge-based redundancy and front-accessible storage drives. The victor client on VideoEdge hardware platforms allow users to leverage high-performance video streaming, audio, video intelligence and an expansive feature set for improved real-time command and management.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational Awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognize potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security Best Practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organizations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology In School Security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-Hour Monitoring Solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar Detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorized to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting And Landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing Physical Environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.
The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make improvements in the area of video security, and beyond. However, as the list of possibilities grows, so too does the risk of unauthorized access by cybercriminals. We should all be aware that a single weak link in a communications infrastructure can give hackers access to sensitive data. That’s the bad news. Safeguarding Data And Utilizing Deep Learning The good news is cybercrime can be avoided by employing a data security system that’s completely effective from end-to-end. One technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’ Once this level of safeguarding is in place you can begin to confidently explore the technologies and trends happening now, and those on the horizon. So, what will be having an influence on surveillance in 2018? Well, according to IHS Markit, one technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’, which uses algorithms to produce multiple layers of information from the same piece of data, therefore emulating the way the human brain absorbs innumerable details every second. In Europe, GDPR compliance will also be a big talking point as new principles for video surveillance data collection, use limitation, security safeguards, individual participation and accountability are introduced. And, as the popularity – and misuse – of drones continues to rise, the recent developments in drone detection technology will be particularly welcomed by those whose primary concern relates to large areas, such as airport perimeter security. The Future Of 'Smart' Video Analytics An important feature of today’s intelligent cameras is the ability to provide smart video analytics. The Bosch ‘i’ series, for example, offers a choice of formats – Essential Video Analytics and Intelligent Video Analytics. Essential Video Analytics is geared toward regular applications such as small and medium businesses looking to support business intelligence (e.g. inter-network data transfer), large retail stores and commercial buildings for advanced intrusion detection, enforcing health and safety regulations (no-parking zones or detecting blocked emergency exits) and analyzing consumer behavior. The camera-based, real-time processing can also be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Intelligent Video Analytics provides additional capabilities. It is designed for demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). An important feature of today’s intelligent cameras is the ability to provide smart video analytics Intelligent Video Analytics can also differentiate between genuine security events and known false triggers, such as challenging environments created by snow, wind (moving trees), rain, hail, and water reflections. For more expansive areas, like an airport perimeter fence, the system has the range and capability to provide analysis over large distances. And, if a moving camera is employed, it is also possible to capture data on objects in transit when used in conjunction with the Intelligent Tracking feature. For roadside use, Intelligent Video Analytics systems, such as the Bosch MIC IP range, are resistant to vibrations and can still operate in extreme weather conditions, continuing to detect objects in heavy rain or snow. Evolving Cameras Past Surveillance It’s becoming ever clearer that the IoT is transforming the security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. The capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed) With intelligent video security cameras at the core of an urban infrastructure smart data can be collected to optimize energy consumption via smart city lighting that responds to crowd detection and movement. Cameras can also be used to improve public transport by monitoring punctuality and traffic flow based on queue lengths, with the ability to control traffic lights an option should a situation require it. As the urban sprawl continues and this infrastructure grows, the need for more knowledge of its use becomes more essential, necessitating the monitoring technology developed for use by human operators to evolve into smart sensing technology, that no longer just provides video feeds, but also uses intelligent analytics and sophisticated support systems. These systems filter out irrelevant sensor data and present only meaningful events, complete with all relevant contextual data to operators to aid their decision-making. Expanding The Video Security Camera Network Today, video analytics technology has tangible benefits for human operator surveillance, and delivers KPIs that are highly relevant to transport operators, planners and city authorities. As an existing infrastructure, a video security camera network can be improved and expanded by installing additional applications rather than replaced. From a business perspective, that means greater value from a limited investment. Thereafter, the capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed), image and data interpretation, and the ability to perform a variety of tasks independently to optimize both your safety and business requirements. The fact is, cameras see more than sensors. Sounds obvious, but a conventional sensor will only trigger an alarm when movement is detected, whereas a camera can also provide the associated image and information like object direction, size, color, speed or type, and use time stamps to provide historical information regarding a specific location or event. Based on this evidence, the video security camera of today is more than ready for the challenges of tomorrow.
ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. Here’s a quick rundown of integrator companies acquired by ADT: Protec, a Pacific Northwest commercial integrator (Aug. 2017); MSE Security, the USA’s 27th largest commercial integrator (Sept 2017); Gaston Security, founded in 1994 as a video surveillance integration company and whose services have since expanded to include intrusion, access control, and perimeter protection (Oct. 2017); Aronson Security Group (ASG), which delivers risk and security program consultants and offers advanced integration services, consulting and design engineers and a National Program Management team (March 2018); Acme Security Systems, among the largest privately held security systems integrators in the Bay Area, focusing on electronic security systems, access control, video networks and more (March 2018); Access Security Integration, a regional systems integrator specializing in design, delivery, installation and servicing of electronic security systems including enterprise-level access control, video and visitor management solutions, perimeter security and security operation command centers (Aug. 2018); In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity with the following two acquisitions: Datashield, specializing in Managed Detection and Response Services (Nov 2017); Secure Designs, Inc., specializing in design, implementation, monitoring, and managing network defense systems, including firewall services and intrusion prevention, to protect small business networks from a diverse and challenging set of global cyber threats (Aug. 2018). ADT has acquired more than a half-dozen security system integration firms in the last year or so For additional insights into ADT’s game plan and the strategy behind these acquisitions, we presented the following questions to Chris BenVau, ADT’s Senior Vice President of Enterprise Solutions. Q: ADT has been actively acquiring regional integrators this year – more than a half a dozen to date. Please describe the history of how ADT came to embrace a strategy of acquiring regional integrators as a route to growth? ADT's acquisition of Red Hawk is set to close in December, and brings premiere fire and life/safety solutions BenVau: Our acquisition strategy started at Protection 1 when we embarked on our journey to build out our commercial and national account business and add enhanced integration capabilities to our portfolio. The merger of Protection 1 and ADT brought that foundation to ADT which up to that point was primarily a residentially and SMB-focused company. After the merger, we set out to identify and acquire additional regional integrators that would continue to build on that foundation and deliver enhanced technical solutions, advanced technologies and an expanded service, install and support footprint. Through our acquisitions we now operate two Network Operations Centers and three Centers of Excellence. We are also unique in the industry with the number and variety of certifications, like Cisco and Meraki, our engineers hold which ultimately allows us to offer Managed Security as a Service. They have also enhanced our operational capabilities. Q: What criteria do you use to evaluate whether an integrator is a good “fit” for ADT? BenVau: First and foremost, we look at the culture of the companies. The companies that we target for acquisition must be metrics- and customer service-driven. Secondly, we look at the leadership teams. ADT view their acquisitions more like mergers and take a patient approach to integrating them into their business We have been fortunate in the fact the leadership of the companies we acquired remain with us today in key management and executive positions helping to drive continued growth within their organizations. We also evaluate their current customer base, unique solutions and their ability to complement and enhance our portfolio with the goal of becoming a leading full-service, enterprise commercial provider. Our acquisitions have bolstered our network capabilities, brought enterprise risk management services, and a broader solution set in high-end video and access control solutions. Our most recent acquisition – Red Hawk, set to close in December – brings us premiere fire and life/safety solutions. Q: What changes are typically needed after an integrator is acquired in order to adapt it to the ADT corporate model? BenVau: We view our acquisitions more like mergers and take a patient approach to integrating them into ADT while taking into account their culture. We want to ensure that we find the right positions for their people, embrace the right messaging and put the right processes in place. We acquire these companies because they are the best in their respective businesses and geographies and bring their knowledge and experience in markets or with solutions that we may not have had previous access to. ADT can support clients with their own in-house technicians which helps to ensure a consistent security program Q: How can regional integrators benefit from the ADT brand? Have your newly acquired integrators realised additional growth? BenVau: The companies we have acquired, generally, have exceeded expectations and surpassed initial goals. ADT brings expanded opportunities for these companies as well with our national footprint. Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver. These integrators help to deliver on that. In the past, the regional players may have had to rely on sub-contractors to service their larger clients. With ADT, we can now support those clients with our own in-house technicians which helps to ensure a consistent security program across multiple locations.Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver" Q: Are additional integrator acquisitions planned this year and into 2019? How much is enough and when will it end (or slow down significantly)? BenVau: We expect to close on our latest acquisition, Red Hawk, before the end of 2018. Red Hawk brings a national footprint focused on fire/life safety and security to ADT. While ADT already had a robust security offering, Red Hawk will contribute significantly to the fire side of the business. In addition, we will continue to evaluate the companies in the industry to determine if additional acquisitions make sense. Q: Do you expect greater consolidation of the integrator channel in the industry as a whole? Why is this a good time for consolidation? Is it a good M&A market for buyers like ADT? BenVau: We will continue to evaluate companies in the industry to determine if further acquisitions make sense. As for the industry, we can only speak for ourselves. Q: What other trend(s) do you see in the industry that will impact ADT (on the commercial side) in the next year or so, and how?Our focus is on investing in our field organization, in particular our service technicians, engineers and project management teams" BenVau: Networking is a big one. As we continue to drive integration of devices and services, from AI, “the cloud,” machine learning and even analytics, there will be more focus on the network they ride on. A deeper knowledge of network design, bandwidth impact, and system integration will be critical. As part of our acquisition strategy, we focused on talent to add to the team and have been able to add to our bench strength in this area. Q: Any other comments/insights you wish to share about ADT’s strategy, future, and role in the larger physical security marketplace? BenVau: Our focus is on investing in our field organization, in particular our service technicians, engineers and project management teams. The cornerstone of our success lies in our ability to deliver outstanding customer support and service. It starts with sales and the ability to deliver security and life safety technologies, but it ends with a delighted customer who partners with us to help secure the things that matter most to them. Our recent acquisitions have more than doubled our commercial field operations teams and are key to establishing the ADT Commercial brand as a leading full-service provider of enterprise solutions to the marketplace.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced Visitor Experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognized a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimeter wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding Perimeter Protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centers, sports centers, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat Mitigation With Soft Target Approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labor reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving Security Posture At Event Venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
A USB drive from Heathrow Airport, found on a London street in late October, contained confidential information about accessing restricted areas at the airport and security measures used to protect the Queen. The drive also contained a timetable for anti-terrorism patrols at the airport and documentation of the ultrasound system used by Heathrow security to check perimeter fences and runways for breaches. The data was not encrypted, and the London resident who found it turned it over to a newspaper reporter. How Cybersecurity Impacts Physical Security The incident highlights a number of issues for security professionals. One is the interrelated nature of cybersecurity and physical security, and how a failure of one can directly impact the other. Another is extending cybersecurity outside the firewall, considering the inherent risks of USB drives and the need to manage “endpoint security,” such as restricting access to a system’s USB ports. An important security failure in the case of the Heathrow incident was lack of encryption of the USB drive, says Ruben Lugo, Strategic Product Marketing Manager at Kingston Technology, which provides a line of USB drives with hardware-based encryption. “If you block out all the USB ports, it can restrict productivity, and employees are not as efficient as they should be,” says Lugo. He says companies should be using more encrypted USB drives to combine the productivity advantages of allowing USB access while protecting the information on the drives. Data Protection Regulations Protection of data – whether inside the firewall or outside – is increasingly important in an age of greater cybersecurity regulation. The European Union's General Data Protection Regulation (GDPR) creates new safeguards and requirements for protecting personal data, with a compliance deadline of May 25, 2018, after which noncompliance can result in expensive fines. A disgruntled employee used a USB drive to steal banking information for 30,000 people, as published by Tom Brant in: “Report: FDIC Employees Caused Repeated Security Breaches,” PC Magazine, July 15, 2016 Regulations also include New York State's 23NYCR500 cybersecurity requirements that financial services companies protect customer information and related IT systems. The New York regulation requires each company to assess its specific risk profile and design a program to address its risks, ensuring the safety and soundness of the institution and protecting customers. Hardware-based Encryption Providing a cybersecurity tool, Kingston highlighted its hardware-based encrypted USB drives at the recent ASIS show in Dallas. A USB drive with hardware-based encryption is self-contained and doesn’t require a software element on the host computer. No software vulnerability eliminates the possibility of brute-force, sniffing and memory hash attacks. Digitally signed firmware cannot be altered, and there is a physical layer of protection, too. The drives come in epoxy-dipped/filled cases that prevent access to the physical memory. In contrast, a USB drive with software encryption uses software that runs on the host computer and is vulnerable to attacks. The use of AES 256-bit encryption in XTS mode ensures that anyone who finds a USB drive, such as the man in London, cannot access the information. The drive wipes itself clean after 10 attempts of guessing the password. “Encrypted drives are not complicated,” says Lugo. “They are a simple solution that anyone can implement.” Kingston’s encrypted USB drives are priced between $40 and $600, depending on the capacity and covering needs ranging from a small business owner to military- and government-grade products. Kingston also provides products for use inside the firewall, including business and enterprise solid state drives (SSDs), offering high density and extreme performance, and their server premier DRAM memory products providing performance and flexibility. To learn more about Kingston, please visit www.kingston.com
A video surveillance system installed by Daemon Fire & Security, based on an AMG Systems-supplied Ethernet switch network, is helping to protect the UK’s first new inland rail freight hub for over a decade: iPort Rail. The iPort project near Doncaster, South Yorkshire, offers 6 million square feet of space across 337 acres. The massive park is already home to enormous distribution facilities for companies like Amazon, CEVA, Fellowes and Lidl, and its occupancy is set to expand in the coming years. The newly developed iPort Rail terminal, located on its own 30-acre site within iPort, is connected to the electrified East Coast Main Line via the South Yorkshire Joint Line. It offers integrated access to iPort, meaning occupiers can directly approach the rail terminal using their own specialist vehicles on the facility’s private roads. Implementing Video Surveillance System The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System"The terminal can handle up to six trains a day, operating 24-hours, six days a week. Each train can be the maximum UK length of 775m. iPort Rail has an 800m reception siding and two 400m handling sidings, with storage capacity for 1,500 shipping containers. With iPort Rail playing such a crucial role in developer Verdion’s iPort transportation strategy, there was a pressing need to ensure that the terminal has effective ongoing video monitoring. Buckingham Group Contracting Ltd was responsible for the work on iPort Rail, and they worked with CCTV specialist Daemon Fire & Security to implement the video surveillance system for the perimeter of the terminal. Chris Tattersall, Technical Director at Daemon, said the system runs on a redundant fiber optic network. “AMG Systems assisted us with the fiber optic network design.” Tattersall said. “The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System. The cameras are on towers from Altron, and the networking is from AMG.” Cameras For Intrusion Detection The cameras utilize Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through"There are 32 cameras mounted on 18 towers around the rail terminal site perimeter. Tattersall explained that the cameras are primarily used as detectors to monitor for trespass or intrusion. “The cameras utilize Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through,” he said. “The cameras are monitored live by the 24-hour security team in the site gatehouse. The system is networked using equipment and expertise from AMG Systems. Daemon and AMG designed a failsafe fiber optic ring system together,” Tattersall said. “From the gatehouse there’s a fiber optic cable which goes and loops around every camera tower and goes back to the gatehouse,” he said. “It’s a redundant ring, so if they get a fault or deliberate cut, everything will carry on working. We’re using industrial PoE Ethernet switches in the towers so they can withstand low temperatures, which is particularly important during cold winters in a relatively open site like this.” Operative In Extreme Temperatures The industrial managed switches are able to operate in temperatures ranging from -40 deg C to 75 deg CThe industrial managed switches, 20 of which were used in this project, are able to operate in temperatures ranging from -40 deg C to 75 deg C and are designed for medium to large network environments to strengthen network connections. AMG Business Development Director Sara Fisher said AMG was thrilled to be involved in this project. “We were delighted to be asked by Daemon to contribute our design and product expertise to help protect this important and growing freight hub,” she said. Daemon’s video surveillance project took around 10 weeks in total, including implementation and commissioning. It was handed over on time and installed on target. Tattersall said the smooth running of the project could be put down to Daemon’s good working relationship with contractor Buckingham, distributor Pro-Vision, networking and transmission expert AMG Systems, and product suppliers Bosch and Altron.
Amthal has created a scalable program of works to upgrade security at St Albans School and ensure staff and pupils can inspire learning and develop values and skills to the highest standards, in a secure environment. With former students including the renowned Professor Stephen Hawking, St Albans School, ‘the first school in Hertfordshire’ has a rich history as a celebrated independent boys’ school and co-educational Sixth Form. With an architectural mixture of buildings dating back from the Roman-era cellar, to modern extensions built in the 1990s, alongside a well-equipped field study center and sports facilities, the grounds-care team was keen to ensure security was kept up-to-date. Co-Curricular Facilities Amthal was able to present an all-encompassing solution right from the perimeter systems through to CCTV and internal access control" Gary Douglas, Estates Manager at St Albans School commented: “As a school catering for over 860 pupils, it is our priority to deliver a robust level of security for everyone who works and learns here. In addition, the historical significance of the School is something we are immensely proud of and we are committed to ensuring the buildings and facilities are cared for at every level.” “With a view to upgrading our security to enable smarter solutions, Amthal was able to present an all-encompassing solution right from the perimeter systems through to CCTV and internal access control. These enhancements were carefully planned into a program of works that is scaleable to work around learning timetables and the continued projects designed to further our excellent academic and co-curricular facilities.” Right Security Systems Amthal worked closely with the team at St Albans School right from the initial design process, acting in a project management capacity to ensure the right security systems were selected to suit the school. Not only did this require solutions that offered the smartest capability for the perimeter systems, where Avigilon CCTV was installed, but also working within school buildings and including Paxton Access Control that could be installed seamlessly, all without compromising on the historical ambience of the architecture throughout the site. Today, St Albans School is one of the leading day schools in the country, a centre of educational excellence" Paul Rosenthal, Sales Director at Amthal added: “There has been a school on the Abbey Gateway site for more than 1,000 years. Today, St Albans School is one of the leading day schools in the country, a centre of educational excellence, occupying a campus that has been transformed and continues to grow.” Expandable Solution “It is an absolute privilege as a local company to be on board to support the Estates Team to secure the School. We were very careful in our planning and design stages to structure a full team approach with leading suppliers, and present an expandable solution with the capacity to integrate with the requirements of this very impressive multi-dimensional educational institution.” Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire & security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.)
A two-year program to transform security at Heriot-Watt University campuses around the world, facilitated by CriticalArc’s SafeZone technology, has been recognized with one of the UK’s top security industry awards. The innovative partnership between Heriot-Watt and CriticalArc has been named as ‘Security Project of the Year’ in the 2018 Security & Fire Excellence Awards run in association with IFSEC International and Firex International. The award, sponsored by the British Security Industry Association, is highly competitive and a major accolade for the winners. Improving Service Response Two years ago, Les Allan, Heriot-Watt’s Director of Safety and Security Services and his team at the university embarked on a strategy to transform all aspects of their operations. They wanted to modernize their service across five campuses, in the UK, Dubai, and Malaysia to provide much greater care for students and staff. A key factor in the team’s success has been the way it uses CriticalArc’s SafeZone technology across all five international campuses It was an ambitious undertaking, but it has already delivered impressive results, measurably improving service response times by over fifty percent, upgrading security department capabilities and skills and raising the job status and remuneration for officers involved. A key factor in the team’s success has been the way it uses CriticalArc’s SafeZone technology across all five international campuses, making Heriot-Watt the first university department to take this global approach. Real-Time Incident Management SafeZone technology has transformed the way officers interact with students and staff wherever they are - on campus or and when traveling off-site – so they can provide assistance in case of emergencies or other incidents. Les Allan’s team has already responded to serious medical emergencies using the system and now they have the tools to manage a full range of live-incident risks. “SafeZone lets my team communicate quickly with individuals and groups,” explains Les Allan, Heriot-Watt, Director of Safety and Security Services. “Using it they can receive alerts and pinpoint the location of anyone needing assistance. They can deploy officers more quickly and keep track of ongoing situations as they develop. It’s really letting them do things they couldn’t have dreamed of before.” Better Support For Students & Staff The Heriot-Watt team is also using new technology to support staff and students on campus while traveling and during fieldwork. They can ‘geo-fence’ additional areas as required. Between 1 August 2017 and 31 July 2018, a total of 5398 security incidents were attended at the Edinburgh Campus The result has been a significant improvement in engagement between the security department – now restyled as Safeguarding Services – students and staff. Between 1 August 2017 and 31 July 2018, a total of 5398 security incidents were attended at the Edinburgh Campus (the first to adopt SafeZone); 3542 of these incidents (66%) involved assisting or interacting with students (rising from 33% in 2013). Efficient, Responsive And Capable Services The results have been impressive but Les Allan, who is currently also serving as Chair of the Association of University Chief Security Officers (AUCSO) in Scotland, says his ambition is to go much further. “We are delighted at our incredible success at the Security and Fire Excellence Awards as winners of the Security Project of the Year category. This joint award for Heriot-Watt University and our friends at CritcalArc is a testimony to the power of working in partnership for mutual benefit and delivery of excellence with a world-leading solution. We are committed to continuing development and enhancement of our partnership with CriticalArc.” Darren Chalmers-Stevens, CriticalArc, Managing Director, EMEA and APAC, noted: “I’m delighted that the forward-looking partnership between Heriot-Watt University and CriticalArc has been so clearly successful. This major award is further proof of how we work closely with all our customers and are leading the way in providing better protection and enabling more efficient, responsive and capable services.”
Students of all ages in state schools are entitled to a safe learning environment. If students don't feel safe, they are not able to stay focused during classroom lessons and activities. That’s why Narre Warren South. P-12 College has upgraded its security with the installation of a sophisticated SALTO access control and ID pass system. Located south east of Melbourne, Australia, Narre Warren South P-12 College is a unique school on one campus with two sub schools, Primary, (Prep to Year 6) and Secondary, (Years 7 to 12). It follows the P-12 Curriculum which is designed to provide diversity and pathway opportunities, ensuring students maximize opportunities that exist after school and ensure people achieve their learning goals in a fun and supportive learning environment. Mechanical Key System The College previously used a mechanical key system for its security needs Home to over 2000 students and 200 staff, cultural diversity is a feature of the College with at least 50 ethnic groups being represented speaking 68 languages. A third of the College’s student population come from families where the language background is other than English. The College previously used a mechanical key system for its security needs; however this was increasingly complicated to manage as keys multiplied, and it was difficult to guard against key duplication and copying. Another negative was the cost of re-keying and replacing locks to maintain security if keys were lost or not handed back. Security Arrangements The College also had a number of challenges when it came to managing and limiting traffic flow through the staff car parks, both inside and outside school hours. To alleviate such problems, the College decided to look into upgrading its security arrangements and called in local security specialists Eclipse Security Systems. Director Greg Flood takes up the story. “We met with Brett Dyer, (the College’s Property and Maintenance Manager), and explained how SALTO solutions are in use around the world in educational environments including universities, university housing, schools, research institutes, academies, kindergartens and more where they provide security, access control and campus management.” Cost-Effective Package Brett liked the fact that SALTO could offer a solution that was education proven" “Replacing keys with smart access control would give the school much more control over its security. For instance installing smart online wireless locks on main entrance doors would enable the school to incorporate these doors into its lock down procedure. At busy student drop off and pick up times in the morning and afternoon, the school gates could be automated to improve traffic flow and ease congestion.” “And since Narre Warren South P-12 like almost all state schools hire out their sports, meeting facilities etc to third party groups outside of school hours, the new access control solution would make it much easier to manage access for such short term visitors. Brett liked the fact that SALTO could offer a solution that was education proven and offered a secure, flexible way to have all the above benefits and more in a versatile, cost-effective package that was future proof and gave a great return on the schools investment dollars.” Scheduled Automatic Locking Most external doors have a mix of offline and online SALTO XS4 escutcheons" “The removal of the old system and the upgrade to smart locks was smooth and straightforward, and we’ve now retro-fitted in excess of 100 doors and automated a number of perimeter gates. Most external doors, plus the addition of a number of internal office doors across all the blocks, have a mix of offline and online SALTO XS4 escutcheons, as well as control units and wall readers.” “The most important thing for us is to ensure that we are doing everything we can to safeguard our children. Our new access control system furthers this goal” says Brett Dyer. “We went with Greg’s recommendation of SALTO for its functionality and value for money. We particularly like how easy it is to use and program, especially the issue and management of contactless smartcards for external user groups." "The scheduled automatic locking and unlocking of external doors and gates is a huge time saver, and so far we’re pleased with the product and the capabilities it now gives us.”
Senstar, a global provider of video management and perimeter intrusion detection solutions, announces that its Symphony video management software and Face Recognition video analytic are helping to protect Cosmo Music. Working with integrator Northern Alarm Protection (NAP) Ltd., Richmond Hill, Ontario, Canada-based Cosmo Music selected Senstar after comprehensive research and testing to replace its 20-year-old analog video system. “Senstar Symphony delivers an all-in-one solution for video management, video analytics, perimeter intrusion detection system integration, and alarm management for deployments of all sizes,” said Justin Shorn, Senstar’s Vice-President of Product Management. “We are glad that Symphony’s core features and ease-of-use, along with our Face Recognition analytic, were able to meet Cosmo Music’s needs.” Flag Suspicious Customers Senstar’s Face Recognition analytic adds an additional layer of security to any video surveillance deployment and is a powerful tool for retail loss prevention. At Cosmo Music, the analytic is used to identify and flag suspicious customers and provide real-time alerts if a flagged individual enters the store, with the goal to prevent theft. “(During testing) one of our staff had a full beard one day and it was shaved off the next day and the system still picked him up,” said Rudi Brouwers, Vice-President and COO of Cosmo Music. “That’s what sold me on it.”
Nestled on the banks of the river Thames, Kew Gardens in southwest London is home to the most diverse collection of living plants anywhere in the world. At 330 acres in size, it’s London’s largest UNESCO world heritage site, and has a history stretching back more than 250 years. The Royal Botanical Gardens, Kew, attracts more than 1.6 million visitors every year, coming to see the 30,000 different kinds of plants, and to visit the Herbarium, which has over seven million preserved plant specimens. As an internationally important botanical research and educational institution, Kew’s library contains more than three quarters of a million books, along with more than 175,000 prints and drawings of plant life. 24/7 Video Surveillance Coverage A need was identified to upgrade the existing legacy analog CCTV system to one capable of transmitting and recording in true HD Kew Gardens hosts a wide variety of events throughout the year, including festivals, concerts and art exhibitions, as well as learning experiences for all ages and interests, in addition to the garden attractions. The site is accessible via London Underground, Overground, buses and river services in summer, and the public can enter via four separate gates: the Elizabeth Gate, the Brentford Gate, Victoria Gate and the Lion Gate. There are also a number of other access gates to the gardens which are not open to the public. Because of the sheer volume of visitors and the multitude of public and trade entrances to Kew Gardens, the site requires around the clock video surveillance coverage, seven days a week. Analog To IP CCTV System Kew’s CCTV control room operations team works to monitor the safety and security of the park, but a need was identified to upgrade the existing legacy analog CCTV system to one capable of transmitting and recording in true High Definition. Security specialist firm The ITS Group was called in to help. The ITS Group is comprised of ITS Fire and Security, ITS Electrical, ITS Fire Training and ITS Building Services. The company has 20 years of experience within the fire and security industry, and provides CCTV, intruder alarms, barrier gates, security lighting, panic alarms, access control, and door and video entry, alongside a swathe of other services. The results were achieved in the process of implementing a Hikvision IP HD video surveillance system ITS Group Director Tim Dyer said the Kew project required upgrading equipment in the Gardens’ security control room and providing site-wide cameras which can be used to view all entrances for both public and trade, as well as various strategic locations throughout the Gardens. Challenges In Installing Surveillance System The massive 330-acre site is a huge area to monitor in itself, and Tim Dyer says the very public nature of the Gardens and its operations meant the actual video system installation posed some security continuity challenges. “Because the control room needed to be in operation 24/7, close co-ordination was required between ITS and the security team on-site,” he says. “We needed to maintain the CCTV in line with the changing site requirements on a daily basis. This, coupled with access issues and working in a public environment, was very challenging, and the fact that we were able to achieve such good results is testament to the close co-ordination between the site team and Kew security.” Those results were achieved in the process of implementing a Hikvision IP High Definition video surveillance system, which included new 43-inch and 22-inch HD monitors for the control room, along with new touchscreen network keyboards and joysticks. HD Images In Low Light When there’s no light at all, the Darkfighter cameras switch to IR mode and record black and white images at 0 LuxControl room operators monitor images from a number of different Hikvision cameras. These include an initial 48 DarkfighterX network speed domes, which provide color HD images in light levels as low as 0.001 Lux. That’s pretty dark. And when it gets darker still, they provide black and white images in light levels down to 0.0001 Lux. When there’s no light at all, the Darkfighter cameras switch to IR mode and record black and white images at 0 Lux. In addition, they offer 25x zoom capabilities and Deep Learning-powered target classification for automatic tracking and perimeter protection. They’re complemented by 29 Darkfighter 2 megapixel motorized varifocal lens cameras, 21 ultra-low light smart bullet cameras, and six low light smart cameras. Images are recorded to Hikvision 16-channel Turbo HD digital video recorders which support analog, HD-TVI, and IP cameras, H.264, H.264+ and dual-stream compression, and can output at up to 4K resolution. Improved Picture Quality The Gardens now have a full HD system which can be expanded with additional cameras in the future"The resulting system is not only powerful and effective in the short-term but is purposefully planned to incorporate forthcoming changes. “The Gardens now have a full HD system which can be expanded with additional cameras in the future,” Tim Dyer says. “It allows them to take advantage of technology advances and newly developed functionality on any cameras or devices they add to the system in future.” Tim Dyer says the Hikvision system has revolutionised Kew’s video picture quality and functionality. “Making the change from an old analog system to installing a new Hikvision IP system has transformed the Gardens’ picture quality, both during the day and at night,” he says. “The zoom facility is amazing and precise, and the reliability of them is second to none, making the work of the control room operatives a much easier role.” The HD surveillance system has been received exceptionally well by those whose opinion matters most: the security team at Kew Gardens. John Deer, Head of Security, said: “I am delighted with the installation of Hikvision cameras at the Royal Botanic Gardens, Kew. They are of the highest quality, which has enhanced the overall security across the 330-acre site.”