Public sector security
Azena is announcing that it will host ESCON 2021, a free to all ecosystem conference for smart security stakeholders, on 2 December from 3-6 pm CET. Broadcast live from the BMW Welt, Munich’s iconic landmark, ESCON will bring together leaders in the AI video analytics space to discuss the future of Artificial Intelligence and IoT technologies in the security and safety industry. Actionable operational intelligence “The potential of AI, IoT and video analytics and the influence on t...
Traffic congestion and road accidents are the toughest challenges faced by traffic management agencies across the world. With rapid global urbanization, the growing amount and type of vehicles has led to more road-related issues every year. According to a MarketsandMarkets report, the global number of cars and commercial vehicles on the road will nearly double by 2040, putting tremendous pressure on the existing urban infrastructure. Traffic management strategies Various countries have formul...
With its major global Innovation Splash in November, MOBOTIX AG is placing 18 new hardware and software solutions on the market at once. New products The first hemispherical camera that combines infrared and LED white light in a single system is a major highlight. In addition, there is a new convenient dome camera, hemispherical modules, and Thermal CIF modules specially designed for perimeter protection for the MOBOTIX7 cameras with up to 105° wide angle of view (FoV). A fiber optic...
SALTO Systems (SALTO) has introduced the XS4 Original+, the next generation of the world’s most flexible and reliable smart locking solution that features a beautiful design, with a sleek flat reader in two new colors. SALTO XS4 Original+ The new SALTO XS4 Original+ takes the trusted and proven flagship XS4 Original electronic lock product family and incorporates the latest technology, to accommodate access control needs of both today and tomorrow. Our customers, partners and users rely...
Intersec, the globally renowned emergency services, security, and safety event, has announced that ex-MI6 Chief, Sir Alex Younger is one of the first announced international headliners, speaking for the first time in the UAE, as a guest speaker. Ex-MI6 Chief, Sir Alex Younger Alex Younger joined the United Kingdom’s Secret Intelligence Service (SIS), also known as MI6, in 1991 and served as a Diplomat and Undercover Operative. He was appointed Chief or ‘C’ of MI6 in 2014 and...
Due to the GPS in mobile phones, users live in a world where friends and family can track each other’s every move, mobile apps, and smart home devices to meet up, stay connected, and even watch one another make it safely home. But in an emergency, if a person calls 911 from a mobile phone, the operator likely has less information than a rideshare driver. Despite significant advances in technology that allows for the collection and sharing of geolocation information, few severely underfund...
Vismo announces the rollout of what3words location technology on its global location monitoring and safety platform, to help organizations respond to incidents more effectively - and keep their employees as safe as possible. Vismo provides a proven, since 2012, resilient location monitoring and safety service to businesses, public sector organizations, and NGOs, ensuring their traveling or remote employees can be located and protected while at work. It does this via the Vismo App, which is used by almost 0.5m customer employees worldwide, many in FTSE 100 and Fortune 500 companies. Using what3words addresses gives employees a simple way to describe, via the app, precisely where help is needed, enabling organizations to find and get resources to the scene faster. When a user presses the Red Alert or misses a Check-In on the Vismo App, administrators will receive an email and SMS notification with the details, including the what3words address. what3words in action Using what3words is useful in rural or unknown areas, where finding a precise location can be difficult" Craig Swallow, Vismo CEO, says, “Integrating what3words into our platform gives Vismo an extra edge in helping our clients and their employees. It gives administrators - those involved in the escalation process at the client end - a simple way of understanding the precise location of one or more employees. In an incident, it’s critically important to be able to convey information quickly and easily to administrators. Valuable time, and therefore lives and wellbeing, can be saved.” “Using what3words is especially useful in rural or unknown areas, where, using traditional means, finding a precise location can be difficult.” Swallow adds, “Emergencies, from a road collision in the middle of the countryside to an incident outside a sports or music stadium gate, can happen anywhere. In an emergency, identifying precisely where help is needed is key. The what3words approach to location identification uses a combination of three words that is unique to a location. ///kite.chats.dine, for example, is very useful to have – and is helping to save precious time, resources and lives every day."
RaySecur, a security imaging technology company with the world’s first DHS Safety Act-designated millimeter wave (mmWave) desktop scanner, for mail and package threat detection, announced that former Boston Police Commissioner, Ed Davis has joined the company’s Advisory Board. Ed Davis will leverage his decades of law enforcement experience, in order to help RaySecur accelerate adoption of its flagship MailSecur mail and package threat detection solutions. MailSecur scanners MailSecur scanners use safe mmWaves to see inside of objects. They can detect more and smaller threats than X-ray scanners, including explosives, weapons, radiation, and other suspicious contents, as well as liquids and powders at 300x the sensitivity of X-rays. Unlike X-ray scanners, there are no safety concerns or need for specialized training. Mail threat incidents have been increasing, with the United States Postal Inspection Service (USPIS) and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), responding to an average of more than 10 dangerous mail or package incidents each day, for the last three years. In the last 16 months, AstraZeneca’s COVID-19 vaccine plant, Subway Sandwiches’ corporate headquarters, and Dr. Anthony Fauci have all been victims of dangerous mail threats. Mail and package threat detection Mail and package threat detection is an underestimated and vitally important component of public safety" Ed Davis stated, “Mail and package threat detection is an underestimated and vitally important component of public safety, and I’m excited to join the Advisory Board of a company that offers the only safe and scalable solution for organizations and individuals, to combat this problem.” He adds, “It’s crucial that law enforcement, enterprises, correctional facilities and government institutions have access to this technology, and ensure they can seamlessly scan every package, in a quick and efficient manner. I look forward to working with RaySecur, to help meet this important security need.” RaySecur's Advisory Board Ed Davis is the latest addition to a world-class team comprising technology, military, security and law enforcement professionals. He has a 35-year proven track record and is the President and Chief Executive Officer (CEO) of business strategy and security services firm, Edward Davis Company. Ed Davis served as the Boston Police Commissioner from December 2006 to October 2013, where he led the highly successful response to the Boston Marathon bombing. Prior to that, he was the Superintendent of the Lowell, Massachusetts Police Department for 12 years. Davis also serves on AT&T’s Advisory Board and was a former Safety Advisory Board Member at Uber. Enhancing mail security “We are honored to have an esteemed law enforcement figure, such as Ed Davis join our Advisory Board and help us continue closing the mail security gap,” said Alex Sappok, Ph.D., the Chief Executive Officer (CEO) of RaySecur. Alex adds, “Ed’s strong interest in RaySecur not only highlights the importance of improving mail security across industry and government, but also our solutions, which can easily address the problem at scale.”
Sepura’s CEO Steve Barber has been elected to the TETRA and Critical Communications Association (TCCA) Board, adding considerable experience to the leadership team of the industry body. Steve Barber brings to the TCCA Board, a thorough understanding of global critical communications’ user requirements, as well as extensive experience in supplying and manufacturing fit for purpose devices, and managing technology evolution. open critical communications standards His election pledge to commit to the development of open critical communications standards and interoperability is reinforced by Sepura’s long standing commitment to driving mission critical technology standardization and innovation. Steve Barber stated, “As a network agnostic company, focused on our customers’ needs, we have led multi-vendor interoperability for many years. This has been of significant benefit to users, giving them choice and flexibility, when selecting their communications solution and minimizing proprietary implementations that restrict the market, and slow down innovation.” Support for narrowband and broadband solutions Steve Barber plans to focus on supporting the ongoing development of both narrowband and broadband solutions Alongside his support for open standards, Steve Barber plans to focus on supporting the ongoing development of both narrowband and broadband solutions, and the evolution of 3GPP standards for mission critical markets. “TCCA is an industry-wide body and I am committed to representing all association members, rather than the interests of an individual organization,” said Steve Barber, adding “I look forward to working within TCCA and with the wider critical communications community, in the coming years.” Trusted supplier voice in the TCCA Steve Barber’s election to the TCCA Board opens a space on the TETRA Industry Working Group, which will be taken by Sepura’s Chief Technology Officer (CTO), Peter Hudson. This ensures that both current and future mission critical users have a trusted supplier voice, representing their views across the TCCA. TCCA Members who wish to discuss relevant issues with Steve Barber can contact him via the Sepura website, on LinkedIn or at the Sepura stand at major trade shows.
Eagle Eye Networks announced it ranked 307 on the Deloitte Technology Fast 500™, a ranking of the 500 fastest-growing technology, media, telecommunications, life sciences, fintech, and energy tech companies in North America, in its 27th year. As the number one provider of video surveillance solutions for the third year in a row, Eagle Eye earned the number 12 overall spot in the category of Electronic Devices/Hardware. The company grew 403 percent during that period. Cloud and artificial intelligence Eagle Eye Networks CEO Dean Drako said the company’s alignment with two major trends – the move to cloud and adding artificial intelligence (AI) to cloud video surveillance – contributed to the company’s stellar growth. “I firmly believe that the confluence of cloud and AI is revolutionizing video surveillance around the world,” said Drako. “Eagle Eye is at the forefront of this revolution, delivering technologies that will make the world a safer place and businesses more efficient.” Customer experience In the face of challenges, the best and brightest were able to pivot, reinvent, and transform and grow" “Working with our global network of reseller partners and an extensive ecosystem of API partners, Eagle Eye Networks’ success is driven by four key components: great customer service to earn our customers business; cybersecurity to keep customer data protected; product features and capabilities to deliver the privacy customers want and resellers need; and reliability to ensure systems are always available for our customers.” “Each year the Technology Fast 500 shines a light on leading innovators in technology, and this year is no exception,” said Paul Silverglate, vice-chair, Deloitte LLP, and U.S. technology sector leader. “In the face of innumerable challenges resulting from the pandemic, the best and brightest were able to pivot, reinvent, and transform and grow. We celebrate the winning organizations and especially the talented employees driving their success.” Need for innovative solutions “The pandemic has underscored the urgent need for tech solutions in a variety of areas across health care, fintech, energy tech, and entertainment, to name a few, so reliance on innovators like the winners of the Technology Fast 500 is more important than ever,” said Christie Simons, partner, Deloitte & Touche LLP and an industry pioneer for technology, media, and telecommunications within Deloitte’s audit and assurance practice. “These companies are not only at the cutting edge, transforming the way we do business, but most importantly, recognize the strategic importance of ongoing innovation, especially in the ever-changing world of technology.” Eagle Eye Networks ranked 187 as a Technology Fast 500™ award winner for 2020, and it earned number 133 in 2019.
Rescu Prime launches a GPS emergency alert system that cross-references geographical information, counties, zip codes, data lists of local authorities, and more to determine a user’s exact location and contact the closest available emergency response, team. The app can dispatch emergency responders anywhere in the United States to a user’s exact location in only two taps, offering the fastest way to get help during an emergency. Two-way SMS chat In addition to these groundbreaking GPS features, Rescu Prime is also launching two-way SMS chats with Rescu dispatchers, empowering users to quietly communicate the details of their emergency. The feature is ideal for the hard of hearing or anyone who doesn’t want to give away their location. Round-the-clock security Wherever your travels take you, Rescu Prime’s nationwide GPS service empowers you to go safely" Rescu has partnered with 30,000 local police stations, fire departments, and ambulance networks across the country to provide round-the-clock security for users, anywhere in the United States. Rescu Prime subscriptions are $10/month or $99/year. Paolo Piscatelli, CEO of Rescu, shares, “Rescu was the fastest way to get help during a home emergency. Now, it’s the fastest way to get help anywhere in the United States. Wherever your travels take you, Rescu Prime’s nationwide GPS service empowers you to go safely.” Non-verbal communication Rescu is the first and only Personal Emergency Response System (PERS) in a non-hardware platform. Unlike 9-1-1, the Rescu app does not require speaking to a dispatcher. With Rescu, users can communicate non-verbally to an emergency dispatcher. Rescu leverages the first emergency dispatch API and is the only emergency alert app that has its private dispatch center. Rescu Prime is the premium subscription option for Rescu users.
Ava Security has launched the ability to use third-party sensors with Ava Aware Cloud, the open data platform for building and facilities intelligence. By merging video security with sensor technology, organizations can unlock the enhanced situational awareness of security along with facility management, staff well-being, and productivity. Open Ava Aware data platform Siloed unconnected systems are a big challenge for organizations seeking greater insights and better building security. Integrations either require heavy, custom development, or organizations are often forced into a single vendor lock-in when moving to certain cloud vendors. Organizations can now use the open Ava Aware data platform with third-party sensors to capture insights into their sites' activities and environmental conditions. Users can set rules for real-time notifications and alerts for readings such as abnormal noise levels, temperature, proximity, touch, humidity, smoke, vape, chemicals, and gas, allowing organizations to act quickly on environmental incidents. Integrating data with video footage Sensor data combined with video security footage through a single interface allows getting a clearer picture Sensor data is combined with video security footage through a single interface, allowing organizations to get a clearer picture of the security incidents that could impact their facilities, assets, and people. For example, by associating a sensor with a camera, facility operators and IT would immediately see the sensor alarm and the real-time video associated with that sensor (e.g. an open emergency door). Businesses derive value beyond security; gathering data that can help achieve greater efficiency and improve operations. Initial sensor integration rollout Ava Security is initially launching these quarter integrations with the Halo smart sensor from IPVideo Technology and the tiny wireless sensors from Disruptive Technologies. Customers also have the option to integrate with other sensor providers of their choice through Ava’s open API platform. As a cloud-native and open platform, Ava Aware customers benefit immediately from new features and value as they are delivered over time. Features of Ava Aware Cloud The Ava Aware Cloud is also incredibly flexible, allowing customers to: Connect sensors in minutes, set up rules, and notify users in real-time View sensors on intuitive floorplan maps Associate sensors with cameras with simple drag and drop Remotely monitor sensors from anywhere in the world Secure sensor data through end-to-end encryption, SSO, and 2-factor authentication Cost-effective and flexible solution Ava’s open architecture solves provides a cost-effective and flexible solution on the market" Sam Lancia, Head of Video Engineering & Co-Founder of Ava Security commented, “There is immense power in the visibility gained by combining the data from sensors with intelligent video security systems as it creates a far clearer picture for an organization. Historically, this wasn’t possible because systems were too difficult to set up, often disconnected from one another, and organizations had to rip and replace existing investments to install software and devices from a single provider.” “Ava’s open architecture solves this problem for organizations, providing them with a cost-effective and flexible solution that utilizes the best technology on the market. We already have keen interest from a range of customers across different verticals such as real estate, education, and retail.” Physical security Bengt Lundberg, CEO of Disruptive Technologies commented, “Ava Security is at the forefront of physical security. We are looking forward to seeing customers unlock the value from our combined products and services through this partnership.” “The Ava Aware system, enhanced by the DT sensors, unlocks huge potential for real-time insights for organizations to inform their security and facility management.”
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialized equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair color, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.
How AI and humans can work together is a longstanding debate. As society progresses technologically, there’s always the worry of robots taking over jobs. Self-checkout tills, automated factory machines, and video analytics are all improving efficiency and productivity, but they can still work in tandem with humans, and in most cases, they need to. Video analytics in particular is one impressively intelligent piece of technology that security guards can utilize. How can video analytics help with certain security scenarios? Video analytics tools Before video analytics or even CCTV in general, if a child went missing in a shopping centre, we could only rely on humans. Take a crowded Saturday shopping centre, a complex one with a multitude of shops and eateries, you’d have to alert the security personnel, rely on a tannoy and search party, and hope for a lockdown to find a lost or kidnapped child. With video analytics, how would this scenario play out? It’s pretty mind-blowing. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely With the same scenario, you now have the help of many different cameras, but then there’s the task of searching through all the CCTV resources and footage. That’s where complex search functions come in. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely on what footage to narrow down, and there’s a lot of filters and functions to use. Expected movement direction For instance, they can tick a ‘human’ field, so the AI can track and filter out vehicles, objects etc., and then they can input height, clothing colours, time the child went missing, and last known location. There’s a complex event to check too, under ‘child kidnap’. For a more accurate search, security guards can then add in a searching criterion by drawing the child’s expected movement direction using a visual query function. A unique function like this enables visual criteria-based searches rather than text-based ones. The tech will then narrow down to the images/videos showing the criteria they’ve inputted, showing the object/child that matches the data and filter input. Detecting facial data There are illegal demonstrations and troublesome interferences that police have to deal with A white-list face recognition function is then used to track the child’s route which means the AI can detect facial data that has not been previously saved in the database, allowing it to track the route of a target entity, all in real time. Then, security guards can confirm the child’s route and current location. All up-to-date info can then be transferred to an onsite guard’s mobile phone for them to confirm the missing child’s movement route, face, and current location, helping to find them as quickly as possible. Often, there are illegal demonstrations and troublesome interferences that police have to deal with. Video analytics and surveillance can not only capture these, but they can be used to predict when they may happen, providing a more efficient process in dealing with these types of situations and gathering resources. Event processing functions Picture a public square with a number of entries into the main area, and at each entry point or path, there is CCTV. Those in the control room can set two events for each camera: a grouping event and a path-passing event. These are pretty self-explanatory. A grouping event covers images of seeing people gathering in close proximity and a path-passing event will show when people are passing through or entering. The video analytics tool can look out for large gatherings and increased footfall to alert security By setting these two events, the video analytics tool can look out for large gatherings and increased footfall to alert security or whoever is monitoring to be cautious of protests, demonstrations or any commotion. Using complex event processing functions, over-detection of alarms can also be prevented, especially if there’s a busy day with many passing through. Reducing false alarms By combining the two events, that filters down the triggers for alarms for better accuracy to predict certain situations, like a demonstration. The AI can also be set to only trigger an alarm when the two events are happening simultaneously on all the cameras of each entry to reduce false alarms. There are so many situations and events that video analytics can be programmed to monitor. You can tick fields to monitor any objects that have appeared, disappeared, or been abandoned. You can also check events like path-passing to monitor traffic, as well as loitering, fighting, grouping, a sudden scene change, smoke, flames, falling, unsafe crossing, traffic jams and car accidents etc. Preventing unsafe situations Complex events can include violations of one-way systems, blacklist-detected vehicles Complex events can include violations of one-way systems, blacklist-detected vehicles, person and vehicle tracking, child kidnaps, waste collection, over-speed vehicles, and demonstration detections. The use of video analytics expands our capabilities tremendously, working in real time to detect and help predict security-related situations. Together with security agents, guards and operatives, AI in CCTV means resources can be better prepared, and that the likelihood of preventing unsafe situations can be greatly improved. It’s a winning team, as AI won’t always get it right but it’s there to be the advanced eyes we need to help keep businesses, premises and areas safer.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or license plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analyzed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and license plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and license plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, color, license plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyze, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control center. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analyzed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualization. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the license plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
The city of Baltimore has banned the use of facial recognition systems by residents, businesses and the city government (except for police). The criminalization in a major U.S. city of an important emerging technology in the physical security industry is an extreme example of the continuing backlash against facial recognition throughout the United States. Facial recognition technology ban Several localities – from Portland, Oregon, to San Francisco, from Oakland, California, to Boston – have moved to limit use of the technology, and privacy groups have even proposed a national moratorium on use of facial recognition. The physical security industry, led by the Security Industry Association (SIA), vigorously opposed the ban in Baltimore, urging a measured approach and ‘more rational policymaking’ that preserve the technology’s value while managing any privacy or other concerns. Physical security industry opposes ban In such cases, it is local businesses and residents who stand to lose the most" “Unfortunately, an outright ban on facial recognition continues a distressing pattern in which the clear value of this technology is ignored,” said SIA’s Chief Executive Officer (CEO) Don Erickson, adding “In such cases, it is local businesses and residents who stand to lose the most.” At the national level, a letter to US President Biden from the U.S. Chamber of Commerce Coalition asserts the need for a national dialog over the appropriate use of facial recognition technology and expresses concern about ‘a blanket moratorium on federal government use and procurement of the technology’. (The coalition includes Security Industry Association (SIA) and other industry groups.) The negativity comes at a peak moment for facial recognition and other biometric technologies, which saw an increase of interest for a variety of public and business applications, during the COVID-19 pandemic’s prioritization to improve public health hygiene and to promote ‘contactless’ technologies. Prohibition on banks, retailers and online sellers The ordinance in Baltimore prohibits banks from using facial recognition to enhance consumer security in financial transactions. It prevents retailers from accelerating checkout lines with contactless payment and prohibits remote online identity document verification, which is needed by online sellers or gig economy workers, according to the Security Industry Association (SIA). At a human level, SIA points out that the prohibition of facial recognition undermines the use of customized accessibility tools for disabled persons, including those suffering with blindness, memory loss or prosopagnosia (face blindness). Ban out of line with current state of facial recognition Addressing the Baltimore prohibition, the Information Technology and Innovation Foundation reacted to the measure as ‘shockingly out of line with the current state of facial recognition technology and its growing adoption in many sectors of the economy’. Before Baltimore’s decision to target facial recognition, Portland, Oregon, had perhaps the strictest ban, prohibiting city government agencies and private businesses from using the technology on the city’s grounds. San Francisco was the first U.S. city to ban the technology, with Boston, Oakland; Cambridge, Massachusetts; and Berkeley, California, among others, following suit. Police and federal units can use biometrics Unlike other bans, the Baltimore moratorium does not apply to police uses Unlike other bans, the Baltimore moratorium does not apply to police uses, but targets private uses of the technology. It also includes a one-year ‘sunset’ clause that requires city council approval for an extension. The measure carves out an exemption for use of biometrics in access control systems. However, violations of the measure are punishable by 12 months in jail. The law also establishes a task force to evaluate the cost and effectiveness of surveillance tools. Transparency in public sector use of facial recognition Currently, the state of Maryland controls the Baltimore Police Department, so the city council does not have authority to ban police use of facial recognition, which has been a human rights concern driving the bans in other jurisdictions. A measure to return local control of police to the city could pass before the year lapses. SIA advocates transparency in public-sector applications of facial recognition in identity verification, security and law enforcement investigative applications. SIA’s CEO, Don Erickson stated, “As public sector uses are more likely to be part of processes with consequential outcomes, it is especially important for transparency and sound policies to accompany government applications.”
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualization and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralized data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralized data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A cellphone app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
Institución Ferial de Madrid (IFEMA) Exhibition Centre hosts over 100 events every year including trade shows and business meetings, but also large public events in the fields of sport, culture, and leisure. Boasting an exhibition area that covers 200,000 square meters of covered pavilions, 12 halls, two convention centers, and 14,000 parking spaces, the complex is operated by IFEMA Madrid and is one of the most up-to-date, technologically best equipped exhibition venues in Europe. Visitors from all over the world trust to be in a safe and pleasant environment, which is secured by systems that are state-of-the-art and cover the entire site – indoor and outdoor areas, parking garages and logistics zones. Analog video system The sheer size of the exhibition grounds, the large number of events in a wide variety of very different setups and a large number of people on site – visitors, exhibitors, service providers, suppliers – require a high-performance, holistic physical security system. IFEMA MADRID required a solution to replace its analog video system that had reached end-of-life IFEMA MADRID required a solution to replace its analog video system that had reached end-of-life. It expected the new solution to provide substantial improvements in processing video footage and helping them resolve incidents quickly. Prerequisites included state-of-the-art technology, an open and integrated platform, with easy integration of third-party solutions such as video analytics, access control and LPR and event search. Physical security ecosystem As a public body, IFEMA MADRID launched a public tender for the update of their video system. Qognify together with Sicuralia System and video analytics partner Briefcam, presented the best overall solution, complying with all the customer needs, thus winning the contract. The powerful security functions of Qognify’s Cayuga VMS, as well as its openness to third party software integrations, especially with video analytics, tipped the scales and it was chosen to be at the core of its new video-based security system. To achieve overall surveillance for the entire complex within one system, Cayuga is used as a video surveillance platform to not only expand and upgrade the technology, but also offer complete integration with IFEMA’s physical security ecosystem. Responding to developing situations To date, more than 650 cameras – both fixed and PTZ models – have been installed to improve the security To date, more than 650 cameras – both fixed and PTZ models – have been installed to improve the security and safety on site and to allow for video analysis in critical areas, thus making the video system more efficient and actionable. The VMS’s reliability was key, to ensure the continuous protection of people and goods in coherence with the envisioned growth of the events that take place at the Madrid Exhibition Centre. At the heart of the installation sits a central control room that was designed from scratch. It is here where all information converges – allowing for immediate assessment and response to any developing situations. Video security system The implementation of Cayuga has improved the performance of the video security system, accelerated investigations, and is delivering improved situational awareness. It has helped to produce a better resolution on the video stream, combined with the ability to easily switch from live to recorded video for investigation. All this allows the security team to get a better overview of every situation, while at the same time reducing the number of people needed for monitoring or patrolling. The new system makes easier to provide a higher level of security for exhibitors and for the visitors to IFEMA MADRID.
Being isolated on the edge of wilderness means there’s a need for a video system that is both reliable and flexible. For that reason, the team at Jackson Hole Airport (JAC), since 2009, has relied on video management software (VMS) from Milestone Systems, to enhance security, safety, and efficiency at the airport. Milestone XProtect VMS installed At the edge of the frontier, Jackson Hole Airport has experienced considerable growth over the years. Significant capital investments in expansions have made new video system integrations possible several times and Milestone XProtect VMS has supported the airport’s needs along the way. As of 2020, over 220 cameras are in use, but the airport shows no signs of slowing down As of 2020, over 220 cameras are in use, but the airport shows no signs of slowing down. New projects will include building a fuel farm, a car wash, and expanded parking facilities. As the need to increase security continues, XProtect open platform software will enable IT team growth and the seamless integration of new cameras, and data storage capabilities. Enhanced situational awareness All video is kept for up to a full year, with most of the system’s cameras set for motion recording, around the clock. As a result, administrators achieve greater situational awareness and better security. The video system has enabled improvements throughout the entire airport. For example, Jackson Hole Airport contends with a great deal of plane de-icing, for several months each year. The process occurs at a distance from the main buildings. Thanks to the video expansion, each airline is now able to monitor the de-icing of their planes. Allowing airline personnel to monitor progress on their own has saved airport staff time and resources. Monitoring security In addition, the airport uses the system to closely monitor the security checkpoint, to capture video documentation, in case of an incident. By monitoring baggage areas, it’s possible to investigate lost bags and left-behind items, by reviewing recorded video. New 4K multi-sensor cameras support an investigatory system, helping staff see previously uncovered areas. The cameras capture high-resolution video and provide enough data to zoom in, after the fact. Deployed Agent Vi’s video analytics Milestone Systems’ XProtect Smart Client has improved general situational awareness in the airport Additionally, the team has deployed video analytics from Agent Vi, to provide a layer of automated alarms, for flagging abnormal occurrences. For example, video analytics can detect travelers moving against the foot traffic flow and crossing into restricted areas. Milestone Systems’ XProtect Smart Client has improved general situational awareness in the airport. Authorized users now have a new standard for accessing surveillance remotely. It provides seamless viewing of live and recorded video, instant control of cameras and connected security devices, and a comprehensive activity overview. Force multiplication using advanced technology The ongoing use of Milestone’s VMS makes it possible to maintain the independence and efficiency of a small team of personnel, delivering maximum security at the edge of a wild frontier. Andrew Wells, IT Manager for the Jackson Hole Airport, said “Situational awareness for our team and our clients allow us to be as secure and efficient as possible, with our small team. The flexibility of the open platform VMS allows us to scale our system and add the features we need now and in the future.” Jackson Hole Airport Jackson Hole Airport lies seven miles north of Jackson, Wyoming, at the base of the Teton Mountains, in the USA. It is unique for being entirely within the Grand Teton National Park limits. It is the busiest airport in the state of Wyoming, with nearly 500,000 in-bound passengers welcomed annually. The Jackson Hole Airport covers over 500 acres of land area and has one runway, nine boarding gates, and three baggage carousels.
The Prague city administration together with the Criminal Investigation Department relies on security technology from Germany-based Dallmeier in Prague's Wenceslas Square, one of the largest city squares in Europe with an area of 45,000 square meters, and the Old Town Square. Wenceslas Square and Old Town Square in Prague are both steeped in history, and now as ever before remaining important hubs for tourism and traffic. To ensure the safety of the streams of people and vehicles in these places, when it comes to security equipment the Prague city administration relies on a combination of conventional cameras and a solution from the Regensburg company Dallmeier. From horse market to commercial thoroughfare Wenceslas Square in Prague was created in the 14th century and originally served as a horse market, as was reflected in its name. It was renamed "Wenceslas Square" in 1848 in tribute to Saint Wenceslas of Bohemia. Since the 19th century, the function of the square has evolved from that of a place for trading horses to a busy commercial district. The function of the square has evolved from that of a place for trading horses to a busy commercial district It is used by pedestrians, cyclists, motor vehicles, and local public transport alike, and so constitutes a major confluence point in Prague's New City. The city administration attaches great importance to ensuring that all these traffic elements can coexist in harmony, and to have a general overview of what is happening, the administration together with the police criminal investigation department rely on the sharp "eyes" of the Panomera®. Tourist magnet Old Town Square Panomera® also provides security in the 9000 square meter Prague Old Town Square. The Old Town Square is the historic heart of the city and attracts thousands of tourists every year with its atmosphere, sights, and markets. Its history dates to the 11th century, and it has always been a crossroads for commerce and a marketplace. It is a magnet for tourists and its borders abound with restaurants, museums, galleries, and shops. The astronomical clock on the tower of the Old Town Hall is one of the most well-known sights in Europe. Advantages of Panomera® technology for monitoring The solution for both Wenceslas Square and Old Town Square consists of Panomera® models from the Topline series. The Panomera® multifocal sensor system can provide coverage for vast expanses and areas. Infrastructure costs are also lower since a single Panomera® captures a much larger area and fewer installation points The combination of general overview with the highest possible resolution of details is very important, particularly for large squares, and with this camera technology more remote objects can also be displayed with the same resolution as objects in the image foreground. Several operators can zoom into the same image at the same time. Even then, the overall scene always remains in view and the recording continues. Where previously several megapixel cameras would have been needed, the users' workload has been reduced significantly, because fewer images must be captured. Infrastructure costs are also lower since a single Panomera® captures a much larger area and fewer installation points are needed. For customers, this means savings not only in terms of infrastructure but also regarding operation and management, so total operating costs are reduced. Planning that delivers In the project planning phase, the Dallmeier 3D specialist team consisting of engineers and graphic designers created a three-dimensional simulation of the customer's environment. In the 3D model, the team simulated the real camera models and locations/installation sites, and thus also angles of vision and ranges. The completed 3D model was presented to the customer jointly with integration partner KH Servis in Prague and comprised the entire solution including the cameras and other essential components. The city administration and police authorities were delighted by this manner of project visualization because this approach also allowed an accurate calculation of costs to be made, giving the customer certainty regarding the cost and scope of the project. "What we plan is what you get" 3D planning also guarantees that there are no surprises either on the technical or financial level 3D planning also guarantees that there are no surprises either on the technical or financial level during or after the installation. Dallmeier calls this approach "What we plan is what you get". Besides the technical advantages delivered by Panomera®, the customers were also impressed by the planning certainty they were given by the 3D visualization, and, at the end of 2017, Dallmeier won the order to put the project into practice. Test run at the Dallmeier FAT Centre Before it was installed, the planned solution underwent a Dallmeier Factory Acceptance Test at the FAT Centre in Regensburg. All components were assembled there, and the final environment was tested in live operation. While testing was proceeding in the FAT Centre, KH Servis was also attending training in Regensburg so they would be ready for the on-site installation and so they could see the system operating flawlessly for themselves. Observation and intervention With the installation of the multifocal sensor systems, the desire for increased security and more effective intervention capabilities was realized. The cameras are used to observe situations and when necessary, enable rapid countermeasures or also a rapid investigation of incidents. In the event of criminal offenses, the video material can be stored separately as evidence. Special challenge: Protection of historic monuments Permission had to be obtained from the building owners before the cameras could be mounted Both squares are bordered by buildings with historic monument status, the Panomera® cameras could not always be mounted where single sensor cameras had hung previously, enabling the "old" installation points to be used. Permission had to be obtained from the building owners before the cameras could be mounted, but this was managed successfully for all the new installation points. Conclusion The conclusion by KH Servis, Dallmeier's integration partner in Prague, "We worked together with extreme professionalism, the city administration and police authorities were ultimately convinced, not only by the quality of the systems and the image material but also the impressive planning phase and planning certainty it gave them."
St. George's Church of England Foundation School in Broadstairs, Kent, was founded in 1841. As staff work to educate and enrich the lives of 1,800 children, aged 4 to 19 years old, they focus on values as relevant today as they were over 150 years ago; forgiveness, compassion, and friendship. The school prides itself on its history and Christian traditions. It aims to deliver an atmosphere where every student, member of staff, and individual is appreciated, nurtured, and supported regardless of their circumstances. The school appointed Jacksons Fencing to help create an environment where students and staff alike are safe while on-site, and buildings and assets are protected after hours. Therefore, the physical space needed to be designed across the two adjoining sites to encompass this. Bigger, better, safer Jacksons Fencing and St. George's School decided that the pre-existing fencing needed to match the newly installed fencing The school's main aim was to install fences around the perimeter of the school. This was felt necessary to ensure those within the establishment are safe and secure. Protective fencing was also considered vital to prevent any form of disruption to the student's education. Jacksons Fencing and St. George's School agreed one of the boundaries needed to be expanded and it was also decided that the pre-existing fencing needed to match the newly installed fencing. EuroGuard Flatform gates and fences St. George’s School wanted fencing and gating which was welcoming for staff, students, and visitors alike. Anything too intimidating wouldn’t be conducive to a friendly or effective learning environment, it was felt. Importantly, the new perimeter needed to both suit the natural surroundings, and match the color of the existing fencings. 372 meters of 1.8m high, green EuroGuard Flatform mesh fencing was installed around the school’s perimeter, along with 285m of the same product in black. Colors were applied within Jacksons’ powder coating facility in Ashford, selected specially to match perfectly with the school’s existing fencing. Two EuroGuard Flatform Heavy double leaf gates were also specified and installed to ensure secure access between the primary and secondary sites which have a public footpath running between. Safe and secure Both fencing and gates are coated in a premium Galfan zinc alloy which provides long-lasting protection The school decision-makers care about the future of the premises and have a keen interest in sustainability. It was therefore important that all products would stand the test of time. Both fencing and gates are coated in a premium Galfan zinc alloy which provides long-lasting protection against rust and corrosion. As with all Jacksons’ products, they also come with a 25-year service life guarantee, keeping St George’s staff and students safe and secure for years to come. Threat detection and response Jacksons Fencing also understands that schools need to protect against multiple threats, such as vandalism, burglary, and trespassing. Fortunately, EuroGuard Flatform is designed with anti-vandal features and is manufactured from high-quality materials to improve their durability, protecting the school grounds from a range of risks. Peter Jackson, Jacksons Fencing Managing Director, comments, “We are delighted to have helped St George’s CofE Foundation School create a secure environment for its staff and students. In this post-pandemic world, so much is out of our control. Parents will need more assurance than ever before that their children are physically safe when they’re outside their care.” He continues, “We have worked closely with the team at the school to ensure the final solution is fit for purpose for the community now and well into the future. We hope our products will help ensure the students and staff at St George’s school feels welcomed, safe, and secure as they use the school and its facilities.”
Compania Naţională de Căi Ferate ‘CFR’ - SA, the state railway carrier of Romania, has invested in an integrated security and safety solution from Johnson Controls, to protect passengers traveling on a new railway link, connecting the Otopeni Henri Coandă International Airport to Bucharest Nord main railway station, in Bucharest, Romania. Securing Bucharest’s new rail link The 2.95 km rail link, which was planned to facilitate the large number of fans traveling from the international airport to attend the Bucharest-hosted EURO 2020 football matches and was completed in just 14 months, from the design stage, at a cost of approximately 120 million Euros, is now being increasingly used by business travelers and tourists, who wish to visit the city of Bucharest. The contract to design and execute the entire project was won, as part of a competitiveness tender process, by the Arcada – ISPCF – DB Engineering consortium. Alfred Net, a systems integrator that specializes in designing and implementing turnkey security, telecommunications and network solutions, was subsequently tasked to provide the new railway terminal’s safety and security systems, as well as the passenger communications and information systems. Need for a sophisticated security solution We were very pleased to have the opportunity to use our experience of providing sophisticated solutions" “We were very pleased to have the opportunity to use our experience of providing sophisticated solutions for complex and mission critical applications, in order to contribute to the success of this important project,” said Alex Vladutoiu, the Managing Director & Solutions Architect at Alfred Net. Alex Vladutoiu said, “With the new link terminating within the airport, we immediately realized that any security and safety solution that we recommended to the consortium would need to meet the demanding requirements of airport security, as well as railway- related EU regulations and directives.” Deep integration of security components He adds, “This meant that as well as being robust, ultra-reliable and cyber secure, the various component parts of the solution would need to be deeply integrated with each other, so as to provide control room operators with a high level of situational awareness, which would enable them to react quickly and effectively to any incidents.” Alex Vladutoiu further said, “With this in mind, our previous experience led us to recommend that all the security and safety products should be single sourced from the Johnson Controls’ access control, fire, intrusion and video surveillance brands, which come under its Tyco umbrella. Simply put, we knew these various brands could collectively provide us with everything needed to put together an effective solution for this project.” He adds, “Importantly, we were confident that the various products, which to a large extent are ‘plug & play’, could be easily integrated without the time-consuming process of developing new drivers and interfaces.” Tyco victor security management platform The Alfred Net design team specified the Tyco victor security management platform The Alfred Net design team specified the Tyco victor security management platform, to be at the heart of the safety and security solution. In addition to helping control room operators manage and monitor the images, captured by Tyco Illustra high-definition IP network cameras, victor’s graphical user interface (GUI) alerts operators in real time, as to any fire or intrusion events, as well as any access control activity. The design of the security and safety solution was based on a rigorous Risk Assessment Report, which took into account the worst case scenarios, in terms of the threat to the safety of passengers, disruption and the protection of assets. Unified security solution “By providing a unified solution, which can manage the combined data captured by the intrusion detection, access control, fire detection and video surveillance systems, victor offers authorized users with all the information they need, to monitor and strictly control the movement of passengers.” The products include: Video Surveillance & AI Analytics: In addition to the Tyco Illustra cameras and VideoEdge video recorders, which have been deployed to monitor the railway terminal proximity, mission critical machinery, platforms and areas open to the public, control room operators are also able to take advantage of video analytics, in order to help them quickly detect any suspicious activity or danger. Tripwire detection, for example, can generate an alert, if a passenger oversteps a platform’s safety line, while people counting analytics can alert security personnel to overcrowding. It can also be used by operations personnel to help them make best use of human resources, by having a greater understanding of which parts of the station are busy, at different times of the day. Access Control: A CEM Systems AC2000 access control software platform, together with eDCM350 OSDP protocol IP door controllers, are supporting smart card readers and encrypted cards, to limit access to sensitive areas throughout the railway station, such as communications, signaling, staff and locker rooms. As a highly scalable solution, AC2000 enabled Alfred Net to implement access control throughout expansive areas of the railway. By utilizing RS485 serial communications with strong AES 128 encryption between the eDCM 350 intelligent door controllers, the OSDP readers and the smart cards, the railways is protected against the threat of controller signal cloning, as well as the threat of personnel card cloning. Fire Detection: Zettler Profile Flexible addressable panels, flame detectors and smoke sensors have been installed throughout the station terminal, to ensure mandatory compliance with EU fire regulations. Integration with the station’s PAVA system means that pre-recorded announcements are automatically broadcast, when a fire-related event occurs. Intrusion Detection: A DSC PowerSeries Neo intrusion system is providing protection for areas, which may be left unattended, such as cash handling areas, with integrated panic buttons to ensure there is a rapid reaction to any intrusion alarm. Johnson Controls and Alfred Net partnership Alfred Net worked closely with the Johnson Controls’ pre-sales team, in order to ensure the best products were specified for each location and application, and the comprehensive security and safety solution was installed, alongside the station’s iPIS communications and information software. Alex Vladutoiu said, “This was without doubt the most complex project that the client has been involved with and reflects its determination to invest in the latest technology, to ensure maximum operational efficiency and to protect its passengers and assets.” Video analytics and flame detection This has resulted in diverse solutions, such as video analytics and flame detection" He adds, “This has resulted in diverse solutions, such as video analytics and flame detection, based on video technology interacting with laser detection, RGB LED displays, digital signage, Text-to-Speech and many other state-of-the-art technologies, to deliver a highly effective total solution.” Since December 2020, when the new rail link became operational, the highly complex and integrated security and safety solution from Johnson Controls has been playing a key role, in ensuring the smooth operation of the train station and the running of 72 trains per day, (36 pairs), which arrive and depart every 20 minutes, both from and to the airport. Tyco suite of security products Alex Vladutoiu, Managing Director and Solutions Architect at Alfred Net, concludes “As a solution architect, Tyco is indeed my preferred security provider for integrated projects. As a unified solution, the Tyco suite of products are almost ‘plug and play’ and give you everything you need to build-up an integrated system, without spending additional time or money on developing other interfaces. He concludes, “We were delighted to have designed and implemented the new Otopeni Airport Railway Terminal project in less than one year and we look forward to our continued partnership with Tyco.”
An innovative business intelligence solution developed by Morphean, a pioneer in Security-as-a-Service and cloud analytics, has helped Footasylum to dramatically reduce the number of delivery items reported missing by customers by 50%, and improve its courier success rate by 25%. The video surveillance system, comprising network video cameras in parking areas, and utilizing cloud-based analytics, now allows delivery queries to be checked and verified at the click of a button, representing significant savings while greatly improving the customer experience. Replacing analog solution Footasylum, fashion streetwear and sportswear retailer with over 65 stores across the UK, has upgraded its legacy video surveillance solution to help transform distribution services, providing full visibility and accountability for packed and dispatched items and their related transactions. Footasylum has upgraded to a video surveillance solution to help transform distribution services Replacing a dated legacy analog solution with no tracking capabilities means that Footasylum’s customer experience staff no longer has to undertake the time-consuming task of manually searching for order details (that could take up to 30 minutes) in the event of a customer dispute. Lack of tracking missing parcels Chris Shelmerdine, Warehouse Profit Protection Manager at Footasylum, explains, “We ship a great number of parcels from our warehouse directly to customers daily. Our biggest challenge has been that many customers would send us queries about parcels, notably that items were missing from their deliveries. This was of great concern.” Lacking vital proof that an order had been picked, packed, and dispatched correctly with a courier left Footasylum with little choice but to refund orders time after time, resulting in a loss. Video surveillance solution The profit protection team needed a greater overview of the packing and delivery process so that they could understand where problems were occurring, ensuring full accountability. The new system provides evidence of all transactions backed by a high-quality video which can be retrieved immediately when required and securely shared instantly with all relevant parties. Better customer experience The new transaction-checker solution gives the ability to link packing processes to video data" Paul Green, Head of UK Sales at Morphean, comments, “Footasylum wanted to streamline its operations and ensure that it could deliver a better service for customers." "The new transaction-checker solution gives Footasylum the ability to link packing processes to video data. This provides accountability and security for every order. It’s a great result for Footasylum to reduce missing item queries by 50% and increase its delivery success rate by 25%.” Chris Shelmerdine concludes, “Every team has benefited from this solution, from the customer experience team to the profit-protection team. But the customer is at the heart of what we do, so most importantly for us, the customer experience has improved. We pride ourselves on delivering excellent products and giving the consumer the most convenient and hassle-free experience we possibly can. Morphean’s transaction-checker solution has helped us achieve this.”
Round table discussion
The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police misconduct. Body-worn cameras are also finding their way into broader usage, even including customer service applications. We asked this week’s Expert Panel Roundtable: How important will body-worn cameras be moving forward?
“Deep learning” is recently among the more prevalent jargon in the physical security industry, and for good reason. The potential benefits of this subset of artificial intelligence (AI) are vast, and those benefits are only now beginning to be understood and realised. But how can we separate the marketing hype from reality? How can we differentiate between future potential and the current state of the art? To clarify the latest on this new technology, we asked this week’s Expert Panel Roundtable: What is “deep learning?” How well does the security industry understand its full potential?
Crime prevention is a basic goal of security, even if a security system merely convinces a criminal to seek out a different target. However, many of today’s security technologies are most useful after the fact, to provide forensic information about a crime that has already taken place. Solving a crime presents a whole new level of challenge. Surely, prevention is the best approach. We asked this week’s Expert Panel Roundtable: How successful is the security industry in crime prevention and reducing crime rates?