Perimeter security
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials...
LenelS2 has announced the release of the OnGuard security management system version 8.0, empowering security teams with enhanced situational awareness through unified views of the security environment, as well as powerful visualization for data-based insights. OnGuard Version 8.0 OnGuard Version 8.0 provides major updates including integration with the Magic Monitor unified client, rich interactive maps, a new modern reporting engine, cyber security enhancements and more. The OnGuard security...
Researchers at internationally renowned cyber-security vendor, Check Point have reported a surge in cyber-attacks targeting healthcare organizations across the globe. Since the beginning of November 2020, researchers have documented a 45% increase in cyber-attacks targeting healthcare organizations worldwide, placing the healthcare sector at the top of the hit list for cyber criminals, when compared to all other industries. Surge in cyber-attacks on the healthcare sector The surge in cyber-at...
Facemasks are a critical tool for fighting the spread of COVID-19 virus and are proven to be most effective when face coverings are worn universally. As stores and businesses reopen, ensuring all occupants wear a facemask is essential. However, the additional resources required to monitor patrons can further strain businesses already struggling to meet other sanitation and social distancing guidelines. Deep Learning solutions are capable of automatically detecting anyone in violation of facemas...
Security breaches of borders, utility plants and airports can have catastrophic and devastating consequences, so protecting assets is vital. The global perimeter security market is expected to reach USD29.6 billion by 2025, driven by growing terrorist threats, increased awareness of illegal immigration, planned crimes, thefts and smuggling. Continuous monitoring system Existing perimeter intrusion detection technologies typically rely on point sensors such as cameras that are positioned along...
Following the release of FLIR United Video Management System 9.0 (United VMS) in August 2020, FLIR announced the global availability of United VMS 9.0.1 with new advanced features. The latest platform update offers further streamlined access to system status and alarms around the clock for security teams to react to threat activities faster while enjoying improved reporting and cybersecurity functionality. Included advancements The advancements include updates to the FLIR Latitude VMS Softwar...
News
Heald Ltd, the UK’s renowned designer and manufacturer of hostile vehicle mitigation security products, has announced a partnership with German security firm truckBloc GmbH. The partnership will see truckBloc hold exclusivity in Germany to supply a range of Heald’s patent-protected security bollards including shallow and surface mount bollard solution, the Matador and the recently launched ultra shallow mount Bridge Bollard. The first shipment of fixed Matador’s arrived in Germany early December, with further projects due to commence in 2021, which will see Heald’s fixed and sliding Matador’s and Bridge Bollard products installed at several high profile locations across the country. Perimeter protection products For temporary applications, both units can be connected together to create an accessible mobile defense line Based in Fürth, truckBloc, which also sells products of the same name, specializes primarily in the perimeter security of events, especially in inner-city areas, with their mobile surface mount perimeter protection products which are crash tested to IWA-14 and PAS 68 standards. By joining forces, Heald and truckBloc will be able to provide a one-stop solution for hostile vehicle mitigation solutions for both permanent and temporary requirements across the country, which has witnessed several vehicle attacks during 2020. Even with the current pandemic, Germany has seen terrorist-related attacks at the Volkmarsen Carnival which injured 60 and on a Berlin highway which injured six. Seamless security solution More recently five people lost their lives, and fifteen were wounded following an incident in a pedestrian area in the south-west city of Trier. Together products from both firms can provide effective perimeter protection while allowing access to permitted vehicles such as emergency service and delivery vehicles with the install of the Matador sliding bollard. For temporary applications, both units can be connected together to create an accessible mobile defense line. Whereas for areas which do not require access, both Heald’s fixed Matadors, the truckBloc and other Heald products can be integrated to provide a seamless security solution. Integrity of the company We look forward to an exciting partnership with truckBloc and seeing our products installed across the country" Commenting on the partnership, Michael Dahinten, Head of Business Development at truckBloc GmbH, said “The partnership between Heald and truckBloc is the coming together of two outstanding companies innovating in the field of perimeter protection. With shared values and a passion for helping to make the world a better place partnering with Heald felt like the natural fit, and we look forward to a positive outcome for all.” Heald owner and Managing Director, Debbie Heald MBE added, “Having visited Germany earlier this year and witnessed the quality of the truckBloc product and integrity of the company we knew that by combining our expertise we could provide an unrivalled perimeter security offering to Germany. We look forward to an exciting partnership with truckBloc and seeing our products installed across the country.” The announcement comes following the ongoing international expansion of Heald, which sees up to 80% of their products exported overseas to countries including USA, Singapore, Australia, Norway and other locations.
LenelS2 has announced a global distribution agreement to resell Invixium’s contactless biometric solutions through the LenelS2 OnGuard and NetBox value-added reseller (VAR) channels. The agreement also includes a new interface with the OnGuard and NetBox systems to enhance access control and proactive screening to help protect people and optimize building health and efficiency. The solutions are offered as part of Carrier’s Healthy Buildings Program, an expanded suite of advanced solutions to help deliver healthier, safer, more efficient and productive indoor environments. LenelS2, an internationally renowned company in advanced security systems and services, is a part of Carrier Corporation, a global provider of healthy, safe and sustainable building and cold chain solutions. IXM TITAN solution with Enhancement Kit LenelS2 will now offer the IXM TITAN solution with Enhancement Kit: an intelligent dual-camera biometric solution LenelS2 will now offer the IXM TITAN solution with Enhancement Kit: an intelligent dual-camera biometric solution that performs contactless facial recognition authentication with no mask removal required, and mask detection and elevated body temperature detection measured at the tear duct. The Invixium TITAN solution offers an API interface with the NetBox access control system and an interface with the OnGuard security management system through a certification in the LenelS2 OpenAccess Alliance Program (OAAP). Flexible configuration of workflows The interface enables flexible configuration of workflows utilizing any permutation combination of card, biometric fingerprint, facial recognition, temperature screening and mask detection access parameters. “The collaboration with Invixium provides our users with a versatile access control and proactive screening solution that can help them navigate today’s complex safety and security requirements,” said Jeff Stanek, President, LenelS2, adding “The advanced biometrics and built-in mask detection add new functionality to our Healthy Buildings portfolio.” TITAN solution and LenelS2 access integration “The powerful interface between the TITAN solution and LenelS2 access control systems provides very relevant biometric solutions that meet the world’s most pressing demands,” said Shiraz Kapadia, the Chief Executive Officer (CEO) and President of Invixium. Shiraz adds, “Our health-focused portfolio combines temperature screening with mask detection for contactless access control and workforce management in one elegant device, allowing businesses in key industries to easily create healthy business environments.” Touchless biometric security and access control TITAN solution delivers touchless biometric security through face recognition via a 21-megapixel camera The TITAN solution delivers touchless biometric security through face recognition via a 21-megapixel camera and adding the Enhancement Kit transforms the TITAN solution into a health kiosk capable of measuring temperature for biometric access control. Not only can the TITAN solution authenticate 12 to 18 users’ faces in one minute with high accuracy, but it can also screen each of those users’ temperatures at the tear duct in the same amount of time. Bolstering entrance controls The TITAN solution features an easy, one-piece installation and installs just like a traditional reader. In addition to its touchless access and proactive screening capabilities, the TITAN solution can be easily used to bolster entrance controls. These readers, purchased through LenelS2, do not require any additional licensing fees. TITAN readers and Enhancement Kits must be purchased individually or as part of a kit from LenelS2.
GJD, an award-winning manufacturer and designer of smart electronic perimeter detection and high-performance LED illumination equipment, announces the launch of its D-TECT 50 AM, an external motion detector with a 50m detection range and Anti-Mask technology. The D-TECT 50 AM is a long-range high-performance BS8418 compliant external movement detector; which can be used for intruder monitoring, CCTV surveillance and other alarm warning requirements. The detector’s dual PIR anti-mask sensing module is equipped with one N/O and one N/C alarm volt-free contact and one N/C masking volt free contact. It provides a programmable beam range from 25m to 50m, avoiding boundary overspill and offering truly exceptional resistance to false alarms. Security lighting systems Unique features of the D-TECT 50 AM include: Active infra-red sensor system to detect mask tampering Adjustable 180º pan and 45º tilt Programmable range up to 50m Covert sensor module Conduit adaptor available IP65 rated alloy zinc metal housing GJD, headquartered in Heywood, Greater Manchester provides renowned and innovative presence detection and security lighting systems. GJD’s detectors and illuminators are a perfect fit for sites of all sizes and from low to high-end security requirements.
Bosch Security Systems has released version 4.8 of its Building Integration System (BIS) which offers safe, touchless access control solutions to curb the spread of viruses like Covid-19. Secure access control solution BIS 4.8 supports biometric and mobile device authentication and provides building managers enhanced integration of fire panels and intrusion panels to ensure the security of buildings. The global COVID-19 pandemic has caused building operators to rethink their access control solutions In light of the global COVID-19 (coronavirus) pandemic, building operators need to rethink their access control solutions. Instead of systems that require physical touch and thereby increase the risk of virus transmission, contactless solutions that still meet the highest security guidelines are preferable. BIS 4.8, Building Integration System In response to these requirements, BIS 4.8 expands on the trusted features and benefits of version 4.7 to now work with three different touchless solutions that safeguard personal health: Face recognition - BIS 4.8 has been redesigned to work with the face recognition solution from Idemia. The face recognition device obtains a biometric scan from a safe distance and matches facial features with credentials in an encrypted database. Doors and gates open via the BIS Access Engine and the Bosch Access Modular Controller (AMC2). Touchless fingerprint readers - Integrated with Idemia’s Morphowave reader, BIS 4.8 controls access via a touchless fingerprint scan. A simple wave of the hand in front of the touchless sensor triggers a 3D scan of four fingers. Access rights are confirmed within less than one second by the system's fingerprint database for a clean and highly secure solution. Access via mobile phones - In conjunction with the mobile access control solutions from STid and HID, BIS 4.8 allows users to use their mobile phone instead of a card for access at the secure reader. For STid’s Mobile ID, the method requires a STid reader, while a Bosch Lectus secure reader works with HID’s Mobile Access solution. Users only need to install an app to verify access rights and use the safe, wireless technology. Aside from facilitating contactless access, all three solutions are also intuitive, quick and convenient compared to keycards and similar methods as there is no need to carry an access card or remember a password in order to gain entry to a building or area. Seamless fire and intrusion panel integration Combining BIS 4.8 with Bosch B and G Series intrusion panels unlock a new level of convenience Combining BIS 4.8 with Bosch B and G Series intrusion panels or MAP 5000 panels unlocks a new level of convenience. Users require only one authorization badge to control two systems. Disarming areas of the intrusion system and granting access can be realized with the same badge on the same reader, without entering a PIN code for easy, one-step authorization. Improved flexibility and efficiency With the introduction of version 4.8, BIS continues to unify the management of multiple security and safety domains and maximize flexibility for key customer requirements. New features include: Integration of the latest Bosch Avenar 2000 and 8000 fire panels and peripherals, along with command and control via BIS, with devices and status shown on maps, and events managed more intuitively via an alarm list. User authorization for Bosch B and G Series intrusion panels are managed directly within BIS for up to 2,000 users on as many as 25 intrusion panels, instead of handling authorizations separately on each of the 25 panels. Central overview of all existing access and B and G Series intrusion authorisations for the complete installation within one system. With these updates, BIS 4.8 helps operators meet the health and safety demands of the new reality without compromising on functionality and security. As a centralized platform for operational building management, the new version of BIS offers greater convenience, flexibility, and efficiency.
Security personnel must be able to quickly detect unauthorized vehicles and individuals at critical infrastructure sites. Without intrusion detection, entities like electrical substations can be subject to physical attacks. 88 percent of substations experience at least one break-in every year and 10 percent see more than 20 intrusions in the same time frame, according to CIGRE, a global electricity industry organization. To safeguard remote substations from external threats, electric utilities are relying on durable thermal cameras for superior monitoring and protection. Remote substation security The failure of a key substation caused by a security breach would have a debilitating effect on homeowners, businesses, and mission-critical infrastructure. While physical security is a top priority for utilities, designing, installing, and operating a perimeter system requires skill. Remote location, limited network connectivity, minimal lighting, internal security audits, and compliance with North American Electric Reliability Corporation are some of the challenges that both substation security directors and system integrators face. Perimeter Intrusion Detection System (PIDS) Since its arrival on the mainstream security scene a few decades ago, thermal security cameras have quickly become the optimal solution for remote substation perimeter security, due to their ability to monitor perimeters day and night in adverse weather conditions as well as in harsh environments.Thermal cameras measure the minute differences in heat signatures emitted by objects and people to produce high-contrast images and reliable intrusion detection. They enable security personnel to detect an intruder before they ever reach the perimeter for early intervention. Sensor quality FLIR's perimeter cameras offer the widest selection of lenses and detection ranges, adaptable to both large and small deployments As the industry front-runner in advanced thermal technology, FLIR provides the best sensor quality available. FLIR’s total security solution featuring a diverse suite of perimeter cameras offers the widest selection of lenses and detection ranges, adaptable to both large and small deployments. FLIR’s track record of success is just one of the reasons why utilities choose FLIR cameras time and again. Design recommendations When deploying thermal cameras at substations, there are several factors to consider to optimise performance. Here are some tips from the FLIR experts.Identify What One Needs to Protect: Assess the substation’s unique needs, define one's threats, and determine which area one needs to monitor. For rural or small substations miles away from the nearest city, position one's cameras so one has a solid view of the outside perimeter. If anyone approaches, one wants to have ample warning. For substations in urban areas that are next to public lands and walkways, it may not be cost-effective to look out as pedestrians can easily generate nuisance alerts. In these scenarios, thermal cameras that survey the interior of the substation may be the better option. Make the Most of Existing Infrastructure: Thermal cameras must be mounted at a minimum of 12-15 feet above the ground. However, some substation fences are only 6-8 feet tall. In this case, consider mounting cameras on telephone poles or tower structures. Utilizing these existing structures instead of digging new trenches can save one both time and money. Select the Right Camera for your Application: For small substations that are less than an acre, deploying a couple of FLIR Elara™ FC-Series ID cameras, which feature onboard analytics, along the fence line will often do the trick. For short to mid-range needs, the FLIR Elara FB-Series is a great, economical option. Install a visible camera or a camera that provides both thermal and optical imagers, like FLIR Saros™ DH-390 Dome at the gate, to monitor general traffic. For larger substations (around two acres) that are high-value sites, consider deploying a mix of FLIR FC-Series ID cameras with the FLIR Saros™ DM-Series to cover the fence line. Additionally, mount a pan-tilt camera with both visible and thermal streams, such as the FLIR Elara™ DX-Series or FLIR Triton™ PT-Series, to look around the perimeter for superior monitoring and threat assessment. Choose the accurate software As a final consideration, choose the right software to streamline management, operations, and functionality. For large applications where customers need to manage surveillance, access control, radar, and other disparate systems on one platform, consider command and control software. For enterprise-level surveillance operations, a video management system is optimal and for small applications using just a few cameras, a network video recorder is sufficient. Regardless of the size of the project, partner with an expert team that can help assess, design, installs, and program the right system for one's application.
A feeling of security is a universal human need. And beyond physical, bodily security, people need to know that their environment, investments, and belongings are safe as well. Security systems are installed in homes and businesses every day to create that sense of security. Compared to conventional sensor-based alarm systems, a surveillance system that utilizes cameras has several advantages: The ability to watch events in real-time, Obtaining key data around those events, and Providing solid and accurate evidence for law enforcement. AcuSense technology Hikvision AcuSense technology distinguishes people and vehicles from other moving objects Empowered by deep learning algorithms, Hikvision AcuSense technology distinguishes people and vehicles from other moving objects. AcuSense is the perfect choice for an accessible and intelligent security system. AcuSense technology helps to focus on human and vehicle events in two ways: The device will only trigger an alarm when the preset intrusion type (human or vehicle) takes place, and Videos related to alarm events are sorted into human and vehicle categories for easier footage searches. With AcuSense Technology, users get some powerful functions, such as: Accurate alarm for humans and vehicles - Focus on alarms triggered by humans and vehicles while false alarms triggered by animals or irrelevant objects are vastly reduced. Visual and auditory warning - On-site response and deterrence methods using visual and customizable auditory warnings add another layer of protection. Search targets quickly by type - Video clips sorted by human and vehicle categories, and object classification improves search efficiency. Searching video clips gets easier Video clips are already sorted into the ‘Human Files’ and ‘Vehicle Files’. Users just need to click one of these categories and use time or location data to quickly locate the clip that they want. Compared to the conventional method that displays all video files at once, AcuSense technology enables carrying out searching much more easily. Ideal applications Residential – Intrusion detection and deterrence for home security Whether choosing to keep an eye on the house or hiring a professional service provider to look after security of the home, there are two functions that users will surely want to have: Prompt notification via smartphone Users will get a notification on the app or via SMS, when the alarm is triggered. Irrespective of who takes care of looking after intrusion events, it’s always good to have first-hand information. Users will get a notification on the app or via SMS, when the alarm is triggered. Then, they can check out the live video from their smartphone. Light and Sound Intruder Deterrence Knowing what the suspect looks like is important, especially for providing evidence to police. However, property losses have already occurred at that time. It would be even better if there were means that can provide on-site deterrence and prevent any loss at all. Network Cameras with AcuSense technology Network Cameras with AcuSense technology, white light and audio alarm can be set to react to intrusion events with a flashing light and customizable siren, alerting any would-be intruder that they are being monitored and have already been spotted. Turbo DVR with AcuSense technology requires a PIR/TurboX camera for visual and audible alarm. Factories – Accurate trespass alarm, 24 hours a day Factories and warehouses store high-value raw materials or commodities. Security here is crucial. However, there is usually only limited manpower to perform such tasks. Replace security patrols with camera monitoring Using AcuSense technology can greatly improve perimeter monitoring efficiency and ensure that limited human resources can be deployed only where most needed. Accurate Trespassing Alarm for Human Targets Factories and warehouses mostly deal with human intrusion events, which might turn into burglary or vandalism. The security team can set devices with AcuSense to send alerts only upon the detection of a human intrusion. Wild animals crossing the line will no longer trigger the alarm.


Expert commentary
In the UK, one burglary occurs every 106 seconds. This means by the time you've finished reading this article, at least three will have taken place. Selecting robust physical security options to protect property boundaries and homes is essential to limit crime rates and deter opportunistic intruders. With 58% of burglaries said to take place while the homeowner is in, it seems that even the second wave of lockdowns, and an increased number of people confined to their homes, won't do much to eliminate the risk of burglary. Prioritise security for peace of mind Security is paramount, and in the case of new build projects, should be considered from the very beginning of the design process, not as an afterthought. When it comes to securing pre-existing buildings, there are countless security options which will ensure the perimeter is robust enough to withstand opportunistic attacks. It's also worth noting that security features don't have to be complicated. There are plenty of high-tech digital systems flooding the market, which can go a long way to reduce the risk of burglary and will provide peace of mind to the end user. However, this article will demonstrate how traditional security measures, such as high-quality perimeter fencing, can ensure practical safeguarding of properties for years to come. Selecting robust physical security options to protect property boundaries and homes is essential to limit crime rates Timber! There are a number of different materials which can be specified to create a strong boundary. From metal railings, to timber fence panels, they will each help deter criminals somewhat. Wooden fence panels are a popular choice for their appearance, and the right product and installation can help to increase security.Our timber acoustic fencing can also reduce noise by up to 32dB and has a solid face with no hand or footholds, while still retaining the attractive natural timber aesthetic of a typical garden fence. However, maintenance is key, and one of the first thing burglars will notice is the condition a fence is in, rather than a particular style. Therefore, old, broken or rotten fence panels are a green light for opportunistic thieves. These can be easily broken or bypassed with minimal effort. When specifying fences as part of a new build housing development, we would suggest opting for high-quality timber, as this will ensure that it is protected against rot. Look for products with an extended guarantee or those that don't need additional treatment over the years. The condition of the fence should still be regularly inspected, and simple methods such as clearing piles of leaves away from the base of the boundary can help to prevent rot which weakens the timber. Securing fence panels The recent rising cost of timber has led to a dramatic increase in fence panel theft, and panels that can be lifted from the posts are an easy target. Mitigate this risk by screwing the fence panels into the posts. This makes it much harder for the panels to be removed from the posts and creates a more secure barrier. Concrete posts do offer benefits, but we always advise on timber posts for any fencing. They're strong, just like concrete, but they continue the same natural theme as the rest of the fence. Moreover, if you screwed the panels to concrete posts, they would most likely crack and become damaged, and then be at risk to the elements. Astute design Design is also important. Installing fence rails on the inside of properties to prevent them from being used as climbing aids is highly recommended. Even better, using panels without rails on high-end developments is a clever tip if you want a secure fence with a high-spec look. Security features don't have to be complicated High fences with solid panels and no gaps in between make it considerably harder for potential burglars to climb over. They also offer better privacy to conceal rear garden areas from intruders, and are much sturdier than other alternative panels. One common mistake is designing in features such as trees or children's climbing frames too close to the boundary. These can be used by burglars as climbing aids when attempting to scale the fence, making access easy. Investigate the surrounding area, which flanks the outside of the property boundary, as an unfortunately placed bin or bench can also help criminals gain entry. If the removal of these items is not possible, designing in a spiky bush can help deter intruders. It's also worth noting that gardens with numerous large features such as bushes or sheds can also negatively impact the level of security. A clear line of sight across the entire garden is highly recommended where possible. If this view is blocked, it's considerably easy for intruders to hide undetected. Front gardens While tall, solid fence panels are recommended for rear gardens to prevent intruders from being able to see in and climb over, the opposite is true for front gardens. For street-facing gardens, a low fence or hedge is recommended to provide a clear view from the house. It also makes it much harder for intruders to hide from passers-by or neighbours, who can raise the alarm during a burglary. Another useful security technique to consider is a gravel drive. These create noise, which means the homeowner will know when it is in use. Pair this with a strong boundary fence, the likelihood of burglary dramatically decreases. This article only scratches the surface in unveiling the sheer volume of effective home security options on offer to protect homes and gardens. These investments can help minimize the risk of traumatic break-ins, while also simultaneously boosting the aesthetic of the property and its surroundings.
Construction site theft can cause project delays, property damage and loss of profit for companies in the construction sector. It is imperative to deter thieves from targeting construction sites with the help of construction site security. Here, we look into the various security options and how they can help protect your firm from the threat of a break-in. Construction theft has soared during the COVID-19 Pandemic Construction site theft is an ever-increasing problem in the UK, costing the industry an estimated £800 million ($1,040 million) per year. Unfortunately, this type of crime has accelerated further throughout lockdown by an estimated 50% due to the abandonment of construction sites across the UK. With many uncertainties around a potential second wave in the UK, it is time for construction firms to enhance their security strategies to help prevent thieves from becoming opportunists on construction sites. Why are construction sites ‘easy’ targets? Construction sites can easily be targeted, as they typically lack adequate security loss prevention practices. The most popular security-related issues that are leading causes of construction site theft are: Poor overall site security Multiple pieces of equipment sharing the same keys Easy access to open cabs Unsecured sites, particularly at night and over weekends Lack of product identification systems If you do not want your site becoming a costly statistic, you might want to try implementing some or all of these preventive measures. Strengthen your perimeter Putting a clear boundary around a construction site will help to prevent youths and members of the public from inadvertently wandering onto the site. To stop opportunist thieves in their tracks, you will need to go one step further by erecting robust fencing and concrete blocks along with signage warning intruders about the consequences of trespassing. Putting a clear boundary around a construction site will help to prevent youths and members of the public from inadvertently wandering onto the siteIf potential trespassers can see that it would be too challenging to attempt a break-in, then they will look elsewhere to find another construction site which is not as well secured. Lock away valuable tools When considering the vulnerabilities in your construction site, it pays to think about this from the perspective of a criminal. What is it exactly that they are looking for? What can a thief steal easily to make money if they were to remove something from your site? Unfortunately, many construction firms do not lock away their tools, materials or vehicles properly, which makes them an easy target. Ensure valuable tools and materials are locked away and are not left unsecured or lying around. Criminals are mostly interested in scaffolding, bowsers and other valuables that are quick to sell on, so it is important to have a strategy in place to keep these locked away, safe and securely. Put tracking devices in your equipment If you are unable to securely lock away valuable tools, then modern technology makes securing equipment easier than ever before. Tracking devices can be installed onto vehicles and equipment; if any thief is unwise enough to steal from the site, site owners will be able to provide the location to the police who will be able to follow this up. Site owners should also engrave company identification numbers on valuable tools, equipment and vehicles so that it can easily be identified and will serve as proof who it rightly belongs to. Invest in CCTV Closed Circuit Television, otherwise known as CCTV, is renowned for being one of the most effective deterrents for thieves, especially when it comes to construction and building sites.The items that criminals steal from sites are notoriously hard to trace The items that criminals steal from sites are notoriously hard to trace, but if you have CCTV, there is a chance that you can capture clear footage to help bring criminals to justice, such as footage of the vehicle used and the car licence plate. CCTV cameras can help to oversee every inch of a construction site, and can even be hidden out of sight where required. Step up with regular site patrols With a wide range of security monitoring methods available, stepping up on regular site patrols can help to keep track and respond to any criminal activity taking place on your site. Traditional site patrols can be carried out on a schedule by professional SIA-approved security agents. With the presence of guards patrolling a construction site, any criminals in the area will be deterred to force entry onto the site. Schedule supply deliveries on an as-needed basis To prevent an excess of supplies ‘sitting around’ on the site, construction site managers should instead order what is needed at the time, so that valuable materials are not left around waiting to be stolen for weeks at a time. Good planning and excellent communication between the team will be required so that projects are not delayed, but planning accordingly will help to reduce the chances of theft on a construction site. Drone surveillance As technology becomes more and more advance, drone surveillance may soon be a security option that many construction sites could benefit from.Many construction firms in the UK are using drone services to provide aerial images, and are seeing huge cost savings by either purchasing and operating their own drones or by hiring out the work to a company equipped to provide imaging.As technology becomes more and more advanced, drone surveillance may soon be a security option With surveillance drones already handling tasks like mapping and surveying of construction sites, one day they may be able to patrol construction sites at night, equipped with motion sensors and infrared or night vision cameras; They could be automatically deployed from a charging station and fly along a pre-programmed route at regular intervals. One to keep an eye on for the near future! Construction site security to help protect your site If you are ready to tighten security on your own construction site, then your starting point will be to identify your main vulnerabilities and get in touch with a reputable security specialist.
COVID-19 has sparked a flurry of criminal activity across the country, with a particular increase in petty crimes perpetrated against UK healthcare facilities. Bike theft, slashed ambulance tyres and stolen oxygen canisters are just some of the misdemeanours which have significantly grown in frequency since the coronavirus lockdown began in March 2020. Given the constant, essential work carried out by health services, it’s clear the utmost must be done to protect its physical assets, and staff, from physical attack. Fundamentally, it’s the responsibility of the facilities managers and specifiers to incorporate and carefully balance physical security strategies around healthcare sites to protect patients, visitors, property and assets. The challenge is that many of these sites are continually increasing in size and complexity to meet the higher demand from the population. Fencing, gates, storage enclosures and access control are part of a solution in securing this service sector to enable it to operate effectively 365 days a year. Effective access control Hospitals are fast-paced environments where life and death outcomes often hang in the balance of only a couple of minutes. Efficient, seamless access is therefore key. All gates and access points around the perimeter must be assessed and considered and these access points should be installed and controlled centrally, or regularly monitored. Fencing, gates, storage enclosures and access control are part of a solution in securing this service sector Consider the types of vehicles that require access; the appropriate solution should ensure that, where necessary, emergency vehicles can get in and out of the site unhindered. Effective design for maximum security If automated gates are specified, underground operators are highly recommended to remove any visible signs of surveillance on display. When designing pedestrian and vehicular access: gates should be DDA (Disability Discrimination Act) compliant. Crucially, the design of fencing and gates must accommodate rapid evacuation and access for emergency services. With regards to the car park, it may require rising arm barriers or bollards to secure it. These solutions control access and separate pedestrians from vehicle traffic whilst protecting different buildings, such as specialist units and emergency wards. Promoting wellness through aesthetics Creating a welcoming environment is a core priority when specifying security options for hospitals. Razor or barbed wire may be effective deterrents to potential trespassers, but they create an intimidating and unwelcoming aesthetic, far removed from the sense of wellbeing these developments should promote. A solution that offers both visual appeal and high levels of security is vertical bar security fencing or welded mesh panels. Both provide strong boundary protection and excellent visibility for surveillance, while offering greater protection than other alternatives. Recreational areas For areas requiring a 'softer' appearance, such as gardens and outdoor recreational areas, timber fencing is an ideal option. Timber has a natural, welcoming appearance and promotes a sense of wellbeing and privacy. As well as offering a pleasing aesthetic, it can also provide a high level of noise protection. This makes it well suited for acoustic fencing, which can improve recreational and recovery areas by protecting them from high levels of noise, transforming them into little oases of calm ideal for recuperation. Outdoor storage areas Hospitals and other medical facilities produce a large amount of medical waste which requires secure outdoor areas and bin stores to hold hazardous materials on-site before they're taken away. Hospitals have a responsibility to ensure these areas are secured using risk-appropriate fencing to avoid potentially dangerous materials getting into the wrong hands. Risk assessments Creating a welcoming environment is a core priority when specifying security options for hospitals Risk assessments are key to ensuring a risk-appropriate solution is installed. For facilities at risk of criminal activity, products accredited by standards including Secured by Design or the Loss Prevention Standards Board’s LPS 1175 are proven to reduce the likelihood of crime. It’s also best practice to locate storage areas in areas away from climbing aids such as lamp posts or trees. The fence should also be high enough to deter attempts at climbing. There are many effective and easy-to-install options on offer when it comes to specifying security for healthcare infrastructures. It is important that each site is judged individually. Every institution is different and will require a unique plan of security structures to ensure it is safe for all personnel.
Security beat
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximize the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot program is the 250,000-square-foot HID Global facility in Austin. For the pilot program, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 White Papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
Close collaboration with customers has been a hallmark of the physical security industry for decades. And yet, less ability to collaborate face-to-face to discuss customer needs has been a consequence of the COVID-19 pandemic. “True innovation, which comes from close collaboration with customers, is more difficult to achieve remotely,” said Howard Johnson, President and COO, AMAG Technology, adding “Not being able to visit in person has not been helpful. Kurt John, Chief Cyber Security Officer at Siemens USA, adds “We need to plan intentionally with a strategic approach for collaboration and innovation.” Securing New Ground virtual conference Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry at a ‘View from the Top’ session, during the Securing New Ground virtual conference, sponsored by the Security Industry Association. Their comments covered business practices during the pandemic and the outlook for technology innovation in response. “We had to pivot quickly on business models and create a cross-portfolio team task force to discuss how we can leverage technologies to help customers [during the pandemic],” said John, adding “We are having outcome-based conversations with customers about their businesses and operations, and how we can combine short-term benefits with long-term growth and flexibility.” But some of those conversations are happening from a distance. Results-oriented approach in remote work environment After the pandemic took hold, Siemens shifted rapidly to remote work and embraced other infrastructure changes. “We had to refocus and lead with empathy, flexibility and trust,” said John, adding “We gave our staff flexibility to set their hours and used a results-oriented approach.” There is also a social element missing in the work-from-home model. “Virtual coffee machines do not replace being there in person,” said Pierre Racz, President and CEO, Genetec, adding “Small talk about the weather is important psychological elements.” Positives in using multi-factor identity management He predicts that, in the future, office hours may be reduced, but not floor space, with space needed for in-person collaboration and long-term social distancing. Employees will come to the office to do collaborative work, but can work from home to accomplish individual tasks that may be ‘deferred’ to after-hours, when the kids have been fed. When the pandemic hit, Genetec had resumed 95% of their operations within 36 hours, thanks to their use of multi-factor identity management. They did not suffer from malware and phishing issues. “Multi-factor is really important so that well-engineered phishing campaigns are not successful,” said Pierre Racz. Shift to ‘Zero Trust’ model All three panelists noted a coming skills gap relating both cyber security and systems integration Remote working technologies are shifting to a ‘zero trust’ model, in which access to systems is granted adaptively based on contextual awareness of authorized user patterns based on identity, time, and device posture. For example, an office computer might have more leeway than a home computer and a computer at Starbucks would be even less trusted. The approach increases logical access security while providing users their choice of devices and apps. Skills gap in cyber security and systems integration A growing skills gap has continued throughout the pandemic. “Where we have vacancies, we have struggled to find candidates,” said Howard Johnson. All three panelists noted a coming skills gap relating both cyber security and systems integration. New technologies will clearly require new skills that may currently be rare in the workforce. Cyber security will become even more important with growth in new technologies such as AI, machine learning, 5G and edge computing. A workforce development plan is needed to address the technologies and to enable companies to pivot to new business needs, said John. Adoption of temperature sensing solutions From a technology viewpoint, Johnson has seen attention shift to the reception area and portal, away from touch technologies and embracing temperature sensing as a new element. There have also been new requests for video and audio at the portal point, to create methods of access and egress that do not require security personnel to be present. “Some customers are early adopters, and others are waiting for the market to mature before investing,” Howard Johnson said. “Security companies have been faced with the need to respond rapidly to their customers’ needs during the pandemic, but without seeming like ‘ambulance chasers’,” said Pierre Racz. In the case of Genetec, the company offered new system capabilities, such as a 'contamination report', to existing customers for free. Move to a hybrid and flexible work environment In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach" An immediate impact of the pandemic has been a reduction in required office space, as more employees have worked from home, raising questions about future demand for office space. “The pendulum tends to swing to the extremes,” said Kurt John, adding “In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach.” “Users will be much more careful about letting people into their space, which requires more policies and procedures,” said Lorna Chandler, CEO, Security by Design, who participated in a panel at Securing New Ground about how the pandemic is changing commercial architecture and access control. “Users should also be careful in the rush to secure premises from COVID-19 that they don’t violate HIPAA laws or create other potential liabilities,” adds Chandler. Continuum of mechanical and electromechanical devices Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions, said a “Continuum of mechanical and electromechanical devices is needed to protect premises and ensure convenient operation of an access control operation.” “First and foremost, the immediate reaction to the impact of COVID-19 is to rush to educate and invest in technologies to increase the ability to analyze people,” said Duato, who also participated in the access control panel. Shift to touchless, frictionless access control “The move to touchless, frictionless access control “is really a collaboration of people, process and technology,” said Valerie Currin, President and Managing Director, Boon Edam Inc., adding “And all three elements need to come together. Touchless and frictionless have been in our market for decades, and they’re only going to become heightened and grow. We’re seeing our business pivot to serve markets we have not served in the past." More and more data is a feature of new systems, but is only helpful when it is analyzed. “We all live in a world of data, or IoT and sensor technology,” said ASSA ABLOY’s Mark Duato, adding “But we don’t want to be crushed by data. Data is only helpful when you can reduce it to functional benefits that will help us innovate. We have to take the time to squeeze the value out of data.”
The COVID-19 pandemic has provided a double challenge to physical security systems integrators. For one thing, they have had to adapt their own businesses to survive and thrive during the pandemic. On the other hand, they have also been faced with new challenges to serve their customer’s changing needs. Global pandemic effects One integrator company, North American Video (NAV) took the now-familiar steps most companies confronted to adapt their business model to operations in a global pandemic – they suspended all non-essential travel and face-to-face meetings. At one point, NAV had a single employee in the New Jersey headquarters and another one in the Las Vegas office. The rest worked from home, with other offices opening as needed over the following weeks. Another integrator, Convergint Technologies, was able to adapt its approach to the pandemic, location by location, across the United States. The integrator benefitted from its leadership structure, with local managers in various regions who are autonomous and could react to what was happening in each region. Virtual workforce “We saw a dip in April and May, but since then, we have seen business pick back up,” said Mike Mathes, Executive Vice President, Convergint Technologies. The Business of Integration virtual conference sponsored by the Security Industry Association (SIA) “We already had tools and infrastructure deployed to support a virtual workforce. We had the software and the right equipment, and that has allowed us some flexibility to approach the repopulation of our offices in a gradual way.” The impact of COVID-19 on integrators and their customers was the main topic of discussion at a session on The Business of Integration at the Securing New Ground virtual conference sponsored by the Security Industry Association (SIA). Remote monitoring North American Video also benefitted from having technical personnel spread across the United States. By assigning work duties on the basis of geography, they could travel by car with less risk than air travel. They also increased their use of remote monitoring and support to avoid extra visits to customer sites. With 80% of the business in the gaming industry, North American Video saw a profound impact on their customers with the almost complete shutdown of casinos during the early days of the pandemic. Even though gaming was impacted particularly badly by the virus, NAV stayed engaged working on four or five large casino construction projects that continued throughout the shutdown. Revenue shortfalls State legislatures will approve more casinos to help plug the holes in their budgets Other casinos took advantage of empty facilities to make needed upgrades without worrying about disrupting casino operations. “A lot of our strong, long-term clients have sought to perform upgrades during the downtime, including needed service and maintenance,” said Jason Oakley, President and CEO, North American Video (NAV). “When gaming was closed, you were allowed in the facilities to work.” Oakley also sees long-term optimism for the casino business, which will offer a means for state and local governments to make up revenue shortfalls. “State legislatures will approve more casinos to help plug the holes in their budgets,” Oakley predicted. Demands for technology Oakley and NAV have seen an evolution in customer demands for technology in light of the pandemic. The trick is to differentiate between demand that is an immediate reaction versus technology trends that have more staying power. Although customers were keen on purchasing thermal cameras, for example, NAV did the research and recommended against the use of the technology to some of their customers. Artificial Intelligence for social distancing The use of artificial intelligence (AI) for a variety of applications seems to have more staying power. “One area of interest at a high level is modification and repurposing of AI for face mask detection, social distancing and people tracing, including integration into existing cameras,” said Oakley. “If the hospitality industry comes to terms with the new normal with smaller restaurant capacities, there may be an opportunity to use AI for social distancing.” Contact tracing and visitor management technology Mathes of Convergint sees a massive change as customers move toward managed services, accelerating the change with new use cases. We have an entire group that focuses on new solutions and what customers are looking for" As offices seek to repopulate when the pandemic subsides, customers are looking for new uses of existing technologies, added Mathes. “We have an entire group that focuses on new solutions and what customers are looking for,” he said. “They need to understand who is in the building and where they go in the building. If we know someone was only in the cafeteria from 10 to 11 a.m., we can know who was in the cafeteria at that time.” Opportunity for vertical markets to move forward He predicts technologies for contact tracing and visitor management tracking who’s in the building and where will be around for a long time to come. "Various customers and vertical markets are looking at the slowdown differently," said Mathes. "For example, while airlines have slowed down, the view from the airport market is more long-term." “They have 15-year plans, and [the slowdown] is an opportunity to move forward. In the technology space, data centers are expanding. “We try to focus our resources on areas where the money is being spent,” said Mathes. “Our K-12 group has seen an 80% growth over 2019. The money is tied to bonds, so there hasn’t been a slowdown relative to revenue.” He said Convergint is cautiously optimist about 2021.”
Case studies
Harper Security Systems, which specialises in specifying and installing smart security solutions for residential and private properties, has selected OPTEX’s range of Intelligent Passive Infrared (PIR) sensors for their reliability in detecting external threats, especially in rural environments. Three properties in the Home Counties and Lincolnshire are using a combination of OPTEX’s proven PIR sensors to protect property, people, and other important assets including horses from the dangers of vandalism and theft. OPTEX’s range includes sensors which offer panoramic 180-degree detection coverage and 12m/40ft radius to detect any intrusion around a residential or commercial building. Commercial business environments They are ideally suited for protecting larger residential grounds and flat roofs typical with outbuilding on farms and stables. “We have worked with OPTEX for a number of years and have found their range of PIR sensors to be extremely accurate and reliable, which is critical when specifying external detection,” says Alan Harper, Director at Harper Security Systems. The flexibility and versatility of the sensors is such that they are ideal for multiple environments" “The flexibility and versatility of the sensors is such that they are ideal for multiple environments,” Alan continues. “For example, we have recently installed them at a private stables in Lincolnshire to protect horses and valuable equestrian equipment, residences in rural villages in both Bedfordshire and Hertfordshire to protect property and personal items, as well as in commercial business environments.” Innovative security solutions Ben Linklater, Sales Director at OPTEX Europe, says that while the focus is often on towns and cities, crime in the countryside is a huge issue, costing the rural community in the UK more than £9 million this year alone: “Reliable external protection is becoming increasingly important not only to secure equipment and assets, but also livestock and other animals like horses. The earlier the detection the better chance there is to prevent intruders." "External intrusion detection is essential in rural environments as most assets, many of which are expensive to replace (and some are irreplaceable), are stored outside. We are very pleased to work with Harper Security who understand the benefits of early detection to keep premises, assets, people and animals secure, delivering innovative security solutions to their customers.”
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organized at a grand scale at Nashik, Haridwar, Ujjain, and Prayag. As Kumbh Mela is being celebrated after a period of 12 years in Nashik, 100 million people are expected to visit, security is a major concern for the Government bodies. Nashik will be getting an opportunity to host these guests from July 14 to September 25 and no stone will be left unturned in hosting the massive gathering. Challenges Nashik Railway Station authorities wanted video surveillance devices that would not consume larger areas when it comes to installing them as the railway station had congested platforms. Moreover, they wanted a surveillance solution that gave them superior image quality and at the same time did not consume heavily on the bandwidth. Furthermore, the authorities wanted to monitor the whole place centrally and gain central control of the entire place. Installing devices and control room in the congested platforms Restricted allotted bandwidth for the video surveillance solution Requirement Prompt and smooth installations of cameras and hybrid video recorders within 30 days Setting up the control room for monitoring railway station entrance, platforms, and connecting bridges High reliability of the solution for utmost security Storage of the entire 4-month period as evidential proof Matrix offering Installation was completed within 20 days with highly skilled manpower. Cascading of all the connected devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. 4 months scheduled backup of all cameras is configured centrally for storing all the streams. Matrix being an Indian brand, efficient pre-and post-sales support is a part of the solution. Results Secured entry and exit from the city with 24x7 video surveillance of the railway station Installation of the solution done within the defined time frame Products offered SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralized Monitoring Software (CMS)
Specialist property developer and investor, Kajima Properties’ new project development at 77 Coleman Street in the City of London is a luxury multi-tenant office set over seven floors. BNP Paribas acts as the managing agent, while the redevelopment was designed by architect, Buckley Gray Yeoman. The prominent London location is a minute’s walk from Moorgate Tube station and the Elizabeth Line. The redevelopment included installing elegant external facades as well as creating floors of new office space, and 16,000 sq. feet of retail, leisure and restaurant space. The site offers exceptional internet reliability and speed for tenants, and is one of just 22 buildings in the UK to achieve a platinum connectivity rating by WiredScore, the Mayor of London’s digital connectivity rating scheme. Seamless access control system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system to allow bona fide users and visitors easy access through reception and lifts to their desired location. This needed to be underpinned, but not impinged by, a robust security management system including CCTV to keep people and the building safe. They wanted to keep any waiting time in reception to an absolute minimum to avoid crowding, including good access for disabled users, and for all entry to be touchless. Tenants and reception staff would need an efficient, secure and easy to use system for managing visitors. While an entry phone and door automation would be required for anyone arriving out-of-hours, or at the rear of the property, such as for deliveries and trades people with equipment. Bespoke security solutions Finally, a key part of the brief was for any installed equipment, such as turnstiles and lifts, to be in keeping with the sophisticated, minimal look and feel of the building. The Team Antron Security project managed the design, supply and installation of the access control and security system for 77 Coleman Street and acted as the ‘go to’ contact for client, Kajima Properties and BNP Paribas. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 29 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Integriti access and security management system Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for 77 Coleman Street in London, UK. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions since 1988. More than 150,000 Inner Range systems have been installed in over 30 countries till date. The company’s flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls for single sites through to global estate portfolios. Seamless, touchless entry for tenants Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles The building’s 2000+ regular users are issued secure proximity cards, carrying encrypted information about when and where the user is allowed to go. Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles, which also allows them to be read by the KONE lift integration. The high level lift integration with ‘destination control’ means the lift software takes into account where each of the building’s four lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. Antron Security and IDL collaboration The user is immediately directed to the most efficient lift via a display screen on the turnstile. If users are able to go to more than one floor, they can update their preference in the lift itself. For the turnstiles in the reception area, Antron Security and IDL worked closely with the vision set out by the architect to create a high-performing system that was in keeping with the sleek, minimalist design of the building. A bespoke set up of slim ‘speed lane’ turnstile pedestals, together with a separate glass gate were an ideal solution for a reception area where space is limited but security provisions and good disabled access are needed. IDL’s Glassgate 200 opens away from the user, and closes behind, preventing tailgaters and all IDL items are manufactured in the United Kingdom. Readers for proximity cards and QR codes were set into the speed lanes to create a seamless flow through the reception area. Fully integrated visitor management system Inner Range’s Integriti also allowed Forge’s Bluepoint visitor management system to integrate with IDL’s turnstiles and the KONE lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint. An email is generated and sent to the visitor’s inbox where they can create a mobile QR code pass and save it to their smart phone wallet. When the visitor arrives, they scan their QR code on their smart phone at the reception desk, at which point their QR code becomes valid on the Integriti access control system. The visitor is then able to enter via IDL’s speed lane turnstiles, and they are directed by the KONE lift display (which is set into the speed lane) to which lift car they need. To leave, the visitor presents their QR code at the speed lane turnstile, which tells the system they’re leaving. The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system. The QR code gives the visitor the ability to access everything they will need, from the entry turnstile and lift through to any locked doors en route. The integration between Integriti and Forge’s Bluepoint visitor management system was achieved with an XML read/write interface, as well as API integration between a SQL database and a cloud-hosted VMS database based on Microsoft Azure cloud services platform. BTP XIP intercom system A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team, or for deliveries and trades people to use in order to access doors at the rear of the building. The XIP system uses an ethernet distribution network, which means the system can be expanded easily, and it’s possible to install long-distance connections that data networks can’t reach. Hikvision CCTV cameras installed CCTV cameras from Hikvision’s ‘superior’ range have been installed throughout the site to create a hard-wired IP closed circuit television system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view in response to alerts, and footage can be viewed holistically along with other information on from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s Enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener, more energy efficient sites by tracking how tenants use the building, and amending heating and lighting settings as a result. Integriti also provides trace reporting, that can identify a user’s movements if they have become unwell and identify who else has been near them. System benefits for users Touch-free entry to the building via the speed lanes and lifts. No unnecessary stops for users and visitors on their way into the building. Less crowding in the lift areas. Easy to use visitor management system. Robust security that doesn’t impinge on access. Sleek and minimal design in keeping with the building design. Jamie Crane, Commercial Director at Antron Security, stated “The flexibility of Inner Range’s Integriti access control system and Forge’s Bluepoint visitor management allowed us to incorporate high-level lift integration (known as ‘destination control’).” He adds, “Together, they create a future-proof solution as we can continue to meet the ever-changing requirements of the landlord and tenants via our ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.”
HID Global, a worldwide provider of trusted identity solutions, announced that popular aerospace company Avolon has selected the HID Mobile Access solution for physical access at its headquarters in Dublin and other locations worldwide. Powered by HID’s award-winning Seos credential technology, the solution enables Avolon to issue staff Mobile IDs to smartphones for building access and provides an efficient management platform for its global network of offices. Avolon is one of the world’s largest aircraft leasing companies servicing many of the world’s major airlines. HID partnered with Ireland-based systems integrator Summit Security Systems Ltd to deploy the HID Mobile Access solution and HID’s readers throughout Avolon’s Dublin campus. Mobile IDs are sent to Avolon staff via an app on a user’s Android or iOS mobile device so they can quickly and easily use their phones to gain access to Avolon facilities. Manage access rights “We needed to maintain a secure perimeter, but we did not want the security to be a barrier. Using a mobile phone is much more convenient than an access card and phones tend not to get left behind,” said Allan Dawson, Facilities Project Manager at Avolon. “We were looking for a system that was highly flexible, highly mobile and highly secure. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility.” Since Mobile IDs are issued remotely, they can easily be issued or revoked for added convenience and efficiency The HID Mobile Access solution facilitates around-the-clock office access for staff members and equips administrators to manage access rights from a centralized, cloud-based portal. Since Mobile IDs are issued remotely, they can easily be issued or revoked for added convenience and efficiency. Touchless access control “Avolon’s use of HID Mobile Access makes touchless access control possible for a more seamless user experience, which is appealing to many organizations in the today’s new normal,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control with HID Global. “The scalability of our solution also lays the groundwork for Avolon to easily extend mobile access across more of its facilities.” Following the successful deployment of mobile access at its Dublin headquarters, Avolon has also launched the HID Mobile Access solution at its New York, Florida and Hong Kong offices, with plans underway for its Singapore campus.
HID Global, a pioneer in trusted identity solutions, announces that aerospace company Avolon has selected the HID Mobile Access® solution for physical access at its headquarters in Dublin and other locations worldwide. Powered by HID’s award-winning Seos® credential technology, the solution enables Avolon to issue staff Mobile IDs to smartphones for building access and provides an efficient management platform for its global network of offices. Maintaining secure perimeter Avolon is one of the aircraft leasing companies servicing many of the world’s major airlines. HID partnered with Ireland-based systems integrator Summit Security Systems Ltd to deploy the HID Mobile Access solution and HID® readers throughout Avolon’s Dublin campus. Mobile IDs are sent to Avolon staff via an app on a user’s Android or iOS mobile device so they can quickly and easily use their phones to gain access to Avolon facilities. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility" “We needed to maintain a secure perimeter, but we did not want the security to be a barrier. Using a mobile phone is much more convenient than an access card and phones tend not to get left behind,” said Allan Dawson, facilities project manager at Avolon. “We were looking for a system that was highly flexible, highly mobile and highly secure. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility.” Touchless access control The HID Mobile Access solution facilitates around-the-clock office access for staff members and equips administrators to manage access rights from a centralized, cloud-based portal. Since Mobile IDs are issued remotely, they can easily be issued or revoked for added convenience and efficiency. “Avolon’s use of HID Mobile Access makes touchless access control possible for a more seamless user experience, which is appealing to many organizations in today’s new normal,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control with HID Global. “The scalability of our solution also lays the groundwork for Avolon to easily extend mobile access across more of its facilities.” Following the successful deployment of mobile access at its Dublin headquarters, Avolon has also launched the HID Mobile Access solution at its New York, Florida and Hong Kong offices, with plans underway for its Singapore campus.
Situated near the picturesque small town of Soliera in northern Italy, the dairy plant of Italian food company Granarolo is anything but small: More than 600 farmers, 70 trucks for the collection of milk and 720 vehicles handle 850,000 tons of milk every year. Its dairy products such as milk, yogurt, ice cream, cheese, and lately also ham and pasta, supply several million Italian families every day. The plant’s huge production capacity is reflected in the size of the perimeter: The Soliera facility stretches out over 45,000 square meters. Furthermore, it is located near a wooded land which is important when it comes to designing a security system aimed at protecting the plant against intrusion. Video surveillance system Granarolo wanted to replace an old analog video surveillance system by a digital one as its security challenges exceeded the limits of the old installation. The project posed several challenges. The most significant being the vast area of the factory itself, as well as the location of the perimeter near an area that can only be poorly overseen. Since the factory is located in a heavily wooded area, building an appropriate video security system is more challenging because it needs to be safeguarded against false alarms, triggered by ever-changing lights, shadows and the constant movement of trees and plants. Tackling these challenges, Naples-based Bosch partner Gruppo Sirio worked out the modernization of the plant’s security system, with Bosch cameras featuring built-in Intelligent Video Analytics (IVA) at the heart of the system. Detecting suspicious objects Bosch provided a video surveillance system with 48 cameras of the Dinion series With the help of the security cameras’ integrated video analytics, virtual lines were drawn around the area to be protected against intrusion. When these lines are crossed by intruders, the programmed rules automatically generate alarms, alerting on-site security personnel to intervene. Whether the cameras are tasked with detecting suspicious objects or unusual movements in daylight or night-time, constant surveillance with a special focus on sensitive areas ensures security. In total, Bosch provided a video surveillance system with 48 cameras of the Dinion series. The system, which is managed on one central platform, is completely autonomous and entirely separate from any other system or network in the plant. This ensures maximum security even in the event of potential failures of other systems on site. Perimeter protection solution As a result of the modernization process, Granarolo can now rely on a system specifically designed for its needs. The newly established, digital video surveillance and perimeter protection solution supports the security personnel in maintaining maximum levels of security through the entire area. It also guarantees that food safety standards in the protected facility are guarded against outside influences. Ultimately, the system allows the staff to fully focus on keeping the production running at all times, thereby contributing to secure the sensitive chain of the Italian food supply against interruptions.


Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Products

