Dahua Technology, a globally renowned video-centric smart IoT solutions and services provider, has announced the release of DMSS, its newly designed mobile client. DMSS can connect Dahua products via the Internet or Ethernet through P2P or IP, and can also be operated remotely. It supports all kinds of product types, including NVR, XVR, IPC, TPC, VTO, Alarm Hub, and Access Control, etc. Remote operations DMSS can work in an environment with multiple internet connections. It connects Dahua prod...
We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be...
Ping Identity, the Intelligent Identity solution for the enterprise, announced the availability of its Workforce Identity Solutions in AWS Marketplace. These cloud-ready solutions enable enterprises to secure remote work and boost employee productivity by providing the ability to easily extend access across Software-as-a-Service (SaaS), legacy applications, cloud applications and more for seamless login experiences. With AWS Marketplace availability, Amazon Web Services (AWS) enterprise custome...
Versa Networks, the Secure SD-WAN provider, launches Versa Secure Access, the solution delivering Secure SD-WAN services and private connectivity for employees who are remote or working from home. These employees can now securely connect to applications in both private and public clouds as part of Versa Secure Access Service Edge (SASE) services. The new solution is based on the Versa Operating System (VOS™) which powers Secure SD-WAN networks on-premises and in the cloud for thousands of...
Customers may know it as DMP’s enhanced all-in-one system — and until now, the XTLtouch has only been available to Verizon customers. DMP is pleased to announce that the XTLtouch Wireless Control Panel with AT&T LTE is here. “We’re very excited about this,” says DMP’s Vice President of Sales Mark NeSmith. “No other all-in-one offers the same powerful and flexible solution. For areas that require AT&T service, this allows our dealers to much more...
Interface Security Systems, a managed services provider delivering managed network, asset protection, and business intelligence solutions to distributed enterprises, introduced a new interactive security service that allows businesses to equip at-risk staff with a wearable safety device that is directly connected to the Interface Interactive 24/7 Central Command Centers. Through a partnership with RiskBand, a provider of wearable live-monitored safety devices, Interface is enabling businesses i...
Rhombus Systems, a cloud physical security platform, announces a strategic partnership with global real estate investment management company CA Ventures, through which Rhombus Systems will provide CA with a video security platform for multifamily and student housing communities. The platform will be capable of supporting an unlimited number of cameras and locations from one console – fully accessible from any web browser or mobile device. “The real estate sector has been going through a massive technological shift, accelerated in many respects because of the COVID-19 pandemic,” said Mark Zikra, vice president of innovation at CA. “Aligning with technology companies is an absolute must to stay relevant in today’s industry and provide a level of resiliency that’s not achievable with traditional systems. Rhombus’ AI software makes it possible to manage and improve internal operations while delivering an experience for our residents, which is our top priority.” Remote access video security solution Rhombus Systems provides a centralized video security solution to help CA scale its security across its properties. By being cloud-based, Rhombus Systems provides 24/7 remote access and is not limited by the number of cameras, locations, or users it can host on the platform. This enables CA to standardize security and streamline operations for community managers to better serve their residents. Additionally, Rhombus Systems includes AI technology so that managers can receive alerts for specific events – such as trespassers, loiterers, and vandals – and easily share video with local authorities, promoting the safety of residents and their guests, as well as neighbors in the surrounding community. With its advanced security cameras and smart IoT sensors, Rhombus Systems is also exploring ways to help property developers like CA be more agile and resilient in the face of challenges like COVID-19. Commercial video security “Historically, trying to deploy a video security system is a major pain point for commercial real estate organizations with multiple locations,” said Garrett Larsson, CEO of Rhombus Systems. “Organizations are often forced to go with subpar systems without realizing there’s better options out there. That’s why we designed Rhombus to be as simple and straightforward as possible to ensure video security is seen as a powerful operational tool rather than just a video recording device. This partnership with CA will show other commercial property owners how vital video security is in promoting an upscale and comfortable environment for tenants.” Additionally, CA Ventures will take advantage of Rhombus’ ability to integrate with other enterprise systems, including cloud access control and modern intercom systems. By leveraging these interoperable systems, CA will be able to elevate the guest experience by utilizing, smart technologies. Surveillance of the exterior of the building CA Ventures’ and Rhombus Systems’ first planned deployment will take place at Uncommon Tuscaloosa, an off-campus student housing community near the University of Alabama, and will feature more than 100 cameras throughout the exterior of the building, parking garage, and amenity spaces. “Innovation and technology are at the forefront of our strategic global vision,” said Zikra, "Partnering with Rhombus provides a critical piece of our integrated building and operations platform that will supplement existing systems and processes that promote resident comfort.”
Digital Guardian announced that it has released a new research report, The DG Data Trends Report, which assesses the risk of sensitive data loss during the COVID-19 crisis. The research is based on aggregated and anonymized data from nearly 200 customers of Digital Guardian’s Managed Security Program around the globe. It represents a wide range of organization sizes and industries, including financial services, manufacturing, healthcare, and business services. As they continue to work from home, employees from these companies regularly interact with regulated and structured data as well as unstructured intellectual property and trade secrets. The data set analyzed was from January 1 – April 15, 2020 and comparative data was evaluated from January 1 – February 29, 2020 (before the global onset on COVID-19) vs. March 1 – April 15, 2020 (after the COVID-19 pandemic came to the forefront). Sensitive data loss This enabled Digital Guardian to compare data egress patterns before and after the work from home transition took place and gauge its impact on the risk of sensitive data loss, now and in the future. Key Findings: There was a 123% increase in the volume of data downloaded to USB devices by employees after the pandemic declaration and working from home became widespread. 74% of that data had been classified by organization data governance policies. Cloud storage and USB devices became the most preferred egress paths after the COVID-19 emergency declaration, accounting for 89% of all data egressed. Data egress via all paths (email, cloud, USB, etc.) was 80% higher in the first month following WHO’s COVID-19 pandemic declaration. More than 50% of the data egressed was classified. From March 11 - April 15, employees uploaded 336 TB of data to the cloud, a 72% increase from January and February combined. After the WHO’s declaration, Digital Guardian’s Managed Detection & Response analysts also saw a 62% increase in malicious activity from external attackers, a number that corresponded to a 54% increase in incident response investigations required. USB device usage Our research indicates remote employees are egressing classified data at unprecedented rates" IT and security professionals should pay particular attention to the significant uptick in USB device usage as they inherently increase the risk of sensitive data loss due to their portability and likelihood of being misplaced, lost or stolen. “Organizations have accepted that the economic and health effects of COVID-19 will be with them for the foreseeable future and working from home will remain a requirement for many of their employees,” said Tim Bandos, VP, Cybersecurity, Digital Guardian. Data security enforcement “Our research indicates remote employees are egressing classified data at unprecedented rates across all egress paths. Executives and security teams would be wise to consider implementing solutions that provide visibility into this behavior, and a means to control it, in order to avoid a potential data breach.” The DG Data Trends Report contains more in-depth information, including statistics on additional data egress channels and points of risk that were monitored, a primer on data security enforcement actions, examples of COVID-19 phishing attacks, as well as recommendations to protect remote workforces.
Maxxess Systems, a global renowned provider of event response management and collaboration systems, is pleased to announce their partnership with Seek Thermal, an advanced imaging technology company, to deliver a complete temperature screening solution to help manage health risks. Temperature screening solution Unlike stand-alone systems for temperature screening, this new complete solution helps organizations not only detect health risks in real time, but also to trigger immediate automated security system protocols and then follow through by taking appropriate actions in accord with their policies and tracking results to completion. “The Covid-19 pandemic demonstrated to all companies the importance and value of detecting potential health threats and initiating a response as quickly as possible,” said Nancy Islas, President at Maxxess Systems. Integration with automated response system New complete solution integrates the latest temperature screening technology with our automated response system" Nancy adds, “This new complete solution integrates the latest temperature screening technology with our automated response system that can initiate immediate action and then guide managers as they deliver trusted information to authorized personnel and follow through to ensure the safety and security of their staff and visitors.” “As the Covid-19 isolation lock downs are eased, Health screening will be an essential part of re-opening and will probably continue to be an ongoing part of our healthy future,” said Mike Muench, CEO of Seek Thermal. Mike adds, “By combining our reliable temperature screening system with the Maxxess response coordination system, we will give organizations the tools to detect potential health risks and take the next appropriate steps.” Non-contact thermal imaging technology This unique new technology brings together two key elements to help create the complete temperature screening solution. The first element is the simple, accurate automated temperature screening system from Seek Scan that is specifically designed and calibrated for skin temperature measurements. This non-contact thermal imaging technology is perfect for lobbies, hallways, and other key access points. InSite Health Risk Management application When a person with an elevated temperature is detected, an alert is set to the second key element of the system, InSite’s Health Risk Management application from Maxxess. The InSite system is integrated with access control, communication, and other systems and can take immediate action programmed to be in alignment with company policies. For example, the system can deny entry to the individual and instruct them to wait for an HR representative. Efficient health screening and status update It is clear that the need for health status screening will continue into the future If a contagious disease is confirmed, the system can assist management in timely, accurate follow up, surveys to confirm the status of coworkers and recent contacts, and deliver clear, trusted information to all relevant staff. It is clear that the need for health status screening will continue into the future, even after the current Covid-19 lockdowns are eased. This complete solution offers many advantages over stand-alone temperature screening systems, including: The ability to send both the temperature alert and the image of the person to the desktop and/or the mobile app of the InSite system, making it accessible to anyone with authorized access instantly. Because the InSite system provides for remote access, the authorized viewers can be located anywhere inside or outside the facility. InSite integration with access control systems allows for automating the entrances to lock or unlock depending on the temperature screening result. Health Risk alerts can be routed to the responsible departments or people automatically and without delay. There is no need to staff the temperature screening camera, because the appropriate staff can be summoned in the case of an alert. And, the InSite solution logs all actions for audit, review, or similar purposes.
Now that Europe is taking the first steps towards economic and social recovery after the COVID-19 crisis, it is also time to rethink the future. European politicians and institutions are now joining forces to present a recovery plan that builds on existing plans and ambitions to make the society healthier, more environmentally friendly, more energy efficient and safer. Euralarm calls on policymakers to take measures to increase the security of renovated buildings and to strengthen the cohesion of the European Union. The EU Recovery Plan that is soon expected will push for investments and reform. It will strengthen the EU economy by focusing on common priorities, like the European Green Deal, digitalization and resilience. In recent months, European citizens experienced what it means to be confined to one's home all day. Fire safety requirements With around 250 million homes across the EU that need energy renovation, now more than ever, it is time for the EU to invest in renovating homes, offices, schools and other private and public buildings. The Renovation Wave as part of the Green Deal is therefore welcomed by Euralarm and many other stakeholders. Boosting the rate of deep renovation in all buildings not only improves energy efficiency but also economic growth. Building renovation and retrofit add almost twice as much value as the construction of new buildings Building renovation and retrofit add almost twice as much value as the construction of new buildings. While investing more in renovations, governments and authorities as well as building owners need to pay attention to the implications on the fire safety of buildings because renovations can introduce significant changes in fire safety requirements. Energy efficiency measures With the growing number of electronic and electrical devices in buildings, (e.g. energy storage as part of the energy efficiency measures, electric cars), the fire load in buildings will continue to increase and must be considered in the overall fire safety concept. Regular fire safety reviews - including risk assessment - by certified professionals are today even more crucial and should be prioritised by private and public building owners and operators. As one of the Green Deal proposals the “Renovation Wave” is a unique opportunity to introduce a holistic approach towards fire safety and security when renovating buildings. Safe and secure buildings will contribute to the new European economy as well as the future European ecology. Euralarm therefore calls on EU decision makers to encourage all renovated buildings to be fitted with the latest technologies in terms of fire safety and security. Fire safety systems During the crisis, large parts of the European workforce had no other choice than to work from home, using teleconference and digital co-operation tools to continue their daily work. In just a few months, remote work has accelerated the digitalization of the European economy. With ambitious measures supporting a “Digital Recovery”, the digital transformation can be confirmed and amplified in the short term. In the building industry, they have seen the effects of a slow adoption of digitalization and they welcome an acceleration of the digital transformation. During this crisis, connectivity has proven to be pivotal to remote work. It became clear that wherever the company’s members had remote access to security and fire safety systems, there has been no disruption of service provided. The company continued to ensure the safety of the people and infrastructure. Cybersecurity strategy Pivotal to ensure business continuity, connectivity must be immune to cyber-threats Pivotal to ensure business continuity, connectivity must be immune to cyber-threats. Euralarm recommends to reassess the European cybersecurity strategy. Some sectors of the industry – including services – have specificities that should be taken into consideration when rethinking the cybersecurity strategy. The EU Recovery Plan is a unique opportunity to bring the Single Market back on track and to definitely address unjustified barriers that remain in place for products and for services. In this sector, and despite all the efforts to create European standards for products, systems and services, obstacles remain for cross-border trade, especially for SMEs. It is now time to put an end to these barriers and work together towards a society that shares and cares. Sector-specific measures Again, it is the COVID-19 crisis that demonstrates the crucial need that barriers are definitely removed. Therefore, Euralarm calls on the European Commission to engage in a consultation with stakeholders most affected by these remaining barriers to find sector-specific measures to achieve the long-expected Single Market in Europe.
Swann, a globally renowned provider of do-it-yourself security solutions, has announced the release of the Swann Tracker security camera as well as the Swann Enforcer camera systems in 4K resolution, a perfect indoor and outdoor security solution for any home or business. The 1080p resolution Enforcer cameras are coming soon. Swann Tracker security camera The Swann Tracker security camera was first unveiled at the Consumer Electronics Show (CES) 2020 earlier this year and was named a CES 2020 Innovation Award Honoree as the world’s first compact, non-mechanical pan-tilt security camera that includes auto-tracking. The Enforcer is Swann’s latest camera that includes motion-activated, red and blue flashing lights, spotlight, siren (on 4K variant) and additional features to deter intruders. Swann has announced two new additions to their security products line. Swann Wi-Fi Tracker security camera Compact, non-mechanical pan-tilt indoor security camera – It uses innovative auto-tracking technology to track and record moving objects without physically having to pan or tilt. Auto-zoom capability – It ensures any suspicious activity is kept targeted and in-focus for up to 2 objects at once within a second camera view while the main 180-degree widescreen full-room view remains onscreen via the Swann Security app. Infrared night vision which can see in the dark up to 32ft / 10m, automatically turning on when the lights are off. Two-way audio - Greet visitors, talk to pets or warn off intruders. Easy to install - Just plug into power and connect through Wi-Fi. Swann Enforcer security systems Motion-activated police-style, red and blue flashing lights - Deters intruders, while their spotlights, sirens (4K version only), and mobile alerts ensure intruders are left with nowhere to hide. Night2Day color night vision - Available on the 1080P model, this ensures complete protection and peace of mind 24/7. True Detect Heat and Motion technology - Sensing people and cars for more reliable security monitoring and fewer false alarms. Free local storage on DVR - Up to 180 days onto a 2TB hard drive, plus the ability to upload clips to the cloud for free. “While many of us are staying home to reduce the spread of COVID-19, the need to safeguard our homes and small businesses has never been of greater importance. These next generation Swann surveillance products offer advanced features to prevent and deter unwanted intruders outside and inside the house,” said Michael (Mike) Lucas, CEO, Swann. He adds, “Swann’s latest products continue the Swann tradition of providing consumers with easy to use, reliable, home security protection and 24/7 peace of mind.” Total security control via Swann Security app These new products are part of a complete security ecosystem that can be managed under the ‘Swann Security’ app. This gives users a unique ability to control wired and wireless security devices from multiple sites, stream live video, always receive rich notifications and know what’s happening in one place. Swann is the only vendor that offers a complete line up of inter-connectable wired and wireless security solutions that is also completely integrated with Google Assistant and Alexa.
Video surveillance technologies continue to evolve. Salient Systems looks at some of the fastest-growing areas in this sphere, including AI-based video analytics and cloud-based video access and recording. Market awareness will continue to drive interest, which will, in turn, drive available solutions and offerings in 2020 and beyond. Another trend to watch out for is more VMS interfaces offering greater access-to and control-of analytics information and access control systems. This relates to the ongoing trend of consumers moving towards unified video/access/analytics solutions. Consumers will benefit in the coming years from simplified offsite access, automated analysis of security events, and better presentation and reporting of security information. Cloud-based AI Analytics The number of video analytics companies that have come into being over the past three years is tremendous The number of video analytics companies that have come into being over the past three years is tremendous. The growth has accelerated over that time due in great part to the popularity of GPU hardware for applications beyond video games or CAD/ CAM, such as deep learning, computer vision and AI. However, with more sophisticated analytics come significant processing requirements and high server hardware costs. This high hardware cost puts analytics out of reach to most video surveillance consumers. Depending on the analytic being used, how many cameras are analyzed, camera resolution, etc., the upfront hardware cost of a deployment designed for processing under a dozen cameras could easily exceed US$ 10,000. As a result, more analytics companies this year have begun offering cloud-based AI analytics. Video analytics and cloud The premise is simple, instead of deploying hardware onsite for processing the analytics, video is streamed to the cloud, where servers with the analytics software are hosted. The analytics software is configured to provide alerts when detection occurs. Upfront hardware costs are replaced with ongoing monthly fees, making the acquisition cost of the technology much more affordable. The downside of this model includes lower scalability and higher ongoing costs. Scalability Scalability is limited by the consumer’s internet connection speed, due to the need to upload video to the cloud for processing. This is not likely to limit adoption for many consumers, because it is not uncommon for only a subset of cameras at a site to require analytics processing. In the event a high number of cameras need to be analyzed, many cloud-based analytic solutions can process video at a lower resolution and/or frame rate while still achieving accurate detection. Unified GUIs from VMS platforms Several prominent security product manufacturers have been moving toward providing unified solutions Several prominent security product manufacturers have been moving toward providing unified solutions, as opposed to focusing on a single product area to develop a “best of breed” offering. This move is driving a shift in thinking with consumers, putting more emphasis towards deeper integration of complementary security technologies, and a corresponding need to easily associate security data. As such, consumers want access to all the information in a single interface, which allows for the association of complementary security data. As an example, if a cardholder presents an access control credential to enter an area, the access control system would show the name of the individual associated with the credential that had unlocked the door. Ensuring authorized access The video system would display the person walking through the door. If the live video and the access control records are presented together in the same interface, a security officer would be able to see the person who walked through the door was not the person associated with the access credential. Traditionally, most integrations occur between video and access control systems. Users would view the integrated video and access data in the access control system interface. Technologies such as point-of-sale integration, license plate recognition and video analytics have become more widely used over the past several years. Moving towards single unified interface Data from those technologies are best presented within the video surveillance system, and as such, it makes sense for video management platforms to move towards becoming a unified interface. Several VMS providers have already taken steps in this direction. Either data from a complementary security system can be presented alongside video and other data directly, or add-on components for LPR, Analytics, and the like are purchasable options from such vendors. Hybrid cloud VMS functionality Interest in cloud-based video surveillance deployments continues to grow Interest in cloud-based video surveillance deployments continues to grow. Market awareness and education is high, due in great part to the growing number of available solutions, including those from mainstream VMS Platform providers. However, full Cloud VMS deployments in the professional market are not yet widely utilized as a result of high bandwidth costs, which limit scalability. Bandwidth costs disproportionally affect mid-sized to enterprise-scale consumers, as a result of those consumers having more cameras and therefore requiring more bandwidth. Even so, benefits such as simplified remote access, which is discussed below, and the ability to scale video retention without adding on-premise storage may drive hybrid cloud features in traditional VMS platforms. Video retention and cloud archiving Traditional deployments utilize on-premise servers with fixed amounts of storage. This traditional model lacks flexibility many users seek. As an organization’s requirements evolve, their video retention requirements may also change. A cloud-archiving service built into a VMS would allow the VMS user to leverage cloud storage for long-term archiving on selected cameras. This capability would remove the need to add additional on-premise storage as retention requirements change. Cloud storage Using cloud storage would allow the user to extend their storage capacity at any time, by simply making configuration changes in the VMS that would correspond to a monthly fee for cloud storage. Another cloud feature that would benefit users of traditional VMS systems is simplified remote access. Users of traditional VMS deployments can set up remote access via the internet using a VPN connection Users of traditional VMS deployments can set up remote access via the internet using a VPN connection or by making the VMS server available via port forwarding on an internet-connected router. Those configurations may involve additional cost, configuration complexity or security risks. VMS-supporting, cloud-based video sharing A VMS-supporting, cloud-based video sharing may allow an administrator to configure remote access by simply checking a few boxes during configuration, causing the VMS to connect securely to a cloud-based server where users can log-in to view selected cameras. This setup removes the need for complex configuration, which would need to be maintained every time there are network changes affecting the VMS servers. Staying ahead of the curve Keeping an eye out for new technologies allows system designers and consumers to identify those which may provide a cost benefit or strategic advantage. With cloud offerings becoming more and more mainstream, new uses for cloud architecture are coming to light in video surveillance. Finally, with technology integrations and video management interface development growing more sophisticated with every passing day, live monitoring practices and security operations center design may be affected in the coming years.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SecurityInformed.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organizations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organizations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritizes use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
The phrase ‘eye in the sky’ is taking on a whole new meaning as the concept of home security drones becomes a plausible idea that could be realized in the not-too-distant future. It’s a possibility that came to light recently in the form of a patent that was granted to Amazon for ‘Image Creation Using Geo-Fence Data’. The patent specifies a “geo-fence, which may be a virtual perimeter or boundary around a real-world geographic area.” An unmanned autonomous vehicle (UAV) may provide surveillance images of data of objects inside the geo-fence. Any video captured outside the geo-fence would be obscured or objects removed to ensure privacy. Detecting break-ins and fires The Amazon patent outlines how its UAVs could perform a surveillance action at a property of an authorized party. It would be ‘hired’ to look out for open garage doors, broken windows, graffiti, or even a fire. The drone would only view authorized locations and provide information back to the homeowner. The idea is to deploy Amazon’s ‘delivery drone’ to provide surveillance of customers’ homes The idea is to deploy Amazon’s previously proposed (but not yet realized) ‘delivery drone’ to provide surveillance of customers’ homes between making deliveries. (One could say the employment situation has truly peaked when drones start taking second jobs!) In a ‘surveillance as a service’ scenario, Amazon’s customers would pay for visits on an hourly, daily or weekly basis. Drones would be equipped with night vision and microphones to expand their sensing capabilities. (The microphone aspect seems creepy until you remember that Amazon’s Echo devices already have a microphone listening to what happens inside our homes.) A remaining obstacle for such a plan is the matter of U.S. Federal Aviation Administration regulations that restrict commercial drone operations and even hobbyist or consumer drone flights outside an operator’s line of sight. Drones would be equipped with night vision and microphones to expand their sensing capabilities Amazon company officials have stressed that the plan is still in its infancy and implementation would be in the future. “The patent clearly states that it would be an opt-in service available to customers who authorize monitoring of their home,” Amazon’s John Tagle told National Public Radio (NPR). Although use of drones for security is in the future, the launch of delivery drones appears to be on the nearer-term horizon. Amazon has said it hopes to launch a commercial service in a matter of months. Amazon’s competitor – Alphabet’s Wing – has already been granted FAA approval to make deliveries in the United States. Autonomous drone monitoring Another company, Sunflower Labs, is also working on security drones and has created a prototype that uses an autonomous drone to monitor activity in conjunction with a series of motion and vibration sensors located around the house. The sensors, which can detect footsteps or car engines, are placed around the home to create a virtual map, track objects and guide the drone. The ground sensors would alert a homeowner of something moving around the house. The homeowner could then elect to deploy the drone, which would stream a live video feed to a smart phone or tablet. Smart home technologies are in the process of transforming the home security marketSmart home technologies and do-it-yourself security installations are in the process of transforming the home security market. The traditional ‘alarm service’ model is barely recognizable today among all the changes and new products, from home automation to video doorbells to personal assistants such as Siri and Alexa. Technology-loving consumers are looking at an expanding menu of options just as they are embracing new ways to protect their homes. Instead of a call to an alarm company, a consumer today may instead view a video of a burglary-in-progress live-streamed to their smart phone. Amazon and the other Big Tech companies are already playing a role in the disruption. Home security provided by a drone (on its way to delivering a package down the street) may seem like an extreme divergence from the norm. But such is the changing world of smart homes and residential security.
Video Surveillance as a Service (VSaaS), simply stated, is a cloud-based video surveillance solution that is packaged and delivered as a service over the internet. The price varies depending on the features of the plan (i.e. number of cameras, amount of storage, software features, etc.), and customers pay a monthly subscription price to use it. Internet Protocol (IP) cameras are installed at site locations, and the video is captured and streamed to a service provider’s data centre via an internet connection. The video management software (VMS) runs on backend infrastructure provided by the service provider’s cloud. All video processing is done in the cloud, and all that is required to view the footage is an internet-connected device and a web browser. Implementation Of AI And Deep Learning The cloud facilitates implementation of artificial intelligence and deep learning in the video surveillance marketThe cloud also facilitates implementation of artificial intelligence (AI) and deep learning in the video surveillance market. One of the major challenges with developing deep learning-based applications is access to real-word data and the ability to train the applications to work in any environment. Companies need access to relevant datasets that need to iterate their solutions quickly. Cloud-based solutions are of significant advantage in this case, as they allow for continuous updates and easy collection of vast amounts of data. “We will see the continued adoption of cloud-based intelligent video solutions that aggregate business data through video and artificial intelligence,” says Andreas Pettersson, CEO of Arcules, one of our Expert Panelists. Leveraging AI and IoT technologies with video data is becoming more common as organizations strive to optimize business operations while also boosting security across their facilities. Actionable Intelligence Gathering “The possibilities for this level of actionable intelligence gathering is endless, as markets such as hospitality, manufacturing, retail and SMEs that have multiple locations to manage, look to make sense of video in intuitive, streamlined ways,” says Pettersson. “The ability for technology to aggregate and analyze video surveillance and connected sensor data, identify trends in that data, and apply predictive analysis in businesses will have a huge impact in the coming year.” Cloud systems can solve more problems than ever using artificial intelligence and machine learning Cloud systems can solve more problems than ever using artificial intelligence and machine learning, and the capabilities expand way beyond video analytics to include analytics in general, crunching a variety of data provided by Internet of Things (IoT) sensors. Another area of interest related to video in the cloud is the development of ‘smart codecs’ that security camera manufacturers are developing and marketing as a solution that goes beyond H.264 and H.265. Maximizing Video Storage Customers are realizing that cloud implementations are more cost-effective, easier to deploy and maintainThe ongoing need to better manage network bandwidth usage and to maximize video storage is further turning the emphasis toward smart codecs, which lend themselves to cloud applications. Extremely high-resolution video can now be moved around in a fraction of the time and solves the issue of transporting many cameras over constrained WAN connections. With the elastic computing power available in the cloud, one can now envision a time where cloud computing costs could be low enough for the masses of video security solution use cases to be solved. Customers are realizing that cloud implementations are more cost-effective, easier to deploy and maintain, and in many cases, even more secure than traditional on-premise deployments. In partnership with the leading cloud providers, the security industry can carry this message to the customers and will gradually see a shift in the acceptance of cloud-based solutions in the traditional security markets.
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-Wave Signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, WA-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA Radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar Technology For Border Surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA Technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar Sensor For Security Applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
A high school campus in an Atlanta suburb underwent a complete remodel. Temporary modular buildings were set up on a large area of the campus to act as classrooms during the year-plus long construction. Due to the temporary structures, accessible HVAC units and threat of vandalism, a stable and reliable solution was needed that would also be easy to both install and move if necessary. Wireless passive infrared detectors An integrator was selected who then teamed up with Optex to create a reliable, effective security solution that included iSeries battery-powered, wireless passive infrared detectors. This allowed for a simple, inexpensive yet effective way to protect the assets inside the structures, as well as the HVAC units on the exterior. The detectors protecting the perimeters of the site were set up to trigger strobe lights that alert an on-site guard to the location of any breach, while the system as a whole is monitored by the district's security team. Because the integrator chose to install a battery-powered, wireless option, any of the units can also be relocated if needed, based on changing site conditions or future security needs. Crime prevention at perimeter The temporary campus now maintains a secure perimeter and campus that detects intruders and prevents theft and vandalism. With the battery-powered system in place, the end user has multiple levels of protection and can respond quickly to alarms before any damage is done. Benefits and features of the iSeries battery-powered, wireless outdoor PIR detectors from OPTEX include: No trenching or wiring required allows for a quicker and less expensive install. End user will experience less downtime to business operations. iSeries version includes Inovonics EN1941 transmitter and batteries pre-installed, allowing for a quicker set-up time on job site. Dual PIR feature greatly increase stability outdoor and drastically reduces any false or missed alarms. Units can be easily relocated based on changing site conditions. Outdoor multiple detection pattern Optex’s outdoor PIR detectors (excluding the LX series) utilize the Multiple Detection Pattern technology, where two double-layered detection patterns (upper and lower) have to be activated to generate an alarm condition. This reduces false alarms, particularly those caused by temperature changes, light reflection and small animals. The size judging function virtually eliminates false alarms due to small animals and other moving objects such as vehicles. By utilizing originally developed pyro-elements, it creates a configuration area consisting of 94 high density detection zones. Also, the detection pattern technology requires both detection areas have to be activated in order to generate an alarm condition making it more tolerant to false alarms caused by small animals or pets.
With more than 2,200 locations and 41,000 associates, Panda Express is America’s family-owned and operated Asian dining concept. Challenged with losses at the point of sale (POS) and growing false alarm penalties, the company turned to Interface Security Systems, a managed services provider delivering managed network, interactive alarm monitoring, video surveillance and business intelligence solutions to help them dramatically decrease shrink and resolve security inadequacies. False alarms and fines Panda store managers faced continuous distractions from false alarms, receiving calls from the legacy alarm company at all hours of the night and incurring fines from local law enforcement for needless police dispatches. Interface monitoring center instantly verify any alarm from a Panda store “When an alarm went off overnight, our managers would always err on the side of caution, send police in, or go in themselves. That was dangerous in itself if there was actually a burglary happening inside the store,” says Lyle Forcum, Executive Director of Asset Protection at Panda Restaurant Group, parent company of Panda Express. “Additionally, we were losing significant amounts of money on false alarm charges.” Suspicious transaction notification To address the false alarm challenge, Interface installed a next-generation IP Interactive Monitoring system with live video and two-way audio, which offers a virtual, guard-like level of protection in every Panda location. Operators in the Interface monitoring center instantly verify any alarm from a Panda store with live streaming video, eliminating false alarms. Forcum reports that Panda is saving over $100K per year in false alarm fees Panda had also implemented a customized, exception-based POS reporting system, which notifies Panda management whenever a suspicious transaction takes place at the register. Interface took the tool a step further by integrating it with the video surveillance and alarm systems at each of the Panda locations, allowing management to immediately connect to the video of any problematic transaction. Identify anomalies and prevent shrink The solution enables loss prevention professionals to quickly identify anomalies and prevent shrink. Top offenders from thousands of employees doing millions of transactions can easily be bubbled up to the top. The combination of business intelligence and video surveillance resulted in a massive reduction in shrink and cash shortage at the register. The business intelligence provided allows for focused tracking and improved store operations With Interface, Panda has experienced vast improvements in security for its associates, customers and assets. Forcum reports that Panda is saving over $100K per year in false alarm fees and thousands of dollars per month per store in reduced shrink at the POS. Monitoring intrusion data The business intelligence provided allows for focused tracking and improved store operations, including people development, store performance data comparison, optimized store efficiencies, monitored intrusion data, and cash tracking. Panda and Interface have successfully partnered to create a potent security and loss prevention tool in the Quick Service Restaurant space. “Interface is a partner that's been collaborating with us on our needs from day one,” says Forcum. “The company understands what we need, and then it develops solutions towards that end. It doesn’t just come up with an off-the-shelf product and expect us to purchase it. Interface has shown a real commitment to our business. We meet with them regularly to collaborate on new initiatives and on emerging issues that Panda faces. The company has truly become part of that solution voluntarily and eagerly. Other business partners do not do that. Interface is, in fact, a true part of the Panda team.” A more detailed case study and video testimonial on Panda Express can be found on the Interface website.
Vera Cadillac, a renowned automotive dealer in the Fort Lauderdale area of the US State of Florida was looking to install an advanced security system to counter the growing threat of sophisticated thieves - sophisticated enough to know how to circumvent the current security system and steal parts, tires and in some cases, complete cars. Vera’s current security system included inexpensive CCTV cameras with video motion sensors that proved ineffective in deterring theft at the dealer’s showroom. The sensors were installed on the outside of the fenced perimeter, making them susceptible to being vandalized. When the sensors were disabled, the thieves were able to penetrate the perimeter and strip cars for parts. The speed in which the thieves were stealing car parts and accessories was another tough obstacle to overcome. Tyco - Optex integrated security solution Vera chose Tyco Integrated to come up with an improved, flexible system that takes into account the many obstacles within the perimeter. This includes wildlife, vegetation and other physical obstacles. In addition, the system needed to be as vandal proof as possible. Tyco Integrated and Optex teamed up to provide a flexible, effective system of detection that would use high-mount, zone detectors as trigger devices for the American Dynamic Illustra IP400 CCTV system. SIP infrared sensors - Inovonics wireless network integration The team created a design that would easily integrate Optex’s REDWALL Wireless SIP infrared sensors into Vera’s current Inovonics wireless network (used for building automation systems). The Redwall sensors would trigger PTZ dome cameras that are fixed within the area of detection The Redwall sensors would trigger PTZ dome cameras that are fixed within the area of detection. The result will capture and record any intrusion within the sensor’s zone. The intrusion event is now tracked by ADT’s Central Monitoring Station and alerts the authorities along with a Vera contact. Masking of surrounding obstacles The REDWALL SIP sensors allowed Tyco Integrated to easily adjust and account for wildlife, vegetation and other physical obstacles by simply masking those areas. Masking deletes these obstacles within the protected perimeter of the detector. Because the old system was susceptible to vandals, the team had to address this. The team installed the sensors behind the fence and over 9 feet high on the side of the building in accordance to specification. Effective intrusion detection All-in-all, the plan included 12 SIP units mounted on four buildings, which were installed in a single day. Vera Cadillac effectively maintains a secure perimeter that detects intruders from stealing auto parts and other property. In addition, the system was easily integrated into Vera’s current wireless network and is vandal proof. It provides Vera Cadillac peace-of-mind that a system is in place to prevent such incidents from happening during the night-time and can respond with quick efficiency to catch criminal activity.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, announced Harvest Health & Recreation Inc. (“Harvest”) continues to roll out 3xLOGIC infinias access control to its growing number of locations across the United States. Dem360, LLC has been an integral partner for this project, providing their managed IT, network engineering, and security system design expertise. Headquartered in Tempe, Arizona, Harvest is a multi-state cannabis operator (MSO) and vertically integrated cannabis company. Subject to completion of announced acquisitions, Harvest will have one of the larger footprints in the US. Since 2011, the company has been committed to expanding its Harvest House of Cannabis retail and wholesale presence throughout the U.S., acquiring, creating, and growing brands for patients and consumers nationally and continuing toward a path of profitable growth. Access control for employees “We want to be able to control who goes where, regardless of the facility,” explained T.J. Buskirk, National Security Director for Harvest Health & Recreation. “For example, why might an employee be in an area they shouldn’t? Our access control allows us to track who, when, and where. I like the fact that the system grants access to someone for a particular door, and then after hours, that access is shut down—that level of control.” Eventually, Harvest’s Security Operations Center will have full visibility across every facility 24/7/365" Gary House is an IT Architect with Dem360, who has been on the project working closely with Harvest since the beginning. “Harvest is pioneering this industry and looking to scale into an enterprise environment. Harvest has been studying and standardising on various technologies. I did my own research of access control systems, and I love the infinias IDC controllers.” Harvest has standardized on 3xLOGIC infinias access control and has separate video surveillance and alarm systems. Buskirk again, “In this business, we have to be sensitive to all the different state rules and regulations. I’ve got to have system interoperability from state to state, as well as personnel trackability and clear audit trails for the regulators.” Aim to migrate to scalable data center Dem360 has installed infinias access control in 30 facilities, controlling over 400 doors. The next big milestones in this system rollout is to convert all current facilities to the infinias Corporate Edition, install Corporate going forward, and migrate all managed doors to a scalable data center with a single database built on redundant, fault-tolerant architecture. It’s meeting all our needs, and we are able to manage our facilities remotely" Harvest has also adopted the badge making feature within the infinias platform to print and manage company ID cards. With a growth trajectory like Harvest’s, reliability and scalability are key. Eventually, Harvest’s Security Operations Center will have full visibility across every facility 24/7/365. Accordance with state guidelines “We have a great working relationship with Gary and Dem360, and that makes everybody’s job a lot easier,” said Buskirk. “We have an incredible magnitude of the different directions we can go with this business. However, at the end of the day, we have to design our access management for our employees, patients, and customers. Whatever the facility and the need, we must ensure highly productive workflows, while staying firmly within each state’s guidelines.” “Infinias gives us what we need without impediments. We’ve never had to ‘fork lift’ anything. This system adapts and it gives us flexibility and scalability, we have one door at this facility and hundreds of doors at another. From the beginning, the infinias system has been able to react to the Harvest environment of change and fast-paced growth. We can manage access for different groups in completely different ways, and I love that I can turn off a badge at a moment’s notice.” “The system is very user-friendly, that was one of our key demands. It’s meeting all our needs, and we are able to manage our facilities remotely. Its robust features and benefits meet the varying demands of the dynamic, high-growth Harvest environment and our vision for the future,” concluded Buskirk.
Car theft is a concern for many people, so imagine if one person was responsible for a whole load of them. Car dealer P. Christensen in Denmark knows this headache from personal experience, suffering a number of thefts from their fenced area. It was time to ramp up security, so they turned to Telesikring, the largest private-owned security company in Denmark, for a perimeter detection solution. Telesikring upgraded security with a solution using Hikvision surveillance cameras. Despite existing security measures like electric fences and burglar alarms, the car dealership was still experiencing thefts. Thieves were managing to come up with increasingly imaginative ways to beat the system – like crawling over fences and even digging underneath them. Perimeter detection solution They stole all sorts of items, including wheels and catalysts from the cars and vans exhibited at the site. These represent quite some value, and the cost of these losses was mounting up. They needed a solution which could work for them in all sorts of weather conditions and in the dead of night – the most vulnerable time. The premises have some quite remote outlying areas, which were also particularly at risk. The car dealership is now monitored using a perimeter detection solution made up of both conventional and thermal cameras. These cameras are connected to a Milestone VMS with analysis software. In turn, this has a direct connection to the Jutland Control Center, a local Alarm Receiving Center that monitors the property 24/7. Thermal Network Bullet Camera These cameras provide excellent images even in the lowest of light levels, making the ideal for remote verification Now it’s not possible to enter the property outside of opening hours - day or night, without this being registered by the control center. The information they receive from the analysis software enables them to make an informed decision on their response, for example sending a guard patrol. Thermal cameras were chosen because of the reliability in all weather conditions. This solution specifically used the Thermal Network Bullet Camera (DS-2TD2136-10). Once the thermal camera detects a break-in, it sends an alarm to the ARC and the operator there can use the low-light clarity delivered by the DarkFighter cameras (DS-2CD4B26FWD-IZS) also present to verify the alarm. These cameras provide excellent images even in the lowest of light levels, making the ideal for remote verification. Effectively prevented burglary Henrik Finn Sanderlund, Quality Manager at P. Christensen, says: “Yes, we are very satisfied! Since the deployment of the system, this has effectively prevented burglary and theft. The solution was deployed on a Thursday and on Friday the solution caught the first break in, effectively preventing it.” Managers at P. Christensen can now rest at night, safe in the knowledge that security innovation is keeping an eye on the property.
Verkada Inc., globally renowned provider of cloud-based enterprise video security, has announced the company's 'Remote Video Monitoring Station' program which includes 90 days of complimentary equipment and cloud services to help healthcare facilities, shelters, and municipal services across the U.S., Canada, and UK respond to the COVID-19 outbreak. 'Remote Video Monitoring Station' program With this program, Verkada will provide hospitals and municipalities with all the necessary video equipment to quickly scale patient video monitoring while reducing medical workers' exposure and use of critical PPE equipment. Organizations will receive Verkada security cameras, a designated viewing station and complete access to Verkada's cloud-based management software, which delivers secure remote monitoring from any device or browser. Cameras can be easily deployed in both existing sites and newly converted "pop-up" locations at shelters and hospitals. HIPAA compliant video solution Over 200 leading healthcare providers already use Verkada's HIPAA compliant video solution Over 200 leading healthcare providers already use Verkada's HIPAA compliant video solution. With a focus on customer privacy and security, Verkada provides customers with the tools to ensure patients and staff are always protected. For organizations looking to enable remote visibility without adding overhead, Verkada deploys in minutes, is simple to maintain, and requires no additional equipment like NVRs or DVRs. To ensure a low network impact and support limited connectivity, cameras store continuous footage while select metadata is sent over the cloud, reducing network consumption to just 20 kbps per camera in the steady-state without impact to quality. Remote Viewing Station "Verkada has helped us implement features that make our business better and allow us to use video footage in ways that we hadn't thought of before," said Michael Marques, Director of Technical Services at Halifax Health. At the end of the program, organizations can either return their Remote Viewing Station at no cost using prepaid postage or can purchase the equipment for ongoing use.
Round table discussion
An aging employee population and the influx of a new generation of workers and customers is driving change in the physical security industry. Millennials – those born in the 1980s and mid-1990s – are especially impacting how the industry operates, the technologies it produces, and the customers it serves. This tech-savvy generation grew up with the Internet at their fingertips. They embrace innovation in all its glory and expect it to play a seamless role in their lives – and work. We asked this week’s Expert Panel Roundtable: How are millennials changing how security systems are designed, installed and/or operated?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?
Remote surveillance: Manufacturers & Suppliers
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload