Matrix Comsec, a manufacturer and provider of security and telecom solutions, is participating in ISC WEST 2019, Las Vegas, USA on 10th April 2019. Matrix will be showcasing its comprehensive range of IP video surveillance, people mobility management - an innovative range of access control and time-attendance solutions at the event. Both these solutions are specifically designed for large and multi-location enterprises, SME and SMB organizations. Matrix is known for offering technology driven,...
Qognify - the trusted advisor and technology solution provider for physical security and enterprise incident management - announced that it has completed the acquisition of the IP video management software (VMS) company - On-Net Surveillance Systems (OnSSI), including the pioneer of IP video technology - SeeTec GmbH. Backed by the global investment firm Battery Ventures, Qognify announced the agreement on December 22, 2018 and the deal closed on December 28, 2018. Expanding Geographic Reach Wi...
ThinkReps LLC, a security manufacturers’ rep firm in the New York Metropolitan area, announces that the company has expanded and added a new team member, Kenneth C. Kraemer to its roster. ThinkReps is a manufacturer's representation firm based in New York and focused on enhancing the sales and market awareness of the best physical security solutions in the industry. The company is committed to providing top notch sales and support to its customer base and continues to raise the bar on sal...
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require tech...
The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make impr...
The term ‘marine’ comes from the Latin mare, meaning sea or ocean, and marine habitats can be divided into two categories: coastal and open ocean. Video surveillance (VS) applications can cover both types of marine environment with system for ships, maritime ports, onshore and offshore installations, etc. We should want to further analyze VS for ships and try to explain the types of ships on which it can be used, the ways in which VS can be used on ships, the typical certificat...
V5 Systems, a provider of self-powered outdoor security and computing solutions, has been selected by Pelco, by Schneider Electric , for integration with its V5 Camera Adaptive Platform (V5 CAP). The integration will enable Pelco to expand the capabilities of its world-class Sarix Professional IP Surveillance Cameras to the outdoor security market in areas without fixed power and communications. As a result, public safety can be improved in any outdoor area, even remote zones or blind spots. Pelco is a global provider of professional video surveillance and security system solutions and technologies, supported by a comprehensive portfolio of VMS and imaging products. The company’s Sarix Professional IP Surveillance Cameras provide the perfect balance of performance and value, with exceptional resolution and Smart Compression to reduce bandwidth and storage requirements. V5 CAP Features The V5 CAP is an ongoing power, computing and communications platform for 3rd party surveillance cameras. The V5 CAP features: Ongoing power via a combination of proprietary bullet-resistant solar technology and a battery management system Computing platform enabling easy integration of 3rd party cameras Up to 1TB of onboard video storage with the ability to transfer data to the cloud or back-server Wireless communications via Wi-Fi, cellular or RF Self-Powered Devices For Outdoor Environment With Pelco’s Sarix Professional IP Surveillance Cameras integrated on the V5 CAP, the cameras have been transformed into self-powered devices that can be rapidly deployed in virtually any outdoor environment. The solution further documents V5 Systems’ leadership in bringing video surveillance to the outdoors where there is no ready access to fixed power. The innovative solution can benefit any organization in need of outdoor security, including school campuses, law enforcement, as well as those in the oil and gas, city surveillance and transportation markets. Future Collaborative Expansions Validating the Pelco Sarix Professional IP Surveillance Cameras on V5 Systems platform is the first step of this collaboration. Several more Pelco integrations, including software integrations, are slated to launch in 2018. "Our V5 CAP is an innovative platform, which is proving enormously popular as a platform for 3rd party applications. It enables Pelco surveillance cameras to expand its market for HD video surveillance to the outdoors. The integration with Pelco Sarix Professional IP Surveillance Cameras is part of our partner-centric business model, which enables us to bring the benefits of our V5 Systems technology to our partners in the HD video camera industry," the president of V5 Systems, Mazin Bedwan, stated. "These partnerships support our mission to enhance public safety and the quality of life in all outdoor areas." Delivering Market-Specific Solutions John Roman, Pelco Vice President of Global Strategic Accounts and Sales Support, commented, “We welcome the integration of our Sarix Professional IP Surveillance Cameras with the V5 Camera Adaptive Platform as it further expands our ability to deliver market-specific solutions in core vertical markets. Now campuses, cities, airports and seaports, oil and gas facilities and municipalities can implement the proven performance and value our Sarix Professional IP Surveillance Cameras in outdoor locations where connection to an electrical grid is not available.” The V5 CAP and Pelco Sarix Professional IP Surveillance Cameras combo can be deployed in under 30 minutes, providing security in areas once deemed impossible due to the lack of power and connectivity.
As part of Johnson Controls continued commitment to providing customers with the most advanced and innovative solutions, the company is introducing Magos Systems perimeter protection radar to the North American commercial security market, which will be showcased at ASIS International’s 63rd Annual Seminar and Exhibits in Dallas, TX. This radar technology is suitable for a wide variety of security applications and can be implemented in facilities ranging from oil & gas production sites, utility substations, campus environments, ports, to smaller sites such as data centers, warehouses, car lots and construction sites. Cost Efficient Perimeter Protection Solution While radars traditionally were affordable only to governments, militaries, and highly budgeted entities, now Magos can provide a cost-effective solution to commercial security clients, that is simple to implement and works in all weather conditions. The cutting-edge technology helps reduce false alarms, cut down on the number of security cameras and eliminate the need for constant monitoring. “We recognized a need from our customers in North America for a low cost and effective perimeter protection solution,” said Joe Oliveri, Vice President and General Manager, Security, Johnson Controls’ Building Technologies & Solutions, North America. “After carefully examining options for superior perimeter protection solutions, we determined that Magos offers the most robust and lucrative technology and can become a game-changing offering. Johnson Controls teams evaluated the system through a series of customer-pilots for over a year, and results exceeded expectations. We are confident this revolutionary product will improve the efficiency of security systems for our customers.” Real-Time Detection Drexel University, a leading global research university located in Philadelphia, Pennsylvania was looking for ways to mitigate risks and deter unwanted visitors on their sport fields. “We are always looking for innovative efficient solutions to meet our security challenges and Johnson Controls introduced us to Magos to address perimeter protection issues,” said Joseph Spera, Director of Operations, Drexel Public Safety. “With our previous solution the area was vulnerable to unwanted visitors and damage, and real-time detection was impossible. With the new solution, including a Magos radar unit and a PTZ camera, we are notified of breaches as they occur and are now able to effectively deal with issues and mitigate risks, dispatching patrol when needed.” The reselling, distribution and integration agreement with Magos emerged from Johnson Controls Open Innovation, a program launched to foster collaboration between the company, customers and cutting-edge technologies by startups.
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of transmission and communication networking equipment, has introduced a new Cybersecurity feature in its latest generation of self-managed switches. The ComNet Port Guardian feature has the capability to physically disconnect a port if unauthorized access is detected. ComNet Port Guardian The value in Port Guardian comes in situations where network access is attempted by disconnecting an IP addressable device on the edge to connect to the network. When Port Guardian senses the disconnect, an SNMP notification is sent to the head end and the effected port is physically locked out, preventing access. The network administrator can reopen the port when the threat is eliminated. This feature also thwarts access through “Spoofing” by disconnecting the port as soon as an interruption is sensed. This new feature is being added to the newest generation of ComNet SMS products including the CNGE2+2SMS and CNGE4+2SMS. The feature will also be available on the new ComNet USA-made Managed Switch line. According to Andrew Acquarulo Jr., ComNet CEO, and President, “Unauthorized access issues or Cybersecurity is a critical challenge facing every network manager today. Your security network with its accessible outside connection, is an easy way to bring down your network. Cybersecurity is not something confined to just a security IP network. Any network can be infiltrated. By introducing this valuable feature on these cutting-edge products, we can provide another unmatched advantage to our partners.” “ComNet’s goal from day one has been to be a smart and secure choice for transmission products. Our position is that if you are concerned about the long-term success of your application, choosing ComNet ensures it will be,” said Skip Haight, ComNet VP of Marketing. “Port Guardian is another reason ComNet continues to move ahead of our competitors,” Haight continued. ComNet offers an extensive line of fiber optic, copper and wireless video and data transmission equipment that is uniquely designed to meet the needs of the Security, Intelligent Transportation System, Utility, and Industrial markets.
HSI Sensing is one of the five companies worldwide to achieve UL 634 Level 2 listing HSI Sensing, an Oklahoma-based manufacturer of custom reed switch and sensor technology, announced its Sentinel high-security entry-point sensor has been UL 634 Level 2 listed, placing it among an elite group of security sensors capable of monitoring highly sensitive areas. HSI Sensing is one of only five companies worldwide to achieve the UL 634 Level 2 listing.“We are very excited to announce the availability of Sentinel,” said Ryan Posey, CEO of HSI Sensing. “By using Hall effect technology, we were able to develop a new and unique product that meets all the needs of the high-security industry. Sentinel is an innovative product intended to be a door contact or entry point sensor useful in a wide range of security applications, for monitoring everything from bank safes to doors in government facilities.”Sentinel Entry-Point Sensor “We are very excited to announce the availability of Sentinel” Sentinel is designed with a wide range of anti-tamper features that allow it to resist physical, electrical and magnetic tampering, all in a package 50 percent smaller than comparable sensors, while still offering adaptive digital processing. At the core of Sentinel, multiple Hall sensors detect the actuator’s magnetic field in the x, y and z axis. Most security sensors only detect the presence of a magnetic field. Sentinel can detect small changes in the magnetic field caused by other magnets or movement from the actuator. This technology makes Sentinel ideal for monitoring highly-sensitive areas, including Sensitive Compartmented Information Facility (SCIF), financial institutions, data centers, military facilities, prisons, power grid facilities, airports, seaports, and other high-level secure applications.UL 634 StandardUL, an independent safety science company, introduced its UL 634 as the standard for all connectors and switches for use in burglar-alarm systems. It is the standard for SCIF intrusion detection systems for the government intelligence community, which has a preference for Level 2 devices. The UL 634 requires 40 standards be met to be listed, an additional eight testing criteria to achieve Level 1 and another eight requirements to achieve UL 634 Level 2. These eight requirements for Level 2 include passing a switch assembly removal test, a magnetic field compromise test, and an extended endurance test.Sentinel is offered in two variations, with a rear-exit cable and side-exit, metal jacketed cable. Every Sentinel sensor includes a recessed tamper plate, actuator, mounting hardware, and security screws. It’s aluminum housing can be anodized in a limited number of colors to help match the entry point it is monitoring.
Acquisition brings state-of-the-industry capability to McRoberts’ clients and adds expertise in certain specialized vertical niches to USA portfolio U.S. Security Associates (USA) announced the acquisition of McRoberts Protective Agency, Inc., the oldest security firm in America and a venerable brand synonymous with quality and innovation. The acquisition brings state-of-the-industry capability to McRoberts’ valued clients and adds expertise in certain specialized vertical niches to the USA portfolio. Richard Wyckoff, President and CEO of U.S. Security Associates commented. “We are excited to bring McRoberts Protective Agency into the fold. McRoberts has a core competency in superior customer service and forming partnerships with their clients to deliver customized security solutions. This acquisition supports our strategy for growth and strengthens our presence in multiple strategic markets.” “McRoberts is renown in the industry for their maritime knowledge and industry advancements. This provides a great national opportunity for our company to further augment in-house maritime capabilities,” stated Alton Harvey, Senior Vice President of National Accounts of U.S. Security Associates. “Our comprehensive training academy already includes a rigorous training and certification program to ensure our security officers meet the federal and international requirements set forth by the Maritime Transportation Security Act (MTSA) and the International Ship and Port Facility Security (ISPS) code.” Meredith McRoberts, fourth-generation CEO and majority shareholder of McRoberts, said, “U.S. Security Associates (USA) is clearly the best security company in the industry today and we are thrilled to be able to offer our external and internal clients USA’s capabilities and opportunities. McRoberts has always been committed to delivering maximum value to our stakeholders and this move is consistent with that commitment.”
INTREPID is designed for the protectionof fence lines, open areas, gates,entryways and rooftop applications Southwest Microwave will showcase a range of performance enhancements to its INTREPID™ Model 316 Digital Microwave Link at Transport Security Expo in London next month, highlighting the sensor’s expanded intrusion detection capabilities, nuisance alarm resistance and ability to withstand physical and cyber-tampering or environmental extremes. Superior Beam Control First introduced over a decade ago and successfully protecting critical infrastructure and assets at many of Europe’s most security-sensitive sites, Model 316 now couples Southwest Microwave’s field-proven RF detection technology with its leading-edge INTREPID embedded digital signal processing (DSP), maximizing the sensor’s ability to discriminate between legitimate intrusion attempts and environmental disturbances or other false targets. Designed for the protection of fence lines, open areas, gates, entryways and rooftop applications, this advanced, all-weather, CE-rated volumetric sensor has a 122-meter detection range and operates at K-band frequency, enabling detection of slow-moving intruders and limiting susceptibility to interference from external radar or other microwave systems. Unique parabolic dish and antenna design assures superior beam control and predictable Fresnel zones, further enhancing probability of detection (PD) and low nuisance alarm rates (NAR). “The sophistication of Model 316’s signal processing to classify disturbances positions this sensor as far superior to any other microwave technology on the market today,” explained Martin Lomberg, Southwest Microwave’s European General Manager. “Features like enhanced crawl or vehicle detection and unique Fresnel suppression algorithms enhance performance in challenging environments, letting the end-user most successfully mitigate risk of site compromise while preventing nuisance alarms.” Suitable For Security Sensitive Sites Offering maximum protection against sabotage, Model 316 is an ideal detection solution for security-sensitive sites such as critical utilities, correctional facilities or government / military installations. Heavy duty components and packaging, integrated radome tamper switches and optional steel enclosures for external wiring and connections prevent physical abuse. Integrated EMI/RFI shielding protects sensor electronics against external electromagnetic or RF interference. The sophistication of Model 316’s signal processing to classify disturbances positions this sensor as far superior to any other microwave technology on the market today “To address the needs of our most security sensitive customers, this sensor’s standalone configuration and on-board relay alarm outputs for monitoring of alarms eliminate the risk of hacking or other digital compromise faced by networked devices,” Lomberg explained. Model 316 features 6 crystal-controlled, field selectable modulation channels with narrow band filtering, preventing interference between sensors. Units can be dual, triple or quad stacked for ultra-high security applications. Simplified Set-Up User-friendly Installation Service Tool (IST) software simplifies sensor set-up, and graphically controls and monitors sensor status, control parameters and signal strength with laptop convenience via optically-isolated, surge protected USB-B connection. “All of our INTREPID solutions offer a unique feature set relative to competing technologies in terms of ease of use, consistently repeatable performance in maximising intruder detection while minimizing nuisance alarms, and ability to withstand tampering or climatic extremes,” said Lomberg. “Our enhanced Model 316 is no exception. As a standalone digital sensor with high PD, low NAR and superior protection against physical or digital compromise, it is an exceptional high-security solution for our customers.”
Sea ports have a long tradition of handling important cargo, including equipment for oil and gas fields. These critical sites require complex security to protect vulnerable areas such as storage locations and unloading areas, as well as monitoring the surrounding waterways for emergency situations. Often, upgrading these sites with a future-proof security system can prove challenging, as there are likely to be expansive legacy systems in place. New systems may also need to be integrated with security and surveillance systems in the surrounding area. This study from FLIR Systems explores how the right VMS, coupled with an appropriate range of hardware components, can meet the challenge of providing a scalable, fully integrated and comprehensive video surveillance system in a harsh coastal port environment. What's Inside? Coastal port security requirements Scalable VMS Hardware integrations Control room performance Evidentiary-class video quality Public safety Click here to download the White Paper now!
Joining Pelco in late 2015, Sharad Shekhar is responsible for the entire global video business and is leading the charge to reinvigorate the Pelco brand with system integrators Back in the day, you literally couldn’t speak with a security company about a video surveillance project without the Pelco name coming up. It had a loyal following and an extremely large installation base. Over the years, that changed and the fervour with which integrators referred to the brand seemed to wane. Sharad Shekhar, Chief Executive Officer of Pelco, wants to change that, as he explains in this exclusive interview. Shekhar joined Pelco, a fully owned subsidiary of Schneider Electric, in October 2015. Based at Pelco headquarters in Clovis, California, Shekhar is responsible for the entire global video business. He has more than a decade of global business and technical knowledge, as well as a proven track record of increasing revenue growth and adaptability in highly competitive markets. Extending Pre- And Post-Sales Support To Systems Integrators SourceSecurity.com: Tell me about how Pelco plans to reinvigorate this iconic brand with systems integrators? Shekhar: Pelco by Schneider Electric is well regarded for its world-class service and support network, and our partners thrive with the backing of our strategic business and marketing services. Pelco will continue to enable the success of systems integrators through the delivery of our innovative product lines that ensure customer satisfaction and open doors to new business opportunities. The team at Pelco is strong,and I fully intend to leveragethe knowledge and expertisethat we have in ourorganization to deliver on ourgrowth aspirations Recently, Pelco has undergone significant transformation to streamline the development of these innovations, but we haven't forgotten that at the core, our products help enable integrators to support existing clients while helping new customers realize the full potential of the Pelco product line for their security needs. We have made significant organizational changes and process efficiency improvements that will help enable us to deliver world-class, pre- and post-sales support to our integrators and customers. SourceSecurity.com: What is your background and how/why do you feel you are a good fit for this endeavor? Shekhar: I joined Pelco from Cummins, another very technology-focused company, and more specifically, brought the experience of having worked in both the North American and Asia Pacific markets. I understand and possess the skills required in negotiations and to establish new efforts and develop technology, to oversee operations and to increase sales. I have significant experience in strategy, business development, alliances and joint ventures, sales, finance and operations management. I have also successfully led businesses through similar challenges as Pelco faces in the coming years in terms of bringing the right technology to market, building a strong product and alliance portfolio, and growing revenues and profits in an increasingly competitive landscape. Because of this, I can bring the same principles that were employed in other technology sectors to security and Pelco by Schneider Electric, because I understand the importance of producing reliable, flexible and cutting-edge solutions that keep the customer top-of-mind and meet the expectations they set forth. But it would be remiss for me not to mention that this is a team sport, and the team at Pelco is strong, and I fully intend to leverage the knowledge and expertise that we have in our organization to deliver on our growth aspirations. For video surveillance, integrators look for a high value for end users through areduction in upfront hardware and camera costs, with more high-resolution imagery Opportunities For Systems Integrators SourceSecurity.com: What do you currently know about what systems integrators are looking for in the field as far as video surveillance solutions? What's important to them and their end-user customers? Shekhar: Today's systems integrators are asked to push the envelope in regards to meeting customer needs for superior products while keeping ROI and scalability top-of-mind. For video surveillance, integrators look for a high value for end users through a reduction in upfront hardware and camera costs, with more high-resolution imagery. On the VMS side, they're looking for open architecture that allows integration with other major systems and an intuitive design that helps streamline deployment and administration. Customer feedback and demand helps Pelco address specific needs while designing security platforms that are scalable and flexible, as well as able to drive new levels of awareness for security and business intelligence. Our new technical support and customer engineering organization will work more closely with our integrators and provide them the backing they need to be more responsive and “creative” in terms of how we respond to varying customer requirements and tailor our products quickly to their needs. Implementing Strategic Security Management Policies SourceSecurity.com: What else might we see in the near future? Shekhar: Pelco has made significant investments in key vertical markets, including oil and gas, gaming and casinos, Safe Cities, and airports and seaports, and we will see significant focus on product and business development in these markets. We will look to further engage customers in these spaces by focusing not just on products, but on solutions that will solve security and operational challenges. Our new Advanced Technology and Engineering organization will focus on conceptualising and incubating technologies that will provide differentiation and value to our integrators and end users in these critical verticals. We will also engage in significant corporate development activities for strategic partnerships on the technology and channel side to reach our objectives. Video surveillance is only one part of a comprehensive security strategy, and moving forward, Pelco will help its partners think bigger by implementing strategic security policies and processes, and effective security personnel training and staffing. When these processes are combined with video surveillance and security management technologies, customers can develop a more holistic, proactive approach to security and emergency response. And that's what we hope to do more of in the future. Overall you will see Pelco as a much more open and engaging organization as it relates to our relationships with our industry, suppliers, technology and channel partners.
UK citizens will vote on June 23rd 2016 on whether to remain within the European Union A significant aspect of the four-month operation leading to the capture in March of Salah Abdeslam, Europe’s most wanted man, is that French and Belgian police worked alongside each other with minimal protocol complications since the countries are not only geographical neighbours but members of the European Union. Abdeslam was arrested for his alleged involvement in the Paris attacks of last November. Joint Operations Between UK And European Security Forces On June 23rd (with a touch of congruity for our sector since it’s the last day of IFSEC) UK citizens will vote on whether to remain in the European Union. Nobody should ignore the fact that the Union is an economic community and began as a common market for trade in coal and steel. And yet, suggesting that the outcome of the referendum is anything other than crucial for physical security in Europe would strike most observers as naïve. Prime Minister David Cameron has weighed in on the possible consequences: “When it comes to terrorism, when it comes to security, when it comes to our borders, we are better off, we are stronger inside a reformed EU.” Certainly the recent bomb attacks in Brussels underline concerns about terrorism throughout Europe. French President Francois Hollande also warns: “I don’t want to scare you, I just want to say the truth – there will be consequences.” Of course it would be overstating the case to suggest that a "Leave" vote will bring an end to cooperation between UK security forces and European counterparts since police forces first began sharing information (though not necessarily resources) when Interpol was formed in 1923. The European Union is not the only backdrop to these matters, and the UK is currently tackling people smugglers by sending amphibious vessels to the Aegean Sea between Turkey and Greece in a NATO (as opposed to EU) initiative. Such joint exercises would continue even after an “Out” decision on Brexit. Tightening Border Control Security Measures However, the whispers from Paris on the security ramifications of a departure by the UK are teetering between ominous hints and naked threats. Currently, Britain is allowed to have its own border control officers at major French ports such as Calais and, as a reciprocal measure, French-run passport control is the first checkpoint you reach when taking your car to France from Dover. This arrangement is in fact the result of a bilateral treaty dating from 2003 and nothing to do with the European Union, but Monsieur Hollande has already made it clear that should my compatriots vote “Leave” then this cosy entente cordiale will become toast or “pain grillé.” With even responsible liberal-leaning media outlets reporting that the Calais “Jungle” transit camps contain would-be jihadists, it seems that UK security is under immediate threat. As security professionals, we all subscribe to the “layered protection” principle. If Dover and other ports on the English side of the Channel become our first opportunity to scrutinise people then border control is clearly weakened, and the Brussels attacks emphasize the need that it be strengthened. The recent bomb attacks in Brussels and Paris have heightened concerns of terrorism. What ramifications would Brexit have on security cooperations in Europe? Other Security Issues Of Brexit Unity usually produces strength, and UK voters may want to heed US General Philip Breedlove, senior NATO commander in Europe, who now believes that Russia and Syria are “weaponizing” the possibility of terrorists posing as refugees or economic migrants in order to destabilise Europe. Surely at a time when there is a credible threat of this magnitude, UK voters should forget the clichéd contentious trade issues such as farming subsidies and alleged “wine lakes” and “butter mountains?” The prospect of Vladimir Putin and Bashar al-Assad joining forces in this manner is more worthy of our immediate attention and should be a factor as voters debate where to put their X on the ballot slip come June. This article has begun with the macro issue of border control and national security. There is a raft of additional subjects to be considered. Major topics will be international legislation on location of CCTV cameras, regulations on retention of footage, collection of biometric data and the sharing of information between EU and non-EU states. There is also the small matter of a £1.5bn Anglo-French drone project that may create the next generation of unmanned combat aircraft. Repercussions Of A "Leave" Note On Security Powerhouses A “Leave” vote would undoubtedly produce economic uncertainty, but our sector would hardly be alone in this. One footnote, however: the UK will go to the referendum polls as a single country but a “Leave” vote may hasten a split into two. If the decision is to leave but a totalling up of votes in Scotland shows that the Scots wish to stay in Europe, then the Scottish Nationalist Party will demand another chance to devolve and then become a European Union member state. England and Wales will face the prospect of security powerhouses such as IndigoVision and Veracity being part of a separate economic territory. A vote to leave would not produce the mare’s nest you might expect in terms of certifying products and documenting working methods. CE markings certify compliance with EU legislation but make no claim as to point of manufacture. Similarly, our industry’s increasing use of International Standardization Organization (ISO) practice to show responsible quality control and concern with environmental impact will be unaffected by the referendum vote. The ISO has no affiliations with the European Union, pre-dates it having been formed in 1947 and is based in Switzerland, which is not an EU member and unlikely to become one anytime soon.
The reason for long lines at U.S. airports is that the airlines now charge fees for checked bags. It’s as good an explanation as any of why airport passenger screening lines suddenly and mysteriously grew out of control during May (and then became manageable again in June). It’s not the only explanation floating about – there’s plenty about high travel volumes, Transportation Security Administration (TSA) personnel shortages, etc. etc. – but it’s the one that appeals to the disgruntled traveler in all of us. In the absence of definitive answers, why shouldn’t two of the biggest gripes we all have with air travel – luggage fees and long security wait times – be a case of cause and effect? I acknowledge the oversimplification. However, in addition to its obvious appeal, the explanation also has a germ of truth, and skipping past the details, it’s the government’s fault! US Government Negligence Towards TSA Officers Specifically, the U.S. government has levied a 7.5 percent excise tax on airplane ticket prices. However, the tax doesn’t apply to baggage fees. In effect, there is an incentive for airlines to lower ticket prices (subject to the tax) and implement or raise baggage fees (which are not) to offset the reductions. The approach gives travellers a specific incentive (say, $25) to carry their bags onto the plane rather than check them before going through the screening area. More bags clog up the operation, thus delaying airport screening. Absent the federal tax, it makes sense to “bundle” the charges into a higher ticket price rather than charging separately. Hence the argument: It’s the government’s fault! Experts say a roughly 10 percent reduction in screening personnel has coincided with a 15 percent increase in passenger volume, contributing to the recent crisis There are other possible explanations that are also the government’s fault, from not enough overtime pay for TSA-employed screening officers, to insufficient staffing of screening checkpoints. The leader of the union that represents TSA officers says Congress has “starved TSA of the resources it needs to meet growing demands at our nation’s airports.” Experts say a roughly 10 percent reduction in screening personnel has coincided with a 15 percent increase in passenger volume, contributing to the recent crisis. Nobody likes to wait two hours (or more!) in an airport screening queue, which was the unfortunate situation that flooded news reports during much of May. Attempted Solutions Add To Airport Security Check Delays And some of the proposed solutions seemed to contribute to the problem. For example, a new automated technology – so-called Innovation Lanes – provides expedited screening processes and promises to move passengers through the system more quickly. However, it was the installation of the new equipment at a security checkpoint in Atlanta (during which the checkpoint was closed) that contributed to some of the more extreme wait times in May. Another proposed solution is the TSA PreCheck lanes, where prescreened passengers get to speed through wearing their belts and shoes. But fewer than the projected number of passengers opted to pay the $85 fee for the program, and some observers have suggested that resources devoted to screening PreCheck passengers could do more overall good if reassigned to screening the masses. “I got here two and a half hours before my flight, and security took two to three hours to get through,” one traveler recently told a TV station in Chicago. In March, TSA Administrator Peter Neffenger said wait times had nearly doubled over the previous year. Not to mention reports of data showing that TSA agents fail 95 percent of security tests involving passing weapons through security. For now, the problem seems to have abated, and airport and TSA officials were congratulating each other all around after average wait times improved drastically over the Memorial Day holiday weekend. A new TSA 10-point plan (more officers, overtime, canine teams, etc.) is being implemented. But what about the upcoming busy summer travel season? We may not have seen the end of those long security wait times…
Rasilient Systems, Inc., the pioneer in forensic-grade video surveillance systems, has completed Phase II of the video surveillance system upgrade at Fairbanks International Airport (FIA) in Alaska. Phase II at FIA continued the installation of modern video surveillance for the airport to meet the stringent demands needed to provide safety and security for the thousands of passengers FIA serves daily. FIA is a state-owned, public-use airport that averages more than 328 aircraft operations each day. The Phase II video surveillance deployment includes Rasilient server and storage technology that facilitates distributed IP megapixel camerasThe Phase II video surveillance deployment includes Rasilient server and storage technology that facilitates distributed IP megapixel cameras; recording transmission and storage of forensic-based, high-quality video signals; comprehensive live viewing and playback; utilization of purpose-built/designed digital IP networks; and intelligent processing of archived video, said Rasilient Director of Strategic Sales Engineering Dr. Edward Wassall. Increased Support For Surveillance Cameras “These are key components that have the major video surveillance system requirements of scalability, video quality and reliability that FIA sought to implement when they chose to upgrade their security system,” said Dr. Wassall. “This current upgrade increased the number of supported video surveillance cameras as well as the efficiency associated with the management related to storage.” Phase I, completed in the summer of 2018, included the initial deployment of Rasilient’s forensic-grade series video surveillance servers and storage. Rasilient’s purpose-built server and storage products provide a video surveillance system infrastructure designed to deliver reliable and continuous video surveillance with exclusive No Frame Drop (NFD) technology that eliminates recording gaps. Enhancing Visibility And Storage Capabilities The Rasilient system has allowed FIA to meet the needs of today as well as to provide scalability for our future needs"FIA Building and Security Representative Dana Bowen said their primary decision to upgrade the multi-camera airside and landside video surveillance system was to enhance visibility and storage capabilities. The Rasilient system has allowed FIA to meet the needs of today as well as to “provide scalability for our future needs,” said Bowen. “We are really very happy with the new airport forensic enabled storage system,” said Bowen. Small, medium to large enterprise deployments are supported by Rasilient products and technologies, and they have been deployed worldwide to protect museums, government institutions, airports, seaports, military contractors, financial institutions, educational establishments, stadiums, and residential complexes.
Milestone Systems, a provider of video management software (VMS), is the chosen solution for protecting the Port of Antwerp, the second largest seaport area in Europe, covering more than 12,000 hectares, the equivalent of 20,000 football fields. Large areas like ports are very difficult to secure in a traditional way. Reporting incidents using only radio communications can lack information at an optimal level of detail and accuracy. It takes time for responders to reach incidents. Analog video solutions have issues with very long distances, meaning video amplifiers must be used which lead to fragile and inflexible infrastructure. Milestone XProtect Corporate and XProtect Smart Client have enabled the port authorities to establish a central control center with a consolidated view of the harbour. This enables rapid and relevant response to incidents, reducing the impact of incidents on assets and persons. Milestone steps in to ensure that this business-critical system in the port receives a high level of supportOpen Platform Technology The open platform technology pioneered by Milestone combined with the solution power of the Milestone Partner Community enabled the Port of Antwerp to choose the perfect infrastructure components and cameras for their challenges. Lenovo, Dell and multiple camera partners are elements of the solution. Thanks to the usability of network video, the port can utilize Milestone open platform for solutions that augment the already rich functionality of XProtect VMS. In addition to the infrastructure, the Port of Antwerp is taking advantage of Milestone Care Premium. Milestone Care is a complete suite of operational maintenance and support services grouped into four different packages, enabling Milestone customers to choose the support coverage that fits their exact need, now and in the future. With the chosen level of support, Milestone steps in to ensure that this business-critical system in the port receives a high level of support. Advanced Security Installation Furthermore, Milestone Professional Services has also been in play for this advanced installation, to guide and counsel the port on the best capabilities of the open platform VMS. This consultancy service ensures the port can adapt and expand this system as needed for an ever-expanding, always relevant surveillance solution. “We are extremely pleased to have been chosen by Port of Antwerp for their video safety system,” says Michaël Fontaine, Country Manager Benelux, Milestone Systems. “This is a clear testimonial to the solution power of XProtect and our open platform partner community. This has already been proven in a number of other ports worldwide, and now in the modern Port of Antwerp.”
Mirasys offers the possibility to increase productivity and savings with powerful connectivity to other systems Mirasys Video Management Solutions are being utilized in a number of transport projects which include ports, motorways, airports, trains and logistic centers. Each project needs a highly adaptive solution which adapts to changing requirements, technologies and regulations, and provides unlimited scalability and high reliability. Mirasys VMS Increases Efficiency The transportation sector provides a great example of how an intelligent video management system can increase the efficiency of activities, safety, and ensure smooth-running operations. Mirasys offers the possibility to increase productivity and savings with powerful connectivity to other systems. Mirasys VMS includes a number of intelligent features. Playback and powerful search tools identify incidents quickly and efficiently. The intuitive storyboard function helps in reporting events and incidents and high quality images can be used for evidence. Advanced motion detection and alarm event settings let you decide what you want to track; reducing operational costs and the number of false alarms. Mirasys Video Content Analytics Mirasys VCA (Video Content Analytics) provides full VCA functionality with object classification and enter / exit, direction, vehicle speed, stopping, dwell time, etc. filtering. The setup is versatile and supports, for example, different type of vehicle classification, zone definitions, entering directions and vehicle speed. You have plenty of different analytic alternatives available per camera. The object that is being analyzed can have several different analysis rules active simultaneously. The ingenious use of cameras and analytics increases the flow of cargo, luggage and passenger traffic. You can, for example: Tighten platform security Improve crowd management Identify people and any unusual behavior such as running Identify abandoned objects Manage queues and staffing level Control the number of vehicles in the area Vast Integration Possibilities With Mirasys and its endless integration possibilities, you can speed up the logistic center’s functions, transport management efficiency, and ensure the undisturbed flow of cargo operations. The use of Mirasys integrations will increase the value of visual information captured by the system, and bring significant cost savings. The information from video images can be linked to the information received from other sensors, also enabling the utilization of IoT (Internet of Things). Different organizations can use the same Mirasys system to manage their part of the surveillance and security, but each party has its own rights When integrating a bar code reader with the video management system in a warehouse, the movements of each package can be searched and visualized. The images from cameras can be found immediately, which helps to determine the condition of the package at the time of entering and leaving the warehouse, and on which vehicle it is located. For each and every event, the system provides the exact time, visual information from a number of different cameras, and delivers event reports to specified recipients. This results in a clear decrease in the time spent in resolving customer complaints. Automatic License Plate Recognition With the Mirasys ANPR+ (Automatic License Plate Recognition) application you can automate the management and guidance of the vehicles in a certain area. For example, based on the license plate information the system can advise: Which loading bridge the vehicle is assigned to, Which driving lane the vehicle is assigned to, Driving through automatic weight-in-motion (WIM) is needed, etc. The system can monitor the vehicle on its way in and out, film it from the side, top, front and back and is therefore a great solution for vehicle damage control. Using integration to the automatic weight-in-motion (WIM) function you can also ensure automatically that the amount and type of product loaded on the vehicle is correct. In harbors and airports different entities, such as Security, Police and Customs, need different information from the same system Automate Operations With The ANPR+ A forwarding company can book a space for its truck from a shipping company’s ticket selling system. When the truck arrives at the shipping company’s area, for example in a harbor, it is automatically measured, and if the measurements match the ticket, the truck is guided to the green lane. If the measurements deviate from the ticket data then the truck is guided to the ticket window lane. The measurement information will be sent automatically to the system optimizing the ship loading. If a vehicle exceeds its allowed time to stay in one place, or deviation from the planned route of the vehicle is detected, the system will report an event. In harbors and airports different entities, such as Security, Police and Customs, need different information from the same system. Different organizations can use the same Mirasys system to manage their part of the surveillance and security, but each party has its own rights; simultaneous users are no problem. Information from different sources flows automatically between organizations, resulting in faster response times on investigations, and increasing the performance level considerably in handling the joint security issues. Decreased Total Cost Of Ownership Mirasys is an industry-recognized Video Management System provider. Limitless integration possibilities of the Mirasys VMS offers the freedom to build the system that serves your needs. Mirasys also gives you the freedom and possibility to connect several sites into one logical entity. The centrally managed Mirasys system allows you to add or remove cameras and servers, set users’ rights, manage live and recorded video and export evidence with a few simple clicks. The system can have centralized, de-centralized or mixed topology configurations.
The Port of Wilmington, which opened in 1923 and handles nearly 400 vessels and 4 million tons of cargo each year is the busiest port on the Delaware River, and the leading North American importation site for fresh fruit, bananas and juice concentrate. It was also the first seaport to use the Transportation Worker Identification Credential (TWIC) card, beginning with the TWIC Technology Phase pilot program in October 2003. TWIC is designed to add a layer of security at ports by ensuring that workers in secure areas have received a background check and do not pose a national security threat. As the TWIC program expanded as part of the Maritime Security (MARSEC) criteria, so did the need for a software program that could read and record information from both the existing TWIC protype cards used with the port’s physical access control system and the latest TWIC cards. In addition, it was important to find a solution that would allow the port to access the Transportation Security Administration’s (TSA) ‘TWIC Canceled Card List’, a real-time database of unauthorized TWIC users, so port security personnel can quickly identify those with revoked rights. Port officials chose HID Global’s pivCLASS Registration Engine software, which drives the Datastrip mobile readers and also resides on a desktop enrolment workstation in the port’s main office pivCLASS Registration Engine Software recognizing this need, Port of Wilmington officials began exploring their options for software that could work with their existing Honeywell security management platform, Pro-Watch and work on mobile card readers to deploy the enrolment process throughout the facility. Port officials chose HID Global’s pivCLASS Registration Engine software, which drives the Datastrip mobile readers and also resides on a desktop enrolment workstation in the port’s main office. An additional license for certificate management allows the port to re-validate TWICs each day, once they are enroled with the Honeywell system. Operational With Datastrip’s DSV2+Turbo Mobile Card Readers Before the Port of Wilmington became a pilot site for the TWIC smart card program, it relied on 125kHz proximity cards and readers for worker identification. With the advent of TWIC compliance standards, port officials needed a way to register TWIC cards with their existing Honeywell Pro-Watch physical access control system and enter cardholder data into their database that would merge both TWIC and existing ID cards. With this merger, the port would need only one card for the access control system. It was also important to be able to enrol TWIC cardholders at the various access points to the port, which spans 307 acres of land. Therefore, the software needed to be functional with rugged mobile card readers, such as Datastrip’s DSV2+Turbo. TWIC credentials are required for entry to the port by anyone requiring frequent, unescorted access to the facility that is entirely designated as a secure and restricted area Finally, Port Security wanted the ability to access the TSA TWIC Canceled Card List and match it against those being enroled in the Port’s database as well as those using their TWIC cards. This would allow Security to take the appropriate steps when necessary, such as suspending a card, identifying people who were already enroled in the Port’s database and not double enroling them, or spotting a potential terrorist. TWIC Credentials For Entry To The Port By using pivCLASS Registration Engine, which was deployed on mobile Datastrip readers as well as a desktop computer, port officials are now able to register TWIC holders throughout the port and transmit that information to the Pro-Watch system. These cards can then be read at the fixed card readers located at various entrances and access points throughout the port. TWIC credentials are required for entry to the port by anyone requiring frequent, unescorted access to the facility that is entirely designated as a secure and restricted area. These include longshoremen, truck drivers, surveyors, agents, chandlers, port chaplains and labourers who access secure areas. Tenants who have their offices at the port, such as produce giants Chiquita and Dole, are also required to be enroled in TWIC. Integrated With Existing Access Control System Patrick Hemphill, retired Manager, Port Security and Facility Security Officer at the Port of Wilmington who lead this project said the mobile readers have been taken to local union halls to enrol longshoremen before they arrive at the port. “This saved us a lot of time,” explained Hemphill. “We met with union leaders and set aside two, two-hour periods on pay days. The members were made aware of the need to know their PIN and we were able to enrol the majority of (union) members during those two days without interrupting their work schedule.” After seeing a demo of the software, and its ability to read TWIC card information, Floyd-Kennard recognized it as a possible solution that could be integrated with the port’s existing access control system pivCLASS Registration Engine first came to the attention of Port of Wilmington’s Director of Human Resources, Sylvia Floyd-Kennard during an American Association of Port Authorities conference. After seeing a demo of the software, and its ability to read TWIC card information, Floyd-Kennard recognized it as a possible solution that could be integrated with the port’s existing access control system. Testing The Software In-house Eric Schaeffer, President of Advantech Inc., the port’s systems integrator on the TWIC project, said one of the deciding factors in using this software was the ability to test the software in-house before making a commitment. He wanted to ensure that it would integrate with the existing Pro-Watch system. “Some companies have reservations about testing before buying,” Schaeffer noted, “but HID Global was confident in their product and were comfortable with us testing it.” Since this was one of the first implementations of pivCLASS Registration Engine software integrated with the Honeywell Pro-Watch system, Schaeffer said HID Global worked alongside Advantech to make sure everything worked as planned. Registering TWIC FASC-N Number And Expiration Date For a major facility such as the Port of Wilmington, being able to enrol TWIC holders and verify their information anywhere using a mobile card reader results in a savings of security personnel, time and effort. Personnel can go where the enrolees are, rather than requiring everyone to come to a central location. The port is also able to continue to leverage its legacy physical access control system while adding in the important TWIC component. The pivCLASS Registration Engine software allows the port to register TWIC information, such as the TWIC FASC-N number and expiration date, into the existing PACS cardholder record" “The pivCLASS Registration Engine software allows the port to register TWIC information, such as the TWIC FASC-N number and expiration date, into the existing PACS cardholder record,” said Geri Castaldo, vice president of Business Development, Federal Identity with HID Global. “If a new person is added, Pro-Watch automatically creates a brand-new cardholder record using the information from the TWIC such as first name, last name, FASC-N, expiration date and photo.” pivCLASS Certificate Manager Checking against the TSA TWIC Canceled Card List is a key benefit with the addition of HID Global’s pivCLASS Certificate Manager. The pivCLASS Certificate Manager goes out to the TSA list and re-validates the TWIC card status daily or on a user-defined schedule, so security personnel can see what has changed and react to the status of cardholders. In the case of an elevated threat level, HID Global’s software is able to provide the additional authentication piece that would be required. If the threat level at the port is raised under the three-level MARSEC system, it can the use required use of a fixed readers with a biometric component.
USS Iowa: A Naval Treasure Affectionately known as the “Battleship of Presidents” for having played host to more U.S. presidents than any other battleship, the USS Iowa is one of the most storied vessels in the history of the Navy. Originally commissioned in 1943, the Iowa saw significant action during both World War II and the Korean War. One of the battleship’s first missions was to escort President Franklin Delano Roosevelt across the Atlantic in November of that year for a critical meeting between the allies at the Tehran Conference, which was also attended by Soviet leader Josef Stalin and British Prime Minister Winston Churchill. In early 1944, the Iowa was sent to the Pacific Ocean theater where it would play a pivotal role in some of the key battles of the war. When the Empire of Japan officially surrendered aboard the USS Missouri in September 1945, the Iowa was also in Tokyo Bay broadcasting the ceremony to the world. The Iowa and her crew would continue to serve the nation for another four decades before being decommissioned for the last time in 1990. Given the ship’s rich legacy, it was eventually relocated to a permanent berth at the Port of Los Angeles in 2012 and converted into a museum. Visitors can now stroll along the decks of this American icon from a bygone age and get a firsthand look at the 16”/50 caliber guns that earned the Iowa its nickname of the “The Big Stick” as well as other historical artefacts on board the battleship. Of course, turning a vessel that stretches over 880-feet long and contains numerous rooms and compartments into a tourist attraction comes with its own set of unique security challenges. Security Challenges The job of securing the Battleship USS Iowa museum is the responsibility of Security Manager Michael Dahl, a former law enforcement officer who was asked to take over the full-time security operations for the museum following his stint as a volunteer aboard the ship. While the museum has yet to experience a major security event during its brief existence, the threat posed by trespassers after-hours or a visitor wandering off the beaten path is not lost on Dahl and the rest of the management team at the museum. However, aside from having a small number of consumer-grade, off-the-shelf security cameras placed in strategic areas, there was not any real video surveillance infrastructure to speak of on board the ship. That changed approximately one year ago when David Canfield, the museum’s vice president and CIO, who also happens to be a veteran of the high-tech industry, decided they needed to significantly upgrade the surveillance system and install a solution that would more adequately address the facility’s needs. Arteco and Arecont Vision donated the respective technology solutions for the USS Iowa project “We wanted to install cameras to monitor the exterior of the ship, particularly when we’re not open to the public, so we can monitor our gangways to see if anybody does try to access the area,” said Dahl. “Also on the inside of the ship, we wanted to make sure we didn’t have our visitors, as well as our crew members who are volunteers, getting off the designated routes and into areas where we didn’t want them. There are some sensitive areas where, if you don’t know what you’re doing, they could be hazardous.” Arteco’s VEMS Solutions After speaking with CV Reps, a local manufacturer’s representation firm, Dahl and the museum’s leadership team decided to install a system with the Arteco Next video event management software (VEMS) and a network of Arecont Vision cameras. Because the battleship museum is a non-profit organization, both Arteco and Arecont Vision donated the respective technology solutions for the project. A total of 11 high-definition IP cameras have been installed on the Iowa since the project got underway in mid-2015. At the beginning of 2016, Dahl was able to bring the Arteco software online and he has been extremely impressed with its performance. Leveraging the video analytics suite provided by Arteco Next, Dahl has been able to set up an alert within the VEMS client that notifies him when certain physical boundaries are crossed by people on board the Iowa. “With the Next software I’m able to configure alert areas after hours — so if anybody were to try to come on the ship it would alert me,” added Dahl. “We also have an alert for our cash-handling room just outside our vault that is set up so that anytime anybody goes through that door, it lets me know.” User-Intuitive Video Software Because Dahl, who has sole responsibility for running the surveillance system, is a relative novice when it comes to operating today’s surveillance technology, it was also important that the video software the museum deployed be user-intuitive so that he could bring himself up to speed quickly. After only a few hours of training on the Logic Next platform, Dahl was able to learn the basics of the software and familiarize himself with its more advanced settings. Arteco NEXT VEMS allows users to take full control of a video surveillance system from anywhere, quickly and easily. With NEXT’s specifically designed graphical interfaces, video retrieval, direct management of alarms, video analytics or access control events are made easy from the start. This enables users to focus on taking hold of the benefits delivered by the system immediately, rather than waiting for training. In the future, Dahl plans to deploy more cameras to keep the USS Iowa and its rich history secure. “I have several locations where I still want to deploy cameras; it’s just a matter of being able to procure them and deploy them as resources allow,” said Dahl.
Airports and ports are subject to a tough balancing act when it comes to security measures. On the one hand, these locations must maximize the movement of passengers and cargo to ensure a happy customer experience, while at the same time exercising security measures that will ensure their safety. Access Points In Transport Hubs Airports and ports are large areas with many access points, a necessity to facilitate the efficiency needed to handle the large volumes of traffic they generate. This accessibility is also their Achilles heel in the eyes of would-be terrorists, smugglers, and thieves. Herein lays the conundrum. People want to travel without fear of falling victim to attack, but security cannot be so invasive that it makes travel unpleasant. Vanderbilt’s solutions respond to the agility, adaptability, and dependability that this sector requires and facilitate free movement while allowing for effective safeguarding measures.Vanderbilt’s ACTpro is a PC-based access control system that eliminates the need for traditional keys, instead utilising cards and tokens to gain access Access Control Scenarios For ACTpro For instance, Vanderbilt’s ACTpro is a PC-based access control system that eliminates the need for traditional keys. Instead, it enables authorized individuals to use a card or a token to gain access to protected areas. Staff appreciate that the cards mean they need to carry fewer conventional keys and can gain prompt access to vital areas. If a tag or card is lost, it can easily be disabled by the system, ensuring a high-security level. So, what are some access control scenarios that ACTpro can provide against at airports and ports? To name a few, tailgating, hierarchy rights, and allowing for holding areas between doors. Coupled with ACT Enterprise software, ACTpro provides a vast array of integrations. Specifically, this can be used to provide unrivaled protection against ‘tailgating’ through interaction between badge systems and video surveillance cameras like Eventys. Vanderbilt’s Eventys provides quality images should a suspicious event arise that needs to be investigated. Hierarchy Of Acess Privileges The access status at airports and ports can vary greatly depending. For example, flight crew require different access rights compared to terminal retail staff, maintenance staff, or emergency staff. ACTpro, coupled with ACT Enterprise, can provide this strict hierarchy of access privileges based on seniority and job function. The ACTpro system also includes the ability to execute ‘airlock’ or holding areas between pairs of doors. This means the doors cannot be opened simultaneously except in emergencies when a supervisor activates an override. This function helps defeat concerted intrusion attempts. In addition, the software provides invaluable health and safety abilities for fire mustering.