Public sector security
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year draws to a close, holiday and Christmas markets as well as major New Year’s Eve events, present c...
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per...
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 article...
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this p...
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognize that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unle...
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research program to provide valuable feedback to the GSA Schedule 84 program and on t...
For over a century, IEEE's mission has been to advance technology for the benefit of humanity. As the world’s largest technical professional organization, IEEE’s global community includes over 420,000 members in engineering, computing and technology, collaborating on communications, consumer electronics, robotics, sustainable energy, aerospace, life sciences, and many other critical initiatives. Dave George Felicitated With IEEE Life Membership Dave George has been an active IEEE member for over 40 years As the Chief Technologist behind Pryme Radio’s communications innovations, Dave George has been an active IEEE member for over 40 years. Recently, Mr. George was honored with IEEE Life Membership, a top echelon designation reserved only for those individuals demonstrating long-standing leadership, dedication, and who have made a significant impact on the development of technology. “I’m grateful for IEEE’s recognition, but it’s my job to find ways to better the lives and professions of Pryme’s customers through communications,” said George. “The fact that technologies have become ever more exotic and exciting is a bonus.” Never comfortable tooting his own horn, George’s demure demeanor belies the important role he’s played in moving the communication industry forward. In fact, George credits IEEE as being his primary source for leading edge electronic science data, which often help lead him to develop ground-breaking new products at Pryme. Pryme's Future Product Line In Sync With IoT George is a regional member of the IEEE Communications Society (ComSoc), Robotics & Automation Society (RAS), Intelligent Transportation Systems Society (ITS), and the Vehicular Technology Society (VTS.) His involvement has given rise to future product developments at Pryme that support emerging networks such as IoT, mesh, 5G, soon to be 6G, as well as intelligent vehicle to vehicle communications. George may shy away from the spotlight, but he is fearless when it comes to entering unexplored technological territories. The reward Dave George reveres most is creating products that make a difference. George’s philosophy mirrors the IEEE’s mission and is also reflected in Pryme’s guiding principle — Invent communications technologies that benefit public safety, security, government, education, transit, utilities, construction, manufacturing, retail, hospitality, field services, facilities, healthcare, professionals and humanity as a whole.
Vigilant Solutions - an AI and data analytics company that provides technology to public safety - announced it has entered the body worn camera market by acquiring Edesix Ltd, a global provider of wearable security hardware and software, and the United Kingdom's number one manufacturer of body worn cameras. The acquisition strengthens Vigilant's position as a market leader in image capture solutions by adding body worn camera images via hardware and software and in-car camera technology to its existing suite of automated license plate recognition (ALPR), facial recognition, ballistics analysis and gun crime mapping hardware and software solutions. Expanding Public Safety Customer Base This acquisition puts Vigilant in the position to offer public safety a full suite of image capture solutions including the ability to integrate our suite of technologies with in-car cameras""Vigilant Solutions is excited to enter the body worn and in-car camera markets," said Shawn Smith, Founder and President of Vigilant Solutions. "This acquisition puts Vigilant in the position to offer public safety a full suite of image capture solutions - both in the U.S. and internationally - including the ability to integrate our suite of technologies with in-car cameras. Edesix has a strong global footprint, which includes more than 20,000 body camera deployments across several industries and five continents. This acquisition allows us to continue to build Vigilant's global brand. In addition, Edesix also enhances Vigilant's hardware and software engineering capabilities." With the acquisition of Edesix, Vigilant is not only entering the body worn and in-car camera markets but is also expanding its presence beyond its traditional public safety customer base and will serve a broad range of commercial industries. Video Evidence Management System Body worn camera and in-car camera footage obtained via Vigilant's hardware, is stored in VideoManager, a robust video evidence management system. VideoManager is a component of Vigilant's cloud-based investigative platform, which includes image capture data and analytics for ALPR, facial recognition, ballistics and gun crime mapping. "The Edesix team is thrilled with the acquisition by Vigilant Solutions, which has been at the forefront of machine vision and machine learning technology innovation in the public safety community for years," said Richie McBride, CEO of Edesix. "The combination of Vigilant's image analytics solutions and our body worn and in-car camera products is truly exciting. When you consider that our solutions seamlessly integrate into Vigilant's investigative platform, the global public safety community has some incredibly powerful tools to keep them and their communities safe."
At IACP 2018, Genetec Inc., a technology provider of security, law enforcement, and analytics solutions will showcase a comprehensive portfolio of products designed to enable communities and law enforcement agencies to foster greater collaboration through technology and to build-out Strategic Decision Support Centers (SDSC) uniquely designed to meet local neighborhood requirements. “Genetec is working successfully with cities like Chicago to provide a powerful and accessible decision support system as the foundation of their SDSC strategies. Empowered by our technology it is now also for small metro areas to cost-effectively deploy an SDSC to target unique neighborhood challenges and investigations,” said Giovanni Gaccione, Law Enforcement Practice Lead at Genetec. “This new approach to edge-based policing, public safety and community service has yielded excellent results. Our law enforcement customers are seeing crime statistics fall and public trust in their policing improve.” Crime Reduction Strategies SDSC strategies are being actively rolled out by law enforcement agencies in cities around the world. The goal is to empower police leadership in both small and large metro areas to better direct resources and be more responsive to specific community needs. These localized decision support centers allow for the creation of targeted crime reduction strategies and improved investigations through data analysis, human intelligence and community input. IACP visitors will also be able to get hands-on demos of Genetec Citigraf, a public safety decision support system IACP visitors will also be able to get hands-on demos of Genetec Citigraf, a public safety decision support system, Genetec Clearance, a digital evidence management system, and find out how Genetec Community Connect is helping cities build ties between local public and private sectors. Public Safety Support System Genetec will demonstrate Genetec Citigraf, a public safety decision support system that unifies operations across city departments, disseminates timely information, and provides greater situational awareness. Citigraf is the foundation technology behind the SDSC approach to policing and features a powerful correlation and analytics engine that instantly detects and displays relevant information from disparate sources for officers and responders to act on; such as CAD (Computer Aided Dispatch) systems, CCTV footage, ALPR data, and RMS (Record Management Systems). It enables a fast ‘on-scene’ response with highly-accurate GIS location and visual information, ensuring officers and emergency responders can make safe and effective decisions for situations in progress. Digital Evidence Management System The amount of evidence available to investigators is increasing dramatically, supported by growth in surveillance systems, increased use of body-worn cameras and the omnipresence of smartphones. This helps public safety agencies solve crimes but presents new logistics and privacy challenges. To help address these challenges, Genetec has developed Genetec Clearance, a digital evidence management system that strengthens the cooperation between security departments, outside agencies, and the public. It speeds up investigations by allowing police officers, investigators and security managers to collect, manage, and share evidence from different sources. With Clearance, agencies can reach out to the general public and private businesses and involve them in crime-solving efforts With Clearance, agencies can reach out to the general public and private businesses and involve them in crime-solving efforts. It provides a new, simplified sharing process, which will be showcased for the first time at IACP. Investigators can now instantly create a link for the public to share relevant video and photos from their cell phones and surveillance systems with law enforcement agencies. This link and custom QR code can be shared using social media, traditional media, the web or on the news. Anyone can then easily upload videos, photos, and other evidence directly from their phones or PCs into Clearance for police officers, investigators and security managers to review and use as part of their investigation. Cloud-Based Video Monitoring At IACP, Genetec will also highlight Community Connect, an initiative designed to build safer communities through greater cooperation between public and private organizations. Community Connect connects law enforcement to privately owned cameras, connected to Stratocast or other third-party technology, from participating businesses and organizations throughout their city. This initiative helps cities create their own public-private partnership program with business owners, and work towards lowering crime, promoting economic growth and operating more efficiently, even with constrained budgets. Stratocast is a cloud-based video monitoring service from Genetec. Easy to deploy, it offers greater security through HD video surveillance and allows owners to keep an eye on their business from anywhere using their laptop, smartphone or tablet. As part of a city’s Community Connect program, business owners can connect their cameras to the city’s Genetec video surveillance network, expanding its reach and directly contributing to their neighborhood’s safety.
HID Global, a worldwide provider of trusted identity solutions, announced that it has acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services, making HID Global one of the world’s major providers of fingerprint biometric technologies. Identity Management Solutions “Our acquisition of Crossmatch strengthens HID Global’s ability to offer innovative biometric identity solutions to hundreds of millions of users worldwide,” said Stefan Widing, President and CEO of HID Global. “Adding Crossmatch to our company will extend HID’s market leadership in the trusted identity space and allow us to fulfill the promise of biometrics in critical identity applications.” Founded in 1996 and based in Palm Beach Gardens, Florida, Crossmatch employs over 270 professionals across a global network of development hubs and strategic sales offices. With the acquisition, HID Global gains advanced biometric identity management solutions for civil government, defense and commercial applications, as well as a secure multifactor authentication software solution. Crossmatch’s public-sector biometrics business enhances HID’s reach into immigration and border control Crossmatch’s Public-Sector Biometrics Crossmatch’s public-sector biometrics business enhances HID’s reach into immigration and border control, law enforcement, and military and defense markets with products and solutions that include criminal booking, rapid mobile identification, background checks, security clearance processing, military base access, counter-terrorism and mobile intelligence gathering, visa processing and citizen services. The Crossmatch commercial biometrics business extends HID’s portfolio to include a broad array of single finger readers, modules, sensors and software developer kits (SDKs) for multiple vertical markets including – retail, financial, healthcare and OEM markets. This is a global business supporting a large volume of integrated partners. Crossmatch is also a provider of single fingerprint sensors to point-of-sale (POS) terminal manufacturers and is integrated with the major POS software applications. Behavioral Biometrics For Frictionless Access HID also gains a unique secure authentication solution, DigitalPersona, that goes beyond the traditional multifactor approach to cybersecurity. DigitalPersona adds an array of risk-based factors, including behavioral biometrics, for secure, frictionless access to Windows and cloud, web, mobile and traditional applications. “I am very pleased that Crossmatch is joining the HID family. Countering today’s advanced security threats requires innovative, comprehensive identity management solutions incorporating both biometric and non-biometric components. Our market-leading biometric identity management solutions and unique composite authentication solution perfectly complement HID’s already robust offerings. This will enable us to provide our global customers with an even broader range of trusted identity solutions, and our employees with increased opportunity for professional growth,” said Richard Agostinelli, CEO of Crossmatch.
NTT Security, the specialized security company of NTT Group, has strengthened its UK management team with the appointment of Azeem Aleem to the position of Vice President Consulting and Head of its UK & Ireland (UK&I) business. Azeem is a highly respected cybersecurity specialist and joins following a six-year tenure at RSA Security, where most recently he held the role of Global Director and Head of its Worldwide Advanced Cyber Defense (ACD) Practice. Experienced Cybersecurity Expert “Azeem is a very experienced cybersecurity expert and leader with a strong global background and I am very glad to welcome him to NTT Security. He will strengthen our UK management team, but also contribute, based on his extensive experience, to the success of our EMEA organization,” says Kai Grunwitz, Senior Vice President EMEA at NTT Security. Azeem joins NTT Security with a strong track record in cybersecurity with over 15 years’ experience in cyber defense technologies, security operations, counter threat intelligence, data analytics and behavioral classification of the cybercriminal. Within the domain of organizational operations, Azeem has wide-ranging experience in managing P&L, driving operational excellence, change management and process re-engineering. Azeem has been at the forefront of architecting cyber resilience capabilities against Advanced Persistent Threats Cyber Threat Prevention Azeem has been at the forefront of architecting cyber resilience capabilities against Advanced Persistent Threats (APT) for some of the best financial, government and public sector organizations across Europe, the US, Asia and the Middle East. He has worked with both national and international law enforcement agencies around intelligence training, detection and investigation of cybercrime. As a subject matter expert, he has made frequent appearances on regional television and radio programs commenting on the increase of cyber threats that are affecting the security of our connected society. A published book author and academic criminologist, he has authored several periodicals on advanced security threats in peer reviewed journals and security magazines. He is an eminent plenary conference guest speaker both at national and international level.
Axis Communications, Citilog and Genetec converge at ITS World Congress 2018 to showcase best-of-breed technology that is making roads safer, smarter and more sustainable Axis Communications, the market provider of network video technology, will be showcasing alongside Citilog and Genetec a best-of-breed traffic management solution to help ease congestion and identify traffic collisions in real-time at ITS World Congress 2018. The event, which takes place Copenhagen, is one of the most important in the transport industry, with major players presenting solutions that make our road networks and cities safer, smarter, and more sustainable. Utilizing Machine Learning Technology The combined traffic management system utilizes Citilog’s Automatic Incident Detection solution, which can identify incidents in real-time utilizing machine learning technology. The analytical software can recognize what is normal within a scene, so when an abnormal activity occurs, such as cars stopping suddenly or traffic coming to a standstill, an alert can be sent to the operator via unified mobility operations with Genetec Traffic Sense. Decisions can then be made in real-time to help manage an incident. This is made possible through Axis’ innovative range of network-connected cameras, which enable operators to review a scene in great detail. Daren Lang, Regional Manager, Business Development, Northern Europe at Axis Communications, states, “Our roads are getting busier, especially on motorways and in cities. As populations across Europe continue to rise, so too does the number of cars on our roads. This in turn leads to greater pollution, more accidents, and increased congestion on our networks. Identifying accidents, congestion, or illegally parked cars in real-time is crucial to help our transport systems run smoothly with less of an environmental impact, keeping road users safe and on the move.” One of the vital elements of this incident detection technology is the efficiency in detecting incidents and accidents quickly and reliably" Incident Detection Technology Axis, Citilog and Genetec are attending ITS World Congress 2018 between 17-21 September, Copenhagen. Eric Toffin, CEO at Citilog, states, “One of the vital elements of this incident detection technology is the efficiency in detecting incidents and accidents quickly and reliably, allowing traffic operators to manage incidents efficiently. An additional benefit is that you don’t have to deploy an entirely new infrastructure on a road network for this to work, which can be timely and extremely expensive. Instead, an existing video-surveillance infrastructure can be used with network cameras that support analytics on the edge. The technology can also be applied to a server-based system, so transport operators can breathe new life into and extend the lifespan of their existing technology.” Unifying Video With Traffic Management Christian C. Lemire, Team Lead, Intelligent Mobility Practice at Genetec, states, “Historically, video operators have monitored a large number of screens looking for anomalies in traffic flow, meaning often incidents were missed. Unifying video with traffic management, and turning this video data into smart data, means transport operators can retrieve additional value from their existing infrastructures. It’s more cost-effective and intelligent, meaning a safer and smarter journey for the road user.”
When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at least a dozen cameras in the area, and assuming the child has gone missing for only 15 minutes, about 3 hours’ worth of video to look through to find the child. Typical security staff response would be to monitor the video wall while reviewing the footage and making a verbal announcement throughout the mall so the staff can keep an eye out for her. There is no telling how long it will take, while every second feels like hours under pressure. As more time passes, the possible areas where the child can be will widen, it becomes more time-consuming to search manually, and the likelihood of finding the child decreases. What if we can avoid all of that and directly search for that particular girl in less than 1 second? Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streamsWith Artificial intelligence, we can. Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streams in a fraction of a second, using only one photo of that person. The photo does not even have to be a full frontal, passport-type mugshot; it can be a selfie image of the person at a party, as long as the face is there, the AI can find her and match her face with the hundreds or thousands of faces in the locations of interest. The search result is obtained in nearly real time as she passes by a certain camera. Distinguishing Humans From Animals And Statues The AI system continuously analyzes video streams from the surveillance cameras in its network, distinguishes human faces from non-human objects such as statues and animals, and much like a human brain, stores information about those faces in its memory, a mental image of the facial features so to speak. When we, the system user, upload an image of the person of interest to the AI system, the AI detects the face(s) in that image along with their particular features, search its memory for similar faces, and shows us where and when the person has appeared. We are in control of selecting the time period (up to days) and place (cameras) to search, and we can adjust the similarity level, i.e., how much a face matches the uploaded photo, to expand or fine-tune the search result according to our need. Furthermore, because the camera names and time stamps are available, the system can be linked with maps to track and predict the path of the person of interest. AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight Protecting People’s Privacy With AI Face Search All features of face recognition can be enabled by the system user, such as to notify staff members when a person of interest is approaching the store AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight. First, with AI Face Search, no names, ID, personal information, or lists of any type are required to be saved in the system. The uploaded image can be erased from the system after use, there is no face database, and all faces in the camera live view can be blurred out post-processing to guarantee GDPR compliance. Second, the lack of a required face database, a live view with frames drawn around the detected faces and constant face matching in the background also significantly reduces the amount of computing resource to process the video stream, hence the lightweight. Face Search Versus Face Recognition AI Face Search Face Recognition Quick search for a particular person in video footage Identify everyone in video footage Match detected face(s) in video stream to target face(s) in an uploaded image Match detected face(s) in video stream to a database Do not store faces and names in a database Must have a database with ID info Automatically protect privacy for GDPR compliance in public places May require additional paperwork to comply with privacy regulations Lightweight solution Complex solution for large-scale deployment Main use: locate persons of interest in a large area Main use: identify a person who passes through a checkpoint Of course, all features of face recognition can be enabled by the system user if necessary, such as to notify staff members when a person of interest is approaching the store, but the flexibility to not have such features and to use the search tool as a simple Google-like device particularly for people and images is the advantage of AI Face Search.Because Face Search is not based on face recognition, no faces and name identifications are stored Advantages Of AI Face Search Artificial Intelligence has advanced so far in the past few years that its facial understanding capability is equivalent to that of a human. The AI will recognise the person of interest whether he has glasses, wears a hat, is drinking water, or is at an angle away from the camera. In summary, the advantages of Face Search: High efficiency: a target person can be located within a few seconds, which enables fast response time. High performance: high accuracy in a large database and stable performance, much like Google search for text-based queries. Easy setup and usage: AI appliance with the built-in face search engine can be customised to integrate to any existing NVR/VMS/camera system or as a standalone unit depending on the customer’s needs. The simple-to-use interface requires minimal training and no special programming skills. High-cost saving: the time saving and ease of use translate to orders of magnitude less manual effort than traditionally required, which means money saving. Scalability: AI can scale much faster and at a wider scope than human effort. AI performance simply relies on computing resource, and each Face Search appliance typically comes with the optimal hardware for any system size depending on the customer need, which can go up to thousands of cameras. Privacy: AI Face Search is not face recognition. For face recognition, there are privacy laws that limits the usage. Because Face Search is not based on face recognition, no faces and name identifications are stored, so Face Search can be used in many public environments to identify faces against past and real-time video recordings. AI Face Search match detected face(s) in video stream to target face(s) in an uploaded image Common Use Cases Of AI Face Search In addition to the scenario of missing child in a shopping mall, other common use cases for the AI Face Search technology include: Retail management: Search, detect and locate VIP guests in hotels, shopping centres, resorts, etc. to promptly attend to their needs, track their behaviour pattern, and predict locations that they tend to visit. Crime suspect: Quickly search for and prove/disprove the presence of suspects (thief, robber, terrorist, etc.) in an incident at certain locations and time. School campus protection: With the recent increase in number of mass shootings in school campuses, there is a need to identify, locate and stop a weapon carrier on campus as soon as possible before he can start shooting. Face Search will enable the authorities to locate the suspect and trace his movements within seconds using multiple camera feeds from different areas on campus. Only one clear image of the suspect’s face is sufficient. In the race of technology development in response to business needs and security concerns, AI Face Search is a simple, lightweight solution for airports, shopping centres, schools, resorts, etc. to increase our efficiency, minimise manual effort in searching for people when incidents occur on site, and actively prevent potential incidents from occurring. By Paul Sun, CEO of IronYun, and Mai Truong, Marketing Manager of IronYun
Facial recognition has a long history dating back to the 1800s. To track down criminals, such as infamous bandits Jesse Woodson James and Billy the Kid, law enforcement would place “Wanted Alive or Dead” posters advertising bounties and soliciting public cooperation to help locate and even apprehend the alleged criminals. In addition to the bounty, these posters would include a photo and brief description of the crime, which would then be circulated to law enforcement agencies around the country and displayed in every US Post Office to speed up apprehension. Facial Recognition Advancements in artificial intelligence and biometric technology have led to the widespread use of computerised facial recognitionToday, technology such as social media, television and other more specialized communication networks play a more influential role in the recognition process. Advancements in artificial intelligence and biometric technology, including the development of Machine Learning capabilities, have led to increased accuracy, accessibility and the widespread use of computerized facial recognition. The significance of this means that facial recognition can occur on an even larger scale and in more challenging environments. This article will explore key milestones and technological advances that have resulted in the modern incarnation of facial recognition, before discussing the capabilities of cutting-edge “one-to-many” technology which is increasingly being used by counter-terror defense, police and security forces around the world. Technology Inception And Developments The technology was able to match 40 faces an hour, which was considered very impressive at the time The 1960s marked the start of computerized facial recognition, when Woodrow Wilson (Woody) Bledsoe developed a way to classify faces using gridlines. Bledsoe’s facial recognition still required a large amount of human involvement because a person had to extract the co-ordinates of the face’s features from a photograph and enter this information into a computer. The technology was able to match 40 faces an hour (each face took approximately 90 seconds to be matched) which was considered very impressive at the time. By the end of the 1960s, facial recognition had seen further development at the Stanford Research Institute where the technology proved to outperform humans in terms of accuracy of recognition (humans are notoriously bad at recognizing people they don’t know). By the end of the century, the leading player in the field was a solution that came out of the University of Bochum in Germany – and the accuracy of this technology was such that it was even sold on to bank and airport customers. From this stage on, the facial recognition market began to blossom, with error rates of automatic facial recognition systems decreasing by a factor of 272 from 1993 to 2010 according to US Government-sponsored evaluations. The aim for facial technology is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware Modern Usage Of Facial Recognition Fast-forward to the modern day and facial recognition has become a familiar technology when using applications such as the iPhone X’s Face ID capability or MasterCard Identity Check, passport e-gates at airports and other security and access control points. These solutions implement a consensual form of identity verification, as the user has a vested interest in being identified. This is a “one-to-one” facial recognition event, one person in front of the camera being compared to one identity either on a passport or the app. In these scenarios, the hardware is specifically developed for the application at hand, therefore technically much easier to accomplish. Facial recognition can now be used in a variety of governmental and commercial environments The safety and security world brings a much more complex problem to solve – how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve. It’s even more challenging when the aim is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware. And unlike in the 1960’s where identifying a face every 90 seconds was acceptable; the safety and security market requires near instant feedback on who a person matched against a watchlist is. Security And Safety Applications The idea behind all facial recognition technologies is broadly the same: you start with an image of a person’s face (ideally a high quality one, although machine learning means that to a point we can now even use video without reducing accuracy). A fully front facing image is best, think a passport photo, but machine learning and new software has made this more flexible. An algorithm converts this image into a numeric template, which cannot be converted back to an image and so represents a secure one way system. Every numeric template is different, even if it started out as an image of the same person, although templates from the same person are more similar than templates from different people. The accuracy of facial recognition continues to increase alongside deployments in more challenging and complex environments What happens next sounds simple although the technology is extremely complex: templates of people’s faces are taken in real time and compared to those in the database. The technology identifies individuals by matching the numeric template of their face with all the templates saved in a database in a matter of seconds or milliseconds. To put this into perspective, imagine you are at the turnstiles of a busy train station looking for a person on the run. Today’s facial recognition technology would be able to identify that person should they pass in view of a CCTV camera, as well as notify the police of any additional persons of interest, whether they are a known terrorist or missing vulnerable person on an entirely separate watch list. Because of technical progression, facial recognition can now be used in a variety of governmental and commercial environments, from identifying barred hooligans attempting entry at a football stadium or helping self-excluded gamblers at casino to overcome addiction. Real-Time Assessments The latest evolution of facial recognition pits the technology against an even more challenging application – directly matching individuals from body worn cameras for real time recognition for police officers on the beat. This capability equips first responders with the ability to detect a person from a photo and verify their identity with assurance. The broader implication for this means that every interaction, such as stop and search or arrest, can be supported by real-time facial recognition which will see cases of mistaken identity driven down on the streets. First responders can now for the first time be deployed and furnished with the ability to identify wider groups of people of interest with a degree of accuracy that previously relied only on the fallible human memory. As the accuracy of the technology continues to increase alongside deployments in more challenging and complex environments, its ability to support government initiatives and law enforcement means the debate about the lawful and appropriate use of facial recognition must be addressed. Facial recognition should not be everywhere looking for everyone, but when used properly it has the potential to improve public safety and we should make the most of its potential.
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: Prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many ways, the coming crosspollination of residential and commercial security offerings means we will have a better idea of best practices. The convenience of residential spaces will combine with the robust security of commercial facilities, for example. But this also means a higher level of demand will be placed on security integrators, facility managers and owners. Operations groups may need to change drastically to offer new technologies. Security as a service is likely to become more common. And new technologies are emerging that will facilitate this change and require new skillsets and expertise. So, what the market should be thinking about right now is: How do we all, collectively, keep up? More critical is finding ways to offer or utilize new technologies and total solutions that make operations easier Ensuring Security Preparedness As it stands now, in terms of physical security for doors and openings, we are currently in a world where we can secure almost anything. Be it hospital, school, file cabinet, server rack, grain silo or barn that is off the electrical grid, we have a solution for that. So being hyper-aware of your industry, its offerings, and how the products work together is important, as it means every location that needs security can have security. But perhaps more critical is finding ways to offer or utilise new technologies and total solutions that make operations easier, moving security components deeper into a building, facility or campus, and building and leveraging on partnerships where everyone is invested in the other’s success. Here are a few suggestions for addressing these issues. Training In New Security Solutions Perhaps the biggest change in the near term will be emerging technologies that will alter how we currently use security solutions. Be it cloud-based security, intelligent keys, new types of credentials, or simply a better software for management, the need to be well-versed on these offerings is key. To this end, it is important to not only know what offerings exist in the security world, but also be well-trained on them. Seek out a manufacturer that is willing to offer training and education on products, strategies and solutions. While it is important to secure server rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself Identifying An End Goal Further, approach the integration and implementation of these technologies with a collaborative mindset. For dealers and integrators this means utilizing new technologies to better secure a facility for a client. As a building owner or manager, it means making tenant and occupant life better while streamlining your own operations. The ultimate goal of any new technology is to meet customer needs in the very best possible way. And that goal should trickle down from manufacturer to integrator to the facility manager and ultimately the end user. Don’t just implement technology for the sake of doing so. Do it with purpose by identifying an end goal and utilising these amazing solutions to achieve that. Identifying an end goal also means seeking out the core requirements a building has to provide users with the expected level of security and service. This is obviously dependent on the building, and it doesn’t always mean physically moving into a building, but rather looking at ways to move further into the operations of a business. Securing Access To Buildings Government facilities are undergoing a transition to security requirements dictated by the FICAM programme For some businesses, keeping server racks or file cabinets secure can be critical. And while it is important to secure these rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself. New opportunities also fall into this category. Government facilities are currently undergoing a transition to security requirements dictated by the Federal Government’s Identity, Credential, and Access Management (FICAM) programme. FICAM sets standards for implementation of secure access to all government facilities and mandates the use of FIPS 201 Personal Identity Verification (PIV) for federal employees and contractors. This means that PIV enabled access points will be required on the perimeters, interiors and other openings. Finding ways to retrofit these affordably, efficiently and effectively means offering more secure openings on what is likely to be a tight budget. This can also apply to offsite facilities. Earlier I mentioned barns and grain silos – locations that are often left off electrical grids but can come with the need for auditing capabilities – and a solution exists for that. So, while a corporate headquarters might be under robust lock and key, it is always good to ask about other locations that could use a simple security upgrade. Personal Identity Verification-enabled access points will be required on the perimeters, interiors and other openings Establishing Security Partnerships Again, the best way to achieve readiness with this approach is to be aware of the market and its offerings, and to engage in collaborative partnerships. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter most. Manufacturers rely on the integrators and building supervisors to understand the new and developing needs in the industry. Integrators then must rely on manufacturers to provide these solutions, offer education and training, and be in constant contact about the newest technologies available. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter mostAnd building owners or managers must both be aware of their tenant and end user needs and demands – be it for new technologies or even seeking out sustainability solutions. In turn, they need to know they can rely on a collaborative approach from an integrator and manufacturer who is invested in their success. Industry Collaboration For A Secure Future Again, the biggest thing we must all need to consider now is how to prepare for the future. Treading water is simply not enough in the security market anymore. New technologies and performance expectations are forcing us to consider ways to better serve our clients – whether we are a manufacturer, integrator or in charge of facilities. And the best way to do this is together. We are all invested in the success of one another, and in the people who use the places we strive to keep safe. By seeking out, developing, and cultivating these partnerships in collaboration and innovation, we are able to help one another prepare for the future that is becoming more complex, intriguing and exciting every day.
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable employees to store firearms in their vehicle’s trunk or glove compartment despite any corporate ban on weaponry. The laws have evolved as an expression of the Second Amendment “Right to Bear Arms” in the last decade or so. There is some variance in the laws from state to state, but they generally allow a citizen to carry a gun to and from work and keep it stored out of sight in their vehicle.Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show Employee Second Amendment Rights “The laws contend that employees should not have to give up their Second Amendment rights between home and the workplace and should be able to have a gun with them for protection from their front door at home to the front door of the workplace,” says Eddie Sorrells, Chief Operating Office/General Council of DSI Security Services. Sorrells will speak about the current state of the laws, how they came about, the nuances of state-to-state differences, and the possible impact on overall corporate security in a session titled “Employees Who Carry: Preventing Workplace Violence” at the upcoming GSX conference in Las Vegas, September 23-27. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Sorrells’ session will be Sept. 24 from 10:30 to 11:45 a.m. Restrictions On Gun Visibility Employees may think the “right to carry” extends to the workplace, but the right only extends to the parking lot. The company still has the right to ban guns inside the premises. However, it is unlawful in some states for companies to search vehicles in parking lots, and companies who do so are violating the law, says Sorrells. Among the various state laws, some exempt public education institutions and other public venues. Depending on how the laws are written, there may be other exemptions, too. In Florida, for example, the law exempts any organizations that have explosives on site. With weapons on a company's property, a high-risk termination could potentially become violent Most laws require weapons to be stored securely out of sight. However, in Alabama, for example, it is legal to store validly permitted guns in full view during hunting season, Sorrells says. A resident of Alabama himself, Sorrells has been in the contract security business for 27 years, working mostly in multi-state operations. He has worked for 500 or so corporate security organizations throughout the country and is a practicing attorney who has studied issues of workplace violence and active shooters. “There is a political element to these laws, which were created with the goal of protecting Second Amendment rights,” says Sorrells, who says he sees arguments on both sides of the issue. However, political opinions aside, “if you’re a business owner, you have to contend with dozens of weapons on a company’s property,” he adds. “That could be an issue if a high-risk termination could potentially become violent. You have to assume there is a weapon in that person’s vehicle.” Sorrells' session will dive into the case law and illuminate some of the legal issues and how courts have addressed them GSX Education Program After the session, Sorrells hopes attendees will take away a good working knowledge of the state of the laws, how to comply with the laws, and issues such as posting of signs. The session will dive into the case law and illuminate some of the legal issues and how courts have addressed them. The timely session is an example of the valuable information attendees can gain by attending GSX. Sorrells has been attending the yearly ASIS International Conference and Exhibits for more than 20 years, at least since the mid-1990s. As the pre-eminent security organization around the world, ASIS International provides unrivalled educational and networking opportunities at the yearly conference, he says. “There is a vast amount of networking and educational offerings on a wide variety of topics, including technology, legal issues, risk management, workplace violence, consulting, and anything under the sun,” says Sorrells. The newly branded GSX education program is led by subject matter experts from ASIS International, InfraGard (a public-private partnership between U.S. businesses and the Federal Bureau of Investigation), and ISSA (Information Systems Security Association). Sessions will deliver valuable, actionable takeaways to help attendees shape their security strategies. There will also be an exhibition of 550-plus suppliers and manufacturers highlighting the latest security solutions.
The U.S. Congress has voted on, and the President has signed, a ban on government uses of video surveillance equipment produced by two of the world’s top manufacturers – Hikvision and Dahua. The provision is buried in the National Defense Authorization Act (NDAA) for fiscal year 2019, which passed the U.S. House of Representatives on July 26 and the Senate on August 1. The President signed the NDAA into law on August 13. The provision was originally introduced as an amendment to the House version of the bill but was not included in the Senate version. However, the provision survived in the final version, negotiated by a conference committee and passed by both houses. The President had previously voiced support for the bill, which authorizes U.S. military spending, and signed it into law two weeks later. Scope Of The Ban The President has previously voiced support for the bill, which authorizes U.S. military spending, and signed it into law two weeks later The ban covers “public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes.” It bans “video surveillance and telecommunications equipment produced by Hytera Communications Corporation, Hangzhou Hikvision Digital technology Company, [and] Dahua Technology Company (or any subsidiary or affiliate of such entities)..” Hytera Communications is a Chinese digital mobile radio manufacturer. The final bill eliminates specific mention of “white label” technology, which refers to cameras manufactured by Hikvision and/or Dahua but rebranded and labeled by other companies such as Honeywell, Stanley or UTC. However, interpretation of the word “affiliate” could include OEM partners. The ban, which takes effect “not later than one year after … enactment,” applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a "phase-out plan" to eliminate the equipment from government uses. The requirement suggests an opportunity of additional government business for non-Chinese manufacturers and integrators involved in switching out the equipment. Mention of the words “critical infrastructure” in the final bill points to inclusion of another whole category of installations in the ban; that is, facilities operated by non-government entities that are judged to be essential to the functioning of society and the economy. The Security Industry Association (SIA) declined to comment on the bill, citing its complexity and the need to research the potential impact. Both Hikvision and Dahua have issued corporate statements in reaction to the ban. The bill can be viewed in the context of a broader U.S. political backlash against China in general Broader Context Of The Bill The bill’s passage is a setback to the growing profile of Chinese companies in the video surveillance market. It can also be viewed in the context of a broader U.S. political backlash against China in general, as evidenced by the recent acceleration of import tariffs and simmering trade war. The NDAA also targets China in another way: it strengthens the Committee on Foreign Investment in the United States, which reviews the impact of proposed foreign investments on national security.The NDAA is an annual act passed by Congress that authorises U.S. military spending Another view is that Chinese companies invest heavily in research and development, can operate at greater scale and with lower costs, and therefore provide good overall value. For these reasons, many had expected Chinese camera products to increase their presence in the US market. The government ban, at the very least, slows down that transition. The potential is there for it to totally change the face of the industry. The NDAA is an annual act passed by Congress that authorises U.S. military spending and is used as a vehicle for a variety of policy matters. It has been passed annually for more than 50 years. The August 1 Senate vote marks the earliest Congress has passed the defense spending bill since 1978. Ironically, the final bill softened restrictions on China’s ZTE Corp. and Huawei Technologies, two telecommunications companies, because of national security concerns. These restrictions are weaker than in earlier versions of the bill. This article was updated on the 14th August 2018.
The U.S. House of Representatives has voted 351-61 to ban federal agencies from buying Chinese-made surveillance cameras. The measure was passed May 24 as an amendment to House Bill 5515, the Fiscal Year 2019 National Defense Authorization Act (NDAA), which is the funding plan for the military that also maps out a variety of policy priorities. The bill is at least several months away from becoming law, and it must still be considered by the Senate and then by a House-Senate conference committee before final passage. Changes can be made at each stage. It would also have to be signed by President Trump. The amendment targeting video surveillance cameras was offered by Congresswoman Vicky Hartzler, a Missouri Republican. “Video surveillance and security equipment sold by Chinese companies exposes the U.S. government to significant vulnerabilities and my amendment will ensure that China cannot create a video surveillance network within federal agencies,” says Hartzler in a press release. Companies Affected By The Ban The proposed ban appears to lump our industry’s familiar video surveillance players together with other companies that the U.S. government has targeted for security concerns. Also mentioned in the amendment are Hytera Communications, a Chinese digital mobile radio manufacturer previously charged with patent infringement; and ZTE Corp., a Chinese telecommunications company accused of violating trade-sanction agreements and posing a threat to U.S. national security. The bill also mentions Huawei Technologies Co. Ltd., a Chinese telecommunications manufacturer previously investigated as a national security threat.The proposed ban appears to lump our industry’s familiar video surveillance players together with other companies that the U.S. government has targeted for security concerns Two familiar companies in our industry – Hikvision and Dahua – are mentioned in the bill by their full names, Hangzhou Hikvision Digital Technology Co. and Zhejiang Dahua Technology Co. In addition to their branded video lines, the two companies also are the largest providers of OEM/'white label' cameras and video systems that are sold under other brand names, such as Honeywell, Stanley and UTC. The bill specifically mentions the inclusion of white label technology in the ban. Addressing Concerns In the case of Hikvision, one concern is whether the company is owned by the Chinese government. Hikvision has previously addressed this issue, emphasizing its ownership by “a diverse set of private and public entities” with the largest share belonging to a Chinese state-owned enterprise (SOE). Hikvision declined to comment for this article. However, the company has published a statement (“Special Bulletin”): “We are actively working to assure our North American stakeholders that Hikvision strictly abides by the laws and regulations of each country in which it operates. We also affirm the fact that we hold our products to the industry’s global cybersecurity standards, including North America.” The Hikvision statement continues: “As we continue to monitor and further deploy the necessary resources to address this matter over the coming weeks and months, please know that we will vigorously defend Hikvision from dangerous and unproven accusations about the cybersecurity of our products and solutions.” If SIA decides to take a position based on member feedback, it will occur during the normal legislative process" Commitment To Compliance Dahua answered our requests for a comment with the following official response: “Dahua Technology is a commercial enterprise with a high level of business integrity. The international company [is] committed to compliance with all applicable laws and regulations in the countries in which it does business.” The company’s response continues: “Dahua Technology dedicates 10 percent of its revenue to research and development annually. Dahua has designated cybersecurity as a top priority and takes a comprehensive and systemic approach, with complementary and redundant safeguards built into its technology, services and organizational practices. Dahua Technology is positioning itself as a cybersecurity leader within the video surveillance industry.” The Security Industry Association (SIA) has submitted the House amendment to its government relations committee for review and consideration. “Any recommended position by the government relations committee will be referred to the SIA Executive Committee for their consideration and approval,” says Don Erickson, CEO of SIA. “If SIA decides to take a position based on member feedback, it will occur during the normal legislative process as the bill is considered by the Senate, and then ultimately by a House-Senate conference committee.” Impact On Global Video Camera Supply Congresswoman Hartzler’s amendment is aimed at “ensur[ing] federal agencies do not purchase Chinese-made surveillance cameras,” according to the press release from her office. Obviously, there are more than just the two mentioned companies manufacturing surveillance cameras in China, so the question becomes whether the intent is to ban all Chinese cameras from government use. Such a proposal would create an even larger issue, given that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, according to one industry source.60 to 65 percent of the global supply of commercial video cameras are manufactured in China, according to one industry source The bill does not address the possible use of Chinese-made components in cameras that are assembled elsewhere in the world (but technically are not 'made in China'). “Those types of issues are commonly explained in implementation guidelines that would be created afterwards if the proposed language becomes law,” says Erickson. The NDAA is unlikely to become law for several months. A version previously passed by the Senate Armed Services committee must be presented to the full Senate, where it can also be amended. Then the House and Senate bills must be reconciled.
Edesix, a provider of Body Worn Cameras (BWC), announces that it has teamed up with retailer Asda to enhance in-store security. After a successful trial, which began in 2016, there are now over 900 Edesix VideoBadges being utilized in over 250 sites nationwide, with more growth expected in the near future. Edesix collaborated with CBES, Asda's preferred security installer, to design and install a tailored wearable CCTV deployment system perfectly suited to the retail giant's needs. Edesix and CBES worked closely at Asda's national security center and across four store deployments to provide them with the knowledge and expertise so the cameras could be rolled out in the remaining stores with minimum impact on store efficiency. Improved Colleague Security Asda has been able to improve colleague security, diffuse aggressive and volatile situations and reduce valued investigation time This system, which is intuitive to use and requires minimum training, has enabled staff to integrate the cameras into their daily working processes with minimal fuss. As a result of this partnering strategy, which relied on both the innovative nature of Edesix's technology and communication between all parties, Asda has been able to improve colleague security, diffuse aggressive and volatile situations and reduce valued investigation time, thus reducing costs. Since the deployment, Asda has proven the viability of these cameras by securing numerous convictions relating to theft and violence against staff. Confrontation preventer Richie McBride, managing director of Edesix, explains: "Asda, along with CBES, identified the need to re-think its key security policy around challenging aggressive behavior towards staff. In searching for a technology partner, CBES chose Edesix as their BWC provider, to deploy initially to the most affected stores, eventually rolling out to over 250 sites across the UK. The aim was to improve the safety of colleagues in public facing roles and shoppers within the stores, while producing compelling evidence when needed." The Body Worn Cameras act as a confrontation preventer, as it is proven that members of the public are far less aggressive to staff members" McBride adds: "The Body Worn Cameras act as a confrontation preventer, as it is proven that members of the public are far less aggressive to staff members if they know they are being filmed." Winning major contracts Edesix, which was recently acquired by US-based security specialists Vigilant Solutions, has enjoyed a great deal of success lately, ranging from winning some major contracts with the likes of UK prisons, Scotrail and South Australian Police, to being named in the Sunday Times Hiscox Tech Track 100 league table. Edesix currently supplies markets across the globe, through direct sales and international partners, to geographies including the UK, Europe, USA, Canada, the Middle East and Australasia.
Teleste Corporation reveals that its S-AWARE platform has been selected by Helsinki City Transport to drive improved situational awareness and safer traveling across the Helsinki metro system. The deployment of the platform will be started in 2019 and the project will be carried out in several phases and be completed at the end of the year 2020. The total value of the deployment will be more than two million euros. “We are delighted to expand our long-term cooperation with Helsinki City Transport on developing smart and safe public transport in the Helsinki metropolitan area. The rapidly growing urbanization challenges public transport operators throughout the world to find solutions that can provide enhanced operational control and tools to increase safety in public places. Adding situational awareness through intelligent public transport systems is one of the key methods the operators can use to reach the target,” stated Esa Harju, Head of Teleste’s Video Security and Information Business unit. Prioritizing Passenger Safety Every year, over 80 million passengers and commuters enjoy traveling in the system, which forms the northernmost metro in the world During recent years, the Helsinki Metro has undergone several upgrades and major extensions. Today, it includes more than 20 stations in Helsinki and its neighbouring cities and serves the capital region of Finland with hundreds of thousands of daily rides. Every year, over 80 million passengers and commuters enjoy traveling in the system, which forms the northernmost metro in the world. Keeping the safety and security of the passengers and the entire metro system in mind, Helsinki City Transport is adopting Teleste’s S-AWARE platform to develop their response capabilities and to ensure a high service level, e.g., during possible security failures, alerts and states of emergency, as well as in other complex or critical situations. Safe And Attractive Traveling Experience “Helsinki Metro is being developed to bring seamless mobility to the growing metropolitan area. At Helsinki City Transport, our mission is to continue building an increasingly effective and highly functional metro system that provides a safe and attractive traveling experience for our customers in their everyday life" told Ville Lehmuskoski, CEO, Helsinki City Transport. Teleste S-AWARE platform has been designed to help enhance efficiency, safety and security in public transportation, airports, critical infrastructure The Teleste S-AWARE platform has been designed to help enhance efficiency, safety and security in public transportation, airports, critical infrastructure and in the governmental sector. The platform works by collecting real-time information from various subsystems, data sources and sensory inputs, and it displays a unified and real-time view of the whole operational infrastructure. This provides for the improved understanding of what is happening in the surroundings and creates grounds for sharp and efficient decision-making. Smart Incident Management In addition, the platform can be used to pre-define automated operating procedures for efficient and smart incident management, hence ensuring that corrective action is immediately taken when unexpected incidents occur. The advanced reporting, debriefing and training tools ensure that the system can be used to project future events and be prepared for exceptional situations. Teleste’s deployment to Helsinki City Transport will also enable efficient use of the system for multiple other operators, including the police, fire and rescue forces, Helsinki Regional Transport Authority, and the cities of Helsinki and Espoo. Delivering the right information to the right people at the right time, the system is harnessed with high information and data security that guarantees protection from any unauthorized access.
Vicon Industries Inc. (VCON: OTCQB Venture Market) ("Vicon"), designer and manufacturer of video surveillance and access control software, hardware and components, announced today that Louisa County Public Schools, in Northern Virginia, has completed installation of a district-wide Vicon Valerus video management solution that encompasses its six school buildings and connects nearly 400 cameras. The system includes multiple application servers and NVRs running Valerus VMS software, as well as a wide range of Vicon IP megapixel camera models. The district has opted to share camera access with the Louisa County Sheriff’s Department, whose officers can use iPads and smartphones to immediately call up video through the Valerus VMS interface in case of an emergency. This allows them to visually assess any situation and locate the perpetrator before sending in officers. Vicon Sponsored Training Class The Valerus solution was chosen by Louisa County Public Schools because of Vicon’s willingness to provide the district’s in-house electricians and technical team with as much autonomy as possible in setting up and managing the system. After participating in a Vicon sponsored training class, the district has been self-sufficient in its ability to install, program and troubleshoot Valerus. David Szalankiewicz, LCPS Facilities Director, says "Vicon’s technical team has supported our in-house guys directly with training and certification so that we feel completely in control." Ron Lapsley, Vicon’s Regional Sales Manager who worked on the project, explains, "Vicon understands that the technical capabilities and service needs are different for each customer, and we’re glad to provide the right level of support that makes sense. In many cases, the manufacturer relationship is as important as the product itself in making sure a customer is satisfied."
Genetec Inc., global technology provider of unified security, public safety, operations, and business intelligence solutions, announced that its unified platform, Security Center has been integrated with Secure Store, a profit protection and exception reporting solution developed by Appriss Retail. With this integration, retailers can now immediately disprove or validate suspicious transactions by accessing the security video evidence associated with suspected fraudulent activity. Security Center And Store Integration Secure Store enables retailers to significantly mitigate losses related to fraud, theft, and operational/systemic breakdowns. Using artificial intelligence and machine learning, Secure Store performs advanced exception modeling from multiple data sources and enables immediate corrective action. US-based retailer, DICK’s Sporting Goods, is using the Security Center platform to monitor over 18,000 cameras across 720 stores and manage 230 cameras and 130 doors at its headquarters. The organization is now using the joint Genetec/Appriss Retail solution to provide immediate insight, reduce shrink, improve profitability and achieve rapid ROI, as Jacob Gillette, Director of Loss Prevention and Operations, DICK’s Sporting Goods explains: Genetec/Appriss Retail Solution The Genetec system, combined with the Appriss Retail Secure Store application gives us capabilities that help speed up our investigations" “The Genetec system, combined with the Appriss Retail Secure Store application gives us capabilities that help speed up our investigations, which has been hugely beneficial to our organization. Our investigation team can now easily retrieve video from Security Center to validate suspicious transactions that are flagged by the Appriss Retail exception reporting system.” Thanks to the integration of Security Center and Secure Store, retailers can now simply click on the video icon within the Secure Store interface to immediately identify and review the security video related to individual transactions. This allows them to evaluate detailed evidence related to all refunds, transaction items, discrepancies between what is being scanned and what is on the bill, and quickly determine if there was indeed a problem. Importance Of Video Evidence In Fraud Cases The open architecture of Security Center allows us to work with partners like Appriss to provide comprehensive solutions that benefit our joint end users" “When you investigate fraud, you need to be able to validate questionable behavior. This is why video evidence is so critical. Thanks to our partnership with Genetec, we are now able to provide our customers with immediate insights that allow them to make informed decisions and build defensible cases based on hard evidence,” said Corey Adams Vice President of Global Client Services for Appriss Retail. “We’re pleased to be able to assist retailers with integrations that help make their teams more productive and significantly reduce loss. The open architecture of Security Center allows us to work with partners like Appriss to provide comprehensive solutions that benefit our joint end users,” said Scott Thomas, Director of Retail Market Development at Genetec.
Located one hour outside of London, the borough of Runnymede is a local government district with over 80,000 residents in the county of Surrey. It is one of the most prosperous parts of the London commuter belt and home to some of the UK’s most expensive real estate. In order to enhance public safety, the borough council contracted service provider Safer Runnymede. Working with Nottinghamshire-based systems integrator Central Security Systems, the experts installed a platform combining public safety technology with personal safety services such as care solutions for the elderly. Bosch Video Security System Today, Safer Runnymede coordinates all connected solutions in a Control Room in the town of Addlestone, where a staff of three operators monitor security feeds from over 500 security cameras deployed around various boroughs within Surrey. Next to public streets in the area, the flexible system also monitors schools, hospitals and other public buildings around the clock. Every year, the team responds to 20,000 incidents from cameras, and the video security system has proven an asset in monitoring traffic, preventing crime, as well as providing evidence and following suspects after incidents. But achieving this level of integration was a challenge. Connecting the solutions via the BVMS allowed Runnymede to become one of the first councils to invest in a fully IP-based infrastructure Initially, the video security system consisted of hardware from several different manufacturers including Bosch – making updates or replacements a time-consuming process – that was networked on a Bosch Video Recording Management (VRM) solution. Looking for a future-proof and scalable system built on an integrated software platform, the officials in Runnymede tasked Bosch to design a fully IP-based security camera architecture. IP Video Surveillance System Since the Safer Runnymede system already included a Bosch monitor wall plus encoders, cameras, VRM and storage devices, system integrators could leverage the initial investment into a full suite of Bosch solutions. The system now combines new high-resolution AUTODOME IP 4000, AUTODOME IP 7000, MIC IP 7000 moving cameras, and FLEXIDOME IP 7000 fixed cameras, plus older Bosch and third-party analog cameras paired with encoders, decoders, and DIVAR IP 3000, 5000, 6000, and 7000 recorders. Connecting these solutions via the Bosch Video Management System (BVMS) allowed Runnymede to become one of the first councils to invest in a fully IP-based infrastructure. The flexible system design and management has provided an integrated approach to our business delivery" As a result, Safer Runnymede has benefitted from superior image quality delivered by the added network video security cameras, without the need of replacing the complete existing analog video security infrastructure; all in a resilient, easily expandable system at a reduced total cost of ownership (TCO). What’s more, the customer has used the flexibility of Bosch solutions in a deployable video surveillance camera at remote locations. Installed in a custom-built enclosure provided by Central Security Systems, it streams video data from an AUTODOME IP 4000 camera via 4G and sends alerts via SMS to the Control Room upon detecting activity such as illegal waste dumping. Bosch Video Management System Migrating from a fragmented, analog system to an integrated IP network managed via BVMS (Bosch Video Management System) has proven a forward-facing decision. “The flexible system design and management has provided an integrated approach to our business delivery, allowing us to make better operational decisions and become more dynamic and competitive in the video surveillance marketplace, “says Les Bygrave at Safer Runnymede.
Opengear, a provider of solutions that deliver secure, resilient network access and automation to critical IT infrastructure, today announced CSC – IT Center for Science Ltd, a Finnish center of expertise in Information and Communications Technology, has deployed Opengear Smart out-of-band appliances to streamline a major upgrade project and improve day-to-day remote management. CSC, a non-profit organization with 70% ownership by the state of Finland and 30% controlled by Finnish higher education institutions provides services for research, education, culture, public administration and enterprises, to help them thrive and benefit society at large. CSC's primary customers are the Ministry of Education and Culture and organizations within its field of operations, higher education and research institutes and public administration sector. Planned Network Upgrade As Antti Ristimaki, Senior Network Specialist for CSC explains, "Getting from our data centers to some of the sites we look after might take many hours and so having remote out-of-band access is vital for us." CSC has used a legacy out-of-band (OOB) console server solution for several years, but with a major network upgrade planned for 2018-2020 it was decided that more flexibility was needed to help the small networking team support clients at around 40 sites spread across the country. "What we liked most about Opengear was its small footprint and high-quality software along with the 4G mobile connectivity option which provides us with the option to deploy the OOB console server at site before we have any working in-band access," says Ristimaki. Setting up the devices took very little time and we are now remotely managing the process" Remotely Configure Networking Equipment CSC has already deployed Opengear ACM7004-5-LMR - Resilience Gateway appliances at around 10 locations across the country, which were initially used to help remotely configure networking equipment at sites connecting to its newly upgraded backbone network. Having a remote access server at distant locations makes it easier to reliably commission and configure new network equipment from its main offices at Espoo and Kajaani. At the final stage, there will be around 40 Opengear Resilience Gateway appliances across the country. "Setting up the devices took very little time and we are now remotely managing the process - which has proved surprisingly simple using 4G LTE and even 3G connections," Ristimaki adds. Built-In CLI Tools The built-in CLI tools provided by the Opengear software have proven to be useful especially when commissioning the console server itself. Through this accessibility, CSC has integrated the management of its Opengear Smart OOB devices into its own internally developed network management and orchestration platform based on Ansible. CSC is also using Opengear to help record, and in the event of any problems, rollback critical firmware upgrades and configuration changes for core networking elements at remote sites.