ABP Technology, a value-add specialty distributor for IP technology solutions, launches MxMSP – the Remote Monitoring and Management (RMM) platform that can improve MOBOTIX video surveillance camera deployments and boost profits by increasing Recurring Monthly Revenue (RMR). The innovative MxMSP platform has just been given the ‘New Business Idea of 2018’ award at the MOBOTIX Global Partner Conference held in Germany this week. Powered by ABP Technology’s IPTechView RMM...
Schools are continuing to upgrade security measures for pupil safety. However, on top of all the fundamental challenges schools face, implementing well-rounded and effective security solutions can seem a great difficulty. Andrew Shaw, architectural consultant for Allegion UK, discusses the advantages of electro-mechanical solutions. Schools can equate to some of the most complex security challenges for architects, specifiers and school officials alike. This is because choosing the right solutio...
Having returned from Security Essen, Traka’s International Sales Director, Martin Woodhouse, reflects on the show and why it was so important to attend for the industry leader in innovative key and equipment management systems. Q: How was the show? Martin Woodhouse: Security Essen was great in allowing us as a global brand, and part of the ASSA ABLOY Group, to demonstrate how we are listening to our customers (new and existing) and responding with latest advances in intelligent solutio...
A dependable Internet connection is virtually every industry’s sustenance and without it, business dies. Yet many don’t realize how frequently the worst occurs, or how dramatically it could impact their livelihood. According to industry research, network downtime can cost small and midsize businesses (SMBs) anywhere from $5,600 per minute, to between $8,600 and $74,000 an hour. Whether it’s business continuity for users in retail/point-of-sale (POS), construction, banking, insu...
Opening up new possibilities for competitive video surveillance deployments in retail, restaurant and small business applications, IDIS has launched a compact range of robust, high performance cameras and recorders. The IDIS Compact Solutions series is designed for rapid installations and both single and multi-site roll outs, allowing for the mixing and matching of analog and IP technologies, making upgrades and system extensions more affordable than ever. IDIS Compact Solutions The new line i...
Honeywell will showcase Connected Buildings technologies that aim to minimize response times and eliminate human delays in critical situations at the Global Exchange Security Conference and Expo (GSX) in Las Vegas 2018. The company will demonstrate products that help commercial buildings detect threats early, respond to incidents faster, centralize decision making, and allow management from anywhere. These solutions are part of Honeywell’s Connected Buildings portfolio designed to turn bui...
Eyecloud Cam, smart home security camera, is now available via a Kickstarter campaign. Aimed at keeping house, family and belongings safe, Eyecloud Cam ensures affordable security with a single Eyecloud Cam costing less than $100. Eyecloud Cam Home Security Camera Eyecloud Cam is a home security camera that constantly monitors the safety of the family and home by putting one of the most advanced computer vision AI technology right inside the camera. After positively identifying a threat, Eyecloud Cam sends out a notification with a description of the event, with unprecedented accuracy as to why it has chosen to send out this alarm. To make a Smart Home even more safe, Eyecloud is working on making the Eyecloud Cam fully compatible with Amazon Alexa. Computer Vision AI Technology Eyecloud Cam is completely cordless and requires no base station to operate The Eyecloud Cam is stylish, yet compact and discrete. Put the easy-to-mount Eyecloud Cam at the precise location to facilitate 24-hour detection and surveillance. An Eyecloud Cam at the front door can monitor visitors, inside the home, the Eyecloud Cam can warn of intruders, watch over pets and children, or could help provide early warning of safety incidents. To ensure the safety of property, put an Eyecloud Cam in the backyard or watch over the garage. With its long six-month battery life, onboard AI, and 8GB of local storage, Eyecloud Cam ensures all-round residential, family, and property security, even while power and internet access are unavailable. Eyecloud Cam is completely cordless and requires no base station to operate. Configurable For Alert Situations The cam's smart technology can tell the difference between intruders, visitors, acquaintances, or kids playing in the backyard, and sends alerts only when it detects unusual events. For privacy reasons, the Eyecloud Cam will send a text notification warning to all the connected users, who can then open the app to find out the real reason for the alert. The Eyecloud Cam is completely configurable for alert situations, from snapshots or videos, the owner is in complete control.
Cobalt Robotics, a manufacturer of intelligent security robots used to autonomously patrol indoor facilities, will unveil its new leak and spill detection sensing capabilities as part of the Global Security Exchange, one of the largest tradeshows and conferences to showcase the latest security technologies. At last year’s event, previously called the ASIS Annual Seminar and Exhibits, Cobalt Robotics was the recipient of the 2017 Judges Choice Award, the highest honor available as part of the ASIS Accolades Award program. The Judges Choice Award recognises the most innovative product of the year. Leak and Spill Detection Sensing Technology With its new leak and spill detection sensing technology, Cobalt robots can be programmed to detect a leak or spill within a predefined area With its new leak and spill detection sensing technology, Cobalt robots can be programmed to detect a leak or spill within a predefined area. Once detected, the security robot can then send the appropriate notification to a robot Specialist. Cobalt robots are equipped with powerful sensors, including day-night cameras, thermal sensors, motion sensors and badge readers, which helps it to detect anomalies and other risks that might not be detected by the human eye. “Security robots provide corporate security directors with a powerful tool that amplifies their resources and allows real-time alerts to the right security personnel about an event, such as an open door, a spill, or an unauthorized individual in the building after hours,” said Dr. Travis Deyle, CEO and co-founder of Cobalt Robotics. “Security professionals are finding that security robots are a valuable addition to their security toolbox, enabling them to integrate technologies and leverage the benefits of machine learning technology.” Security Robots Cobalt Robotics was founded in 2016. Since then robots designed and developed by the technology start-up have been deployed by several well-known companies, including Yelp, Credit Karma and Slack. The company has also raised $16.5 million in venture capital funding through partners such as Sequoia Capital, Bloomberg Beta, Storm Ventures and Founders Fund. GSX will be held at the Las Vegas Convention Center from Sept. 24-27th in Las Vegas. More than 20,000 security professionals, which includes corporate security directors from Fortune 500 companies, universities, healthcare facilities, and financial institutions from around the globe, are expected to attend the event. Cobalt Robotics will be exhibiting at GSX at booth 353 and be featured in the D3 Xperience – Drones, Droids, Defense located at Booth 5602.
ABCO Security, a Bates Security company in Eastern Kentucky, happily announces the official brand refresh to reflect the company’s mission and commitment to service. Acquired by Bates Security in early of 2018, ABCO Security’s new logo unites the two brands, while incorporating the original ABCO Security red, established by the company’s founder in 1983. The consolidation and consistency allows ABCO Security the capability to make emotional connections between the brand and consumers. Bates Yellow Design “It was a big change, moving to the Bates yellow design,” said Tim Welch, General Manager of ABCO Security. “However, the community response has been nothing but positive. The new brand is easily recognizable, not only by the consumer, but by would-be perpetrators as well.” The brand refresh includes a top-to-bottom redesign of the company’s website, vehicles, graphics, communication and correspondence. One thing unchanged is the company’s tagline: “People who know, trust ABCO.” Impactful And Consistent “The ABCO brand is so strong and respected in Eastern Kentucky, we felt it was best to continue to do business under the ABCO name,” said Jeremy Bates, President of Bates Security. “We decided, though, that it was time to update the look some to make it even more impactful and consistent in all the mediums it is used.” The new brand was released officially at the company’s Ribbon Cutting ceremony on August 13.
After a great success at Eurosatory 2018, HGH Infrared Systems continue their technological innovations tour in Poland at MSPO 2018. The company recently launched new technologies to support the modernization of the Defense industry: CYCLOPE 5.0, the Tracking in Staring mode feature and the highly awarded V-LRF option. 360° Thermal Sensors The 360° thermal sensors SPYNEL-C and SPYNEL-M, respectively used for FOB protection and by special forces, will be presented at the show. SPYNEL-C, one of HGH’s key products which has proven its worth in various defense applications, has been continuously improved with the latest software innovations. The five SPYNEL models never stop evolving, to suit the users’ growing needs and to support the modernization of the Defense industry. The CYCLOPE software can now automatically track a threat in real time in staring modeOne of the biggest innovations presented at MSPO is CYCLOPE 5.0’s Alarm Management Module, enabling to automatically distinguish between a threat and an authorized intrusion, by analyzing the behavior of the target. In the event of a confirmed threat, SPYNEL’s integrated software CYCLOPE 5.0 automatically alerts the hypervisor, creates a visual alarm, sends an email or even a screenshot to the user. Another showcased innovation is the Automatic tracking in Staring Mode feature: the CYCLOPE software can now automatically track a threat in real time in staring mode, without requiring any manual intervention. When the sensor stops rotating to stare at the detected threat, the operator only has to click on the specific target to launch the automatic tracking. HRH’s V-LRF (Laser Range Finder) Option HGH will also present the highly awarded V-LRF option for Spynel-X and Spynel-S, which consists in adding a Visible Channel and/or a Laser Range Finder to the sensor for a better recognition. Charlotte Pantel, Sales Representative of HGH Infrared Systems in Europe, said: ''We are very happy to be back at MSPO and to showcase our latest innovations for Defense applications. 2018 has been full of innovations for SPYNEL so far, and such a tradeshow is the perfect way to make them known. We believe that listening to our clients’ needs is the best way to continually challenge ourselves to develop the best technologies.'' HGH Infrared Systems will exhibit booth G18 at the 25th International Defense Industry exhibition in Kielce, Poland.
Amthal has been awarded a new support contract with global technology leaders Mitsubishi Electric Europe B.V, to upgrade and maintain security solutions at its UK Head Office, and across its regional UK offices. As one of the world’s leading names in the manufacture and sales of electrical products and systems, Mitsubishi Electric has eight regional offices, including its UK Head Office in Hatfield, supporting over 700 staff members. New Contract Details The new contract with Amthal covers the provision of support and maintenance across each of Mitsubishi Electric’s sites, to ensure security arrangements, including CCTV, intruder alarm and access control, are maintained to the highest level and upgraded quickly where required. Karen Kelsall, Mitsubishi Electric Business Services Team - Facilities Coordinator said, "Each of our UK office locations has its own security arrangements that must be maintained on a regular basis. We needed to source a reliable company that could not only achieve this requirement but also ensure we continue to offer our staff and visitors complete peace of mind at their place of work. Amthal proved themselves even before the contract was signed, responding to several different site requests quickly, with true technical capability and professionalism. Plus, being a local company to our head offices makes a difference to ensuring an efficient and sustainable supplier service that we look forward to building." Highest Levels Of Operational Excellence This contract award is extremely significant for Amthal, not only to be associated with such a global brand, but also to demonstrate our commitment to our customers" Jamie Allam, Commercial Director Amthal Fire & Security added, "This contract award is extremely significant for Amthal, not only to be associated with such a global brand, but also to demonstrate our commitment to our customers, both new and existing the team’s knowledge, experience and expertise together with an ability to react quickly and get the job done, contributed to our appointment. And as per our core mission, vision and values, that run through everything we do, we will continue to work in partnership with Mitsubishi Electric to deliver the highest levels of operational excellence and continuity of service, both on a local basis to its main offices and regionally, across all sites." Independently owned, Amthal Fire & Security is dedicated to satisfying end-user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire and security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.)
3xLOGIC, global provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, has announced, in cooperation with Bates Security, Sonitrol of Lexington, and Sonitrol corporate, the partners have completed a video surveillance and audio detection security upgrade project for The Nest, known formally as the Center for Women, Children, and Families. 3xLOGIC installs Video Security for The Nest The Nest is located in a somewhat “rough” part of town, so a robust security system is crucial The Nest, located in a Lexington, KY public park, does a little bit of everything, according to Danny Goodpaster, Sales Consultant for Bates Security/Sonitrol of Lexington. It provides needy families with free essential items, offers counseling for domestic violence issues, and has daycare services onsite. The Nest is located in a somewhat “rough” part of town, so a robust security system is crucial. The center had been equipped with a four-camera analog system complete with alarm capabilities, so staff were very aware of the importance of verified alarms in providing a higher degree of safety and security. Goodpaster met with the customer and determined that, at a minimum, eight cameras were needed to provide enhanced visibility of the Center’s surroundings and greater protection. Also, expanded coverage of The Nest’s parking lot and the approach to the entrance were critical. “The Nest just didn’t have the budget for the upgraded system they needed, and we could have installed a much less expensive, non-verified alarm system to save costs,” explained Goodpaster. “But they have been our customer since 1989, and their verified alarm capability plus panic buttons has led to successful police apprehensions at the site on several occasions. Staff understood the importance of Sonitrol brand equipment and our positive relationship with law enforcement. So, in cooperation with our corporate office, we decided to ensure they had the system they truly needed to be able to function more safely and securely.” 3xLOGIC Sonitrol-branded Cameras Bates/Sonitrol of Lexington installed a total of eight 3xLOGIC Sonitrol-branded cameras Bates/Sonitrol of Lexington installed a total of eight 3xLOGIC Sonitrol-branded cameras, equipped with full video verification capabilities, and an NVR onsite. There are different camera models to fit the varying surveillance needs, including wide-dynamic range 3MP HD cameras and a 180-degree camera to cover a wider, outdoor area. Most of the cameras are located outside, covering the parking lot and a playground. Two interior cameras cover both of The Nest’s entrances, the office, and the entrance to the daycare facility. The entire upgrade project was completed in April of this year. “One of our biggest concerns,” related Jeffrey White, The Nest Director, “is for our children and staff during operating hours, and us not knowing what is going on in the approach to our building—we need that visibility.” The center has had a number of incidents over the recent past, including a break-in, as well as one of the old analog cameras actually being shot out. NVRs with Smart Search Capabilities “The old system was just not doing the job for them,” said Goodpaster. “It was in disrepair, the image quality was poor, and the wiring had deteriorated. We replaced the old DVR with a new NVR that has Smart Search capability, and the entire system is now IP. I was really impressed with the commitment by our corporate office to make sure this important non-profit, doing essential work, has a system that provides them with peace of mind and genuine security. Once we were fully installed, we provided a staff training day that included an orientation for law enforcement as well.”
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveler safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving Mass Transit Security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime Prevention In Transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train Security And Safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing The Right Technology For The Solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit Security With Modern Technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.
Security teams at casinos and gaming facilities are challenged daily to balance a welcoming and guest-focused attitude with a firm and capable presence to prevent and handle security issues, manage surveillance and security systems, and protect employees, guests, and assets. And all of this needs to be accomplished while complying with strict gaming regulations. An experienced security systems integrator can assist you with many of those challenges, including the very important job of ensuring that the correct security technologies are integrated and installed correctly to avoid downtime and maintain regulatory compliance. On the flip side, partnering with the wrong security integrator can be an expensive lesson with disastrous financial consequences due to system interruptions that can shut down gaming operations. However, selecting the right security systems integrator is not always an easy task. To get the answers you need, you need to ask the right questions. Here’s a list of criteria to help get the search process started. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry 1. Relevant And Proven Industry Experience This may be one of the most important factors for you to research. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry. You wouldn’t hire a plumber to fix your roof or a chef to repair your car, so why consider hiring an integrator without relevant work experience in your specific industry? Does the integrator have experience working with security solutions for casinos and gaming facilities similar to your facility? Have they worked with gaming commissions in your state? Do they have the gaming certifications necessary to ensure your new system is in compliance? And what specific projects have they done – with references you can contact? Even more, look for a systems integrator who has strong relationships with contractors, suppliers, unions and equipment suppliers, as they may need to call on them for assistance during the course of your installation. 2. Security Systems Knowledge Security technologies are evolving at an unprecedented pace which presents obvious advantages and some hidden dangers. It’s important that you select a systems integrator who not only installs products well – but also works very closely with equipment and software manufacturers to develop new and innovative solutions for the most challenging installations.It’s also important to ask about their procedures and processes for after-hours emergency situations Look for systems integrators that utilize integration and testing facilities to evaluate which system configuration and specific components meet your functionality needs, lighting challenges, resolution and frame rate requirements, and recording accuracy demands to ensure your system provides you with the highest levels of identification while maintaining regulatory compliance. Since no two systems are ever alike, it’s also important to look for custom integration capabilities employing solutions from different manufacturers to ensure you are getting the best possible solution on an application by application basis. 3. Brand Loyalty Versus Conflicts Of Interest There’s no doubt that security professionals have their preferred brands. This can be based on prior experience, proven reliability, superior customer support, or even personal relationships. But it’s also no secret that price and sometimes spiffs can play a deciding role on which products a reseller recommends. Be specific to ask questions about the systems integrator’s line card – which manufacturers’ products do they actually represent and why? And how do they select specific products for specific applications? If the answers to these simple questions seem vague, there may be more at play than meets the eye. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation. 4. Accelerating Resolutions How is the integrator’s firm structured? How long have they been in business? Who will be your daily contact? How long have members of the integrator’s team been with the firm? What experience do they have? It’s also important to ask about their procedures and processes for after-hours emergency situations, as you will likely need service after normal business hours. Find out if they offer on-demand remote system support to address problems immediately, and to accelerate resolutions if and when there is a failure. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation Most importantly, verify that they have technicians who can get to your physical location quickly in the event problems need to be addressed physically in order to keep your property in compliance. Even though it can be overlooked, it’s important to assure the system integrator’s organizational structure meshes well with your general requirements before starting a relationship. 5. Pricing Structure Of course, price is important, but while an integrator’s pricing should be competitive, it should be viewed as one of many selection criteria.An experienced systems integrator with casinos and gaming facilities will understand local, state, federal, and tribal regulations A security systems integrator with a proven track record of successfully configuring, installing, and servicing projects like yours, on time and on budget, is worth more than the small amount of money you might save by going with a low-cost integrator. 6. Knowledge Of Gaming Regulations A systems integrator who has experience working with casinos and gaming facilities will understand local, state, federal, and tribal regulations, and will provide you with a gaming surveillance and security solution that minimizes disruptions to your operations during its installation and after your new system has been implemented. Along with the requirement standards of performance, quality and reliability, compliance is critical to ensure fluid gaming operations. 7. Adding Value With Industry References Industry references are invaluable in determining your ideal choice. First, ask them to provide client contacts from their reference list, and contact those individuals. Questions to ask include: Did the integrator clearly understand the reference’s requirements? How did they contribute to the solution? What challenges did they need to overcome? Did the company deliver on time and on budget? How has the system(s) been operating since implemented? How has their support been? Why would you recommend them? A good security systems integrator will take extra steps to ensure your security solution is always working 8. Asking The Right Questions There are very few security systems integrators who can address all of a casino’s or gaming facility’s needs, but they do exist, and you’ll find them if you do your homework. Look for an integrator that can add value and not just take direction. A good security systems integrator will volunteer ideas to reduce maintenance costs, take extra steps to ensure your security solution is always working, and help save your casino money. Their success will be determined by their initial ability to understand your challenges and deliver the best possible solution to resolve them. And it all starts with choosing the right partner by asking the right questions.
A few friends from the security industry will gather this April to see, hear and touch the latest technologies to make the world a safer place. Actually, more than a few: there will be more than 30,000 security professionals gathering at the Sands Expo in Las Vegas April 11-13 for the International Security Conference and Exposition, usually known as ISC West. Many of the attendees will be returning to what has become a yearly ritual. The site, the players, the pace and even atmosphere of ISC West are as familiar to many as a family reunion. But the industry is changing, and those changes will be reflected in big ways at ISC West. Let’s consider a few themes we will be hearing about at the show. The Cybersecurity Of Physical Security Systems Cybersecurity has gone from being the “elephant in the room” to an existential crisis for the physical security industry: How can an industry promote security unless its own products and systems can operate securely? For a long time, no one talked about cybersecurity. Some attending ISC West may wonder if now we are talking about it too much, at the risk of too much talk and not enough action. Almost every contribution to our “review and forecast” articles for 2018 mentioned cybersecurity. Every industry event I have attended so far this year has put cybersecurity front and center. It will certainly be a major topic at ISC West.Cybersecurity has gone from being the “elephant in the room” to an existential crisis for the physical security industry Here’s the challenge for attendees to ISC West: If every manufacturer talks earnestly about cybersecurity, how can potential customers tell who is really serious about the topic, and who is merely paying lip service to the latest industry buzzword? If we all agree that cybersecurity is “everyone’s problem” – not just manufacturers, but also integrators and users – does no one really take responsibility? As the industry becomes more educated about cybersecurity, we can expect more detailed and challenging questions on the subject to permeate the ISC West show floor. Some manufacturers have likened cybersecurity more broadly to the issue of trust. Do you trust a manufacturer to address cybersecurity issues? Or do you trust them in general? The cybersecurity discussions will begin even before the show floor opens, on Tuesday, April 10, in a session titled “Cybersecurity Tier Zero: A Guide to the First Steps of Cyber Hardening.” – just one of the many other education sessions on Tuesday. The Emergence Of Video Analytics 2.0 Deep learning and artificial intelligence (AI) have become more familiar to the physical security market, and some AI applications are driving new industry trends such as robotics and analyzing Big Data. But the biggest potential impact of deep learning is in the field of video analytics, a decades-old technology that has perpetually overpromised and underdelivered. The video analytics systems are not programmed, they “learn,” using massive data sets and neural networks and GPU processors and all the rest The new wave of video analytics products claims to provide a higher level of accuracy because they operate more like the human brain. These new systems are not programmed, they “learn,” using massive data sets and neural networks and GPU processors and all the rest. But consider the bottom line: Do the new video analytics products really perform and eliminate excessive false alarms? Can they effectively search large amounts of stored video and find the few frames that can make the difference in an investigation? Months have lapsed since the first deep learning products were announced, or at least, “teased”. It’s been sufficient time for manufacturers to develop products that are ready for market, but are they? ISC West attendees will be scouring the booths for the latest developments and asking tough questions about how well these newfangled systems will actually perform.It’s all happening in the smart home market – but how fast and what will be the impact on the traditional burglar alarm business The Changing Smart Home Market We all want Siri to set our thermostat or Cortana to arm the alarm system. We want to view video from our nanny-cams on our smart phones, and to turn on the lights from anywhere around the world. It’s all happening in the smart home market – but how fast and what will be the impact on the traditional burglar alarm business that is the bread-and-butter of many security companies? Bluetooth and Wi-Fi can make a lot of things happen in the smart home environment, but what about other networking standards such as ZigBee and Z-Wave? The stakes are huge, which is why the big tech companies – from Apple to Amazon to Google – are staking their claims in the home automation market. Just this year, Amazon has purchased Ring, a video doorbell and security camera company – which will also be exhibiting at ISC West. But it’s unclear what such moves in Silicon Valley will mean for traditional security companies. The growth of do-it-yourself (DIY) systems introduces even more variables, as do alarm companies with new business models and even cloud-based approaches. Many exhibitors at ISC West – from ADT to Z-Wave – are addressing the new smart home environment and can help those attending the show do the same. About 40 companies are exhibiting in the “Connected Home” arena. The Unmanned Security and Safety Expo will return, including a dedicated complimentary education theatre for attendees Drones, Robotics and Education From robots to drones to counter-drone solutions, there other new technologies being displayed at ISC West. The Unmanned Security and Safety Expo will return, including a dedicated complimentary education theater for attendees offering sessions on topics such as “Drones – Friends or Foes to the Security Industry?” There is a level of novelty to these technologies, and attendees might be lured by the entertainment value of a subject that may fall outside their job description. But one education session addresses the nuts and bolts in the real world: “Selling the Value of Security Robots by Setting Realistic Expectations.” Could these new gadgets play a bigger role than we think in the future of the security market? For all its familiarity, there is always something new for attendees at ISC West. It may be a startup company with an intriguing value proposition tucked into a tiny booth at the back of the hall. Or it could be a big surprise news announcement from a major player. For attendees, the best surprise of all is that valuable piece of information they can take home to make their business better. Here’s hoping you find it!
The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future at ASIS 2016: Autonomous drones that can patrol a perimeter 24 hours a day, seven days a week, managed remotely and able to perform multiple tasks on-site. The technology was developed by Israeli-based Percepto, based on innovation with roots in the Israeli military. Percepto has sharpened its focus on computer vision and applied it to allow drones to fly autonomously, using global positioning systems (GPS), vision sensors and algorithms to constantly analyze what the drone “sees” through an on-board camera. The system can work with any camera that provides an adequate image for real-time vision algorithms. Perimeter Security At ASIS Tyco Integrated Security invited Percepto to display its technology in the large integrator’s booth at ASIS. “It was the first show where we targeted perimeter security,” says Ariel Avitan, Percepto’s Chief Commercial Officer. “Tyco took us under their wing. We had about 100 conversations at the show. After about 10 minutes everyone understands the business logic behind the solution. You have to talk to the end users to understand that your concept is validated.” Percepto is in the contractingphase with TycoIS and alsohas a number of other pilotprojects, including energycompanies in Europe TycoIS is also working with Percepto on several pilot projects to demonstrate and fine-tune the technology. Percepto is in the contracting phase with TycoIS and also has a number of other pilot projects, including energy companies in Europe. “Our challenge is robustness,” says Avitan. “The technology is trustworthy. We just need to make sure the system is. And the industry needs to identify applications where we can provide more value.” Autonomous Drone Performance Percepto’s products include a hardware base station to control the drones, and the PerceptoCore module is installed on board the drone to allow it to interface with the base station. The core is pre-loaded with multiple task applications that enable the drone to perform tasks relevant to its purpose – autonomously. The “core” can be installed on almost any size or type of drone, whatever the manufacturer. In addition, Percepto provides an interface that integrates with existing systems in the security department’s control room. Cloud management software enables remote access and management of multiple drones. The software collects, analyses and presents data, while streaming live video on an ongoing basis. Perimeter security is just one application where drones will be deployed in the near future. Having a drone stationed on-site, charged and protected by its hub, enables fast reaction to any need in the field, day or night. Additional sensors and other equipment can be added to drones to detect gas leaks, thermal energy, or smoke, and even to provide life safety capabilities. Lighted drones with voice messaging could be used to direct employees or the public to the best exit route in case of a mass evacuation. 24/7 Perimeter Security Using drones to patrol 24/7 addresses the needs of perimeter security. Adding more sensors and providing additional data to operators helps expand the system’s utility and increase return on investment (ROI), says Avitan. “These applications are a tremendous benefit for security,” he says. “We actually find that adding safety and inspection applications is a good way to increase security. When you have a drone that knows how to provide ROI, it saves tons of money. It’s always about security, but above that we want to add value and increase ROI.” In addition to perimetersecurity, drones will soonbe used to inspect thethousands of solar panelsat solar energy sites In addition to perimeter security, drones will soon be used to inspect the thousands of solar panels at solar energy sites. Drones with cameras can detect the presence of dust or other factors that lower solar-panel efficiency, or cracks or malfunction of the actual panels. Thermal imaging on board a drone can detect which panels are under-performing. Drones could also be used to provide alerts if a transformer or cabling overheats in a power plant or critical infrastructure application. Restrictions On Drones The U.S. Federal Aviation Commission is evolving its position on autonomous drones. Drones are restricted from populated areas, can only fly at certain altitudes, and must be equipped with lights if flying at night. Currently, applications require that there be an unmanned autonomous vehicle (UAV) pilot on site, maintaining “line of sight” with the drone, who can take control if needed. However, the requirement for the UAV license has been lowered to allow certification with an online course. There have also been some exemptions granted for the line-of-sight requirement (e.g., railroad inspections). “We include control mechanisms now to be compliant, and when the barriers come down, we are ready for that,” says Avitan. Many global jurisdictions are following the FAA’s lead, although some countries do not regulate drone traffic. Avitan says he expects regulators to allow drones to fly autonomously beyond line of sight in specific closed facilities in the next 12 months. Based on the pilot projects, Percepto will fine-tune the system, streamline manufacturing and launch a fully commercialized system by Q1 2017. Avitan expects to have up to 100 units deployed in 2017, and up to 1,000 units deployed in the next 18 to 24 months. Like I said: Sooner than you think.
On his 2018 two-day visit to Ireland for the World Meeting of Families, Pope Francis’s scheduled activity was protected by high-performance Predator and Invictus cameras from UK CCTV design and manufacturing company, 360 Vision Technology. Specialists in a wide range of leading-edge CCTV, Access Control, PA, AV and radio communications, County Kildare-based Mongey Communications was chosen to provide the additional security surveillance protection measures necessary to secure the Pope’s visit to Dublin. With the massive crowds expected to see the pontiff, the temporary surveillance installation needed to be minimally disruptive and use mobile radio to provide the multi-scene coverage required during the two-day visit. Multi-Site CCTV Surveillance The camera images were to be used for co-ordination and management by multiple agencies To support an existing small-scale CCTV installation at the Pope’s final venue of Phoenix Park (the largest enclosed city park in Europe), there was a need for further camera coverage along the park’s approach routes, entrance/exit gates, search areas and general areas of crowd movement and congregation. A similar solution was also required for the Pope’s visit to the Knock Shrine pilgrimage site and the Capuchin Day Center, where public space CCTV was again already in place but of limited overall coverage. Full integration with the existing CCTV system at the 82,300 capacity Croke Park stadium for a papal address to the Festival of Families extravaganza was also required, with communications and CCTV feeds from all locations required to be transmitted back to local on-site control rooms at each location, and additionally to a central Command and Control room at Dublin Castle. At the main Command and Control Center, the camera images were to be used for co-ordination and management by multiple agencies, including the Office of Public works (OPW), Garda Síochána, Defense Forces Ireland, Dublin Fire Brigade, HSE / Ambulance Services and Civil Defense. High-Definition Video Security To Secure Phoenix Park “With 300,000 people expected to attend a papal mass at Phoenix Park to close the World Meeting of Families, we were briefed to provide the very best possible reliability and imaging performance from the additional cameras we employed,” explains Kevin McGrath of Mongey Communications. We needed to be confident of camera reliability straight out of the box, along with simple and fast set-up" He further added, “With this in mind, we needed to be confident of camera reliability straight out of the box, along with simple and fast set-up, and quality high-definition video for forward transmission to the various control rooms. Our very positive experience of employing 360 Vision Technology cameras on many high-security installations in the past led us to be confident about the image and build quality of the manufacturer’s cameras, and product support.” “So, to fulfill the challenges we faced for this high-profile project, we specified the latest version of 360 Vision’s Predator camera, and also their new cost-effective and ruggedized Invictus Hybrid HD PTZ camera.” 360 Vision Invictus Hybrid HD PTZ Camera The new 360 Vision Invictus cameras specified for the project employ the latest compact camera modules with a choice of 20:1 or 30:1 zoom and are available with 1/2.8” Sony StarVis or 1/1.9” Sony Exmor (Ultra) sensor packages. Bridging the divide between analog and IP technology, all Invictus cameras are equipped with Hybrid functionality enabling installation in existing analog systems and also in full 1080P HD IP video streaming networks. Alongside ONVIF 2.4 Profile S compatibility, this means the Invictus range is not only economical, but simple to install, providing Mongey Communications engineers with a reliable, flexible and high- performance solution with which to enhance the existing electronic surveillance measures for the Pope’s 2018 visit. HD IP Video Streaming Networks An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view Further enhancing camera reliability for this important event, the new Invictus camera range design draws cost-effectively on features usually associated with very high-end cameras, including construction from high grade, hardened aluminum and stainless steel, to ensure a rugged, durable and compact camera. An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view, plus the ability to tilt above the horizon – enabling operators to view targets above camera installation height (i.e. up hills) – an invaluable asset where cameras were being installed in the difficult installation and operational conditions of Phoenix Park. Technical Relationship With 360 Vision Technology “Our decision to once again entrust the provision of the best technology available for the project to 360 Vision Technology was proven correct, and we had no issues of consequence with the installation, commissioning and performance of all the cameras - straight out of the box,” explains Kevin. “Because of the condensed set-up period available and challenging terrain of some of the installation areas, we had to act fast to ensure the successful inclusion and full control of the cameras for the multi-agency command and control room,” adds Kevin. “Here our technical relationship with 360 Vision Technology really paid dividends throughout this time-critical project, affording easy integration of all the additional cameras into the control room’s Cathexis VMS. Cathexis VMS Images from the cameras were relayed back to the various event control centres In all, over 60 additional 360 Vision Technology cameras were employed over the various sites throughout the Pope’s visit. With extensive digging and cabling not a practical option, images from the cameras were relayed back to the various event control centers via a network of reliable and secure microwave transmission links, powered by temporary generators and back-up batteries. “The new Invictus cameras were perfect for the role thanks to their low power consumption compared to other similar specification PTZ cameras,” explains Kevin. “Low power consumption really helps when adding multiple cameras to a network with a temporary power system - and meant we could add more cameras for the benefit of maximum scene coverage.” High-Speed Fiber-Optic Connectivity High-speed fiber-optic connectivity between the various remote sites and Dublin Castle was installed, together with video walls at the various control rooms. “The Pope’s visit was a great success with no security issues reported,” says Kevin. “Images relayed to the control room from the additional 360 Vision Technology cameras were vital in the smooth running of the visit and allowed all of the state agencies involved to keep a constant update on the movements of the vast crowds drawn over the pontiff’s two-day visit.” “Our long-term technical partnership with 360 Vision Technology and our direct input in to the development of their new products really pays off with high-profile projects like this,” concludes Kevin. “We have many new and exciting installation challenges on the horizon and I’m confident that 360 Vision Technology camera products will continue to be an integral part of those future projects.”
Denmark’s Evotec chose Idesco readers to complete their cargo securing system they had designed for transport companies’ vehicles. Evotec’s system does more than merely preventing cargo theft. Drivers also feel more secure when delivering because hijack risks are also reduced. This is because cargo is robustly secured when drivers leave vehicles behind. Idesco 8 CD 2.0 DESFire Readers Evotec selected Idesco 8 CD 2.0 DESFire readers for deployment on delivery vehicles Danish cargo companies had been struggling with regular delivery cargo thefts. Drivers did not feel secure when delivering and financial losses were growing. Evotec decided to develop a novel vehicle security solution for cargo companies. As part of their solution, Evotec selected Idesco 8 CD 2.0 DESFire readers for deployment on delivery vehicles. Idesco readers have since been installed on several hundred Danish cargo trucks and vans. Early in their design process, Evotec had seen a clear need to strictly limit access to vehicle’s cargo space to authenticated personnel only. They had known RFID technology could provide accurate, secure user identification and authentication. They learned that Idesco’s MIFARE DESFire readers, paired with 128-bit AES-encrypted DESFire transponders, would easily repel transponder hacking or cloning. Best of all, they learned Idesco designed many of its readers for installing outdoors, reliably resisting impacts, moisture, dirt and temperature extremes. Security Key Management Service Idesco’s Security Key Management service saved Evotec extensive time and resources"Bo Schønning, Evotec Aps CEO, described the subsequent cooperation of Idesco with his company, “We got great assistance in choosing the correct solution for our system”. In addition to coded readers, Evotec ApS also subscribed to Idesco’s convenient Security Key Management Service for ensure compatibility with every vehicle’s readers. Since DESFire demands readers and transponders be encoded with matching security keys, Idesco’s Security Key Management service saved Evotec extensive time and resources, freeing them to focus exclusively on installations for their customers’ vehicles without worrying about managing DESFire keys themselves. “We feel safe when Idesco handles this data for our customers”, says Bo Schønning. The cargo drivers of Evotec’s customers are assigned vehicle specific transponders to carry, which open the cargo space when presented to the reader guarding it. For increased security, the driver cabin locks automatically when the cargo space unlocks. Additionally, cargo doors automatically lock when they close and will remain locked when the vehicle’s engine is running. The system works equally well in vehicles equipped with liftgates. Opening the vehicle’s driver cabin with the ignition key doesn’t affect its cargo space: it remains continuously locked. If needed, a vehicle’s cargo space could be opened remotely via fleet management software. If a transponder is stolen, a vehicle’s readers can be reprogrammed to not recognize the transponders. Fleet Management And Vehicle Tracking Vehicles are also equipped with GPS transmitters that update fleet software with vehicle locations and routes Vehicles are also equipped with GPS transmitters that update fleet software with vehicle locations and routes. The fleet software’s online tracking and route reporting also provides cargo companies a powerful fuel control ability that can reduce fleet costs. “This system has significantly increased drivers’ security at work while reducing costs caused by theft”, notes Bo Schønning, CEO, Evotec ApS. “Fuel costs have also been reduced, as the cars aren’t left idling anymore. It is easier to control the fleet, and our customers can also follow the quality of deliveries with this system”, he continues.” RFID Technology Founded in 1989, Idesco is an experienced company in the field of RFID technology. From the very beginning, Idesco was a pioneer in using RFID, deploying it for identification in industrial applications. Down through the years Idesco continued expanding its reputation as a pioneer provider by innovating numerous technological alternatives and multiple technologies for a variety of different application areas. Every day, Idesco devices collect data and enhance security for a variety of access control, vehicle identification, logistics and inventory control systems.
One of the UK’s top business and management schools, the Bloomsbury Institute, has upgraded its access control capabilities to the award-winning ASSA CLIQ Remote wireless locking technology from ASSA ABLOY, the global leader in door opening solutions. Based in central London and formerly the London School of Business and Management, the Bloomsbury Institute delivers full-time undergraduate and postgraduate courses in business, accounting, finance and law, which are awarded by the University of Northampton. ASSA CLIQ Remote Wireless Locking Technology The Bloomsbury Institute has to contend with a high turnover of students each academic year, as well as any changes to staff. The sheer number of people using the Institute’s buildings meant that its existing mechanical master key system was simply no longer feasible, unable to provide adequate protection for areas that might hold sensitive information, such as exam scripts. As a result, the Bloomsbury Institute needed a flexible access control system that would be easy to maintain, granting secure access to individuals as and when needed, while delivering greater key control too. Electromechanical Locking System Providing an easy-to-use electromechanical locking system, the ASSA CLIQ Remote solution uses high-end micro-electronics and programmable keys The answer was ASSA CLIQ Remote, which has been installed throughout the Bloomsbury’s Institute’s 7 Bedford Square teaching site, and selected areas within the institute’s 99 Gower Street building. Providing an easy-to-use electromechanical locking system, the ASSA CLIQ Remote solution uses high-end micro-electronics and programmable keys and cylinders to offer flexible control over access rights. The Bloomsbury Institute can now program and update each key remotely, removing or granting access privileges for the key holder in real time. This allows only those with the necessary authority to obtain access to private areas without inconveniencing others and removes the security risks associated with lost or stolen keys. Remote Key Access ASSA CLIQ Remote also provides a full audit trail for assured peace of mind and has the functionality to create time-defined user keys, only allowing access to an individual for a specified period. This feature is proving invaluable to the Bloomsbury Institute, which plans to eventually convert all cylinders at its 99 Gower Street site to ASSA CLIQ Remote, as part of its expansion plans. Stephane Middleton, Estates & Facilities Manager at the Bloomsbury Institute, explains: “We are committed to the security and safety of student data, which led us to consider upgrading the mechanical master key system that we previously had in place. Using ASSA CLIQ Remote could not be easier. It is saving us countless hours of key cutting and changing cylinders, while significantly improving our key control.” ASSA CLIQ Remote Key For Enhanced Security When a new employee joins the team, the ASSA CLIQ Remote key is the only one they will need"“When a new employee joins the team, the ASSA CLIQ Remote key is the only one they will need, irrespective of how many rooms they may occupy or how many areas they may need access to during their time with us. In addition, the system provides robust security; if a key is lost or stolen, we can cancel it, safe in the knowledge that we are completely secure.” “The service from ASSA ABLOY has been outstanding. The company really made the effort to understand our business and its requirements. During the implementation phase, ASSA ABLOY provided comprehensive training on how to use the system to all staff that have administration rights, while working with our IT team to ensure the systems’ software is uploaded onto their machines.” High-Security Physical Master Key System “The best part of the service has been having a dedicated contact that has been onboard since the start, providing us with new updates, support and guidance. This part of the service is proving to be of great value, filling us with confidence to continue using ASSA ABLOY products in the future. Indeed, as we look to expand the sites we operate in, we envisage that all the cylinders will one day be converted to this system.” Simon Wilson, National Sales Manager for ASSA CLIQ Remote at ASSA ABLOY, said: “Our ASSA CLIQ Remote solution combines all the benefits of access control with a high-security physical master key system. The system was easily retrofitted, meaning there was very little disruption to the university during the installation process, and the institute no longer has to worry about the security concerns that come with a misplaced key. Data Security “The fact that ASSA CLIQ Remote also offers the capability to log and provide a record of who has entered and exited an area is helping to ensure rooms that hold confidential papers or sensitive information remain secure.” “We’re delighted to help the Bloomsbury Institute revolutionize its key management systems, delivering greater security, flexibility and key control.”
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8,8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Detecting And Deterring Power Thefts Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometers distribution network and 4,386 kilometers of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. Bosch Video Security And Intrusion Detection Systems For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS) As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. All systems and cameras are monitored by security personnel at the company’s control center in Recife. IP Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
Living in the era of global village, everything is rapid change. To keep up with the pace, the large-scale enterprises need to take every movement of branches in control, ensuring every policy has delivered well. HQ-Branch management, including central control, alarm synchronization, data retention and protection is becoming a great important challenge to enterprises nowadays. Without integrating lots of systems and management tools, Surveon HQ-Branch security solutions provide VMS with easy remote deployment, advanced VA for alerts and post events search, storage with large capacities for 365-day recording, and local /remote replication through NAS or ISCSI, supporting headquarters (HQ) to easily manage all branches. Surveon Control Center And Enterprise NVRs Surveon Control Center provides enterprises with an easy remote deploymentUnlimited number of cameras, users, NVRs, and monitors are supported in one domain architecture, Surveon Control Center (SCC), which provides enterprises with an easy remote deployment. Its monitor wall can be set up with any combination of camera views, making HQ can be easier awarded every branch's movements. Surveon NVR embedded 12 Video Analytics which can identify and initiate alerts for various user-defined events, offering effective monitoring, detections, alerts, and responses to events for enterprises. For example, intrusion detection can prevent uninvited people from entering the sensitive areas. Moreover, the advanced Post VA Search provides enterprises an efficient tool to quickly identify useful information and relative footage from hundreds of hours of video recording, reducing the time and efforts of HQ security manager, making HQ-branch surveillance system more efficient. Data Retention And Storage Surveon Enterprise NVRs provide large capacities for 365-day non-stopping recordingThe data retention of recorded videos and the system which can support hundreds of camera records are of great importance to the planning of enterprise surveillance. Surveon Enterprise NVRs provide large capacities for 365-day non-stopping recording, fulfilling the long-time storage requirements from enterprises. Surveon NVR supports remote replication through NAS or ISCSI. Enterprise can keep 1st copy in local branch and 2nd copy in remote HQ. If the source data fails due to system malfunctions or disasters, enterprise can leverage the remote copy to restart services in a few minutes. Software Integration Agribank, the largest commercial bank in Vietnam, and House Green, a home improvement retail chain in Taiwan, has adopted Surveon HQ-branch solutions. “Different from PC-based NVR solutions, Surveon adopts a system design fully customized for surveillance applications. This offers higher value for SIs, including advanced levels of integration and stability.” said the Sales Director of Surveon partner in Vietnam.
Having one of the world’s top predators take up residence in the middle of your town may not seem like a welcome surprise. But, when that predator is the world’s fastest bird and provides the chance to capture its behavior at its nest site, courtesy of a top 4K camera from Hikvision, it proved to be too good an opportunity for the people of Taunton and UK peregrine experts to miss. The Peregrine Falcon is a large, powerful, and breathtakingly fast bird – the fastest animal on the planet. In normal flight it cruises at 40 mph and can reach 65 mph in a chase. But, on the hunt, it can dive towards its prey at more than 200 mph. The peregrine has little to fear except man, being driven close to extinction in the 1960s due to human persecution and the impact of pesticides in the food chain Taunton Peregrine Project A top predator, the peregrine has little to fear except man, being driven close to extinction in the 1960s due to human persecution and the impact of pesticides in the food chain. With the benefit of stronger legislation and listed species protection, these birds have recovered in their natural strongholds and have now expanded into many urban areas. Just like the urban fox, the peregrine has found our built environment a perfect place to call home, lifelong pairs nesting in their eyries on tall structures and high-rise buildings and feeding predominantly on feral pigeons. St Mary Magdalene Church in Taunton, Somerset, found itself with a pair of peregrine falcons at the top of its 163-foot church tower earlier this year and quickly turned to naturalist and ecologist, Michael Leigh-Mallory, to lead the Taunton Peregrine Project. Monitor Birds Behavior Working with Coomber Security Systems, a total of five Hikvision cameras were installed to monitor the bird’s behavior, with all the video feeds wirelessly transmitted to a Hikvision NVR and 4K monitor within the church. Located in the heart of Somerset’s county town, St Mary Magdalene can trace its history to the early eighth century when Christianity was established in Taunton. Since the 12th century, the church has been built mainly of sandstone and this ancient structure provided the first challenge for the installation team as no drilling or permanent fixing to the listed building’s structure is now allowed. The second challenge to the team: placing all five cameras at a height of more than 160 feet within the confines of the church tower Highest Point Possible Naturally, the birds chose the highest point possible to establish their perch, providing the second challenge to the team: placing all five cameras at a height of more than 160 feet within the confines of the church tower and in positions that would allow the Peregrine Project to observe the widest possible range of behaviours, including in-flight as they arrived and departed the site. Finally, the ornithologists were determined that the monitoring activities should not disturb the birds. This meant locating the NVR and 4K monitor at ground level at the opposite end of the church. Comprehensive Coverage Coomber Security Systems took on the task of designing and installing the bespoke surveillance system, using Hikvision PoE Switches to provide power and data handling for all five IR-equipped cameras that were sited on the tower. The three 4K Vari-focal bullet cameras were mounted on wooden poles and then strapped to the tower to overcome the prohibition on making any permanent change to the church structure. Between the three feeds, the project team can see the birds in the air arriving at and departing from the tower, together with comprehensive coverage of the nest box that they installed in the hope that the birds would be encouraged to breed in the future. A Ubiquiti AC Nano wireless bridge was used to create a secure connection between the top of the tower and the far end of the church Impacting Natural Behavior The Project’s observation team also capture video and sound from a 4MP Mini Dome IP camera mounted within the nest box and a small 2MP PTZ camera mounted at the top of the tower to capture all round views, and to ensure the birds are not disturbed, a Ubiquiti AC Nano wireless bridge was used to create a secure connection between the top of the tower and the far end of the church. This means the video and sound from the cameras can be recorded and monitored 24/7 without impacting the natural behavior of the falcons. Providing Valuable Information According to Michael Leigh-Mallory, Project Leader of the Taunton Peregrine Project, “With two months of operation under its belt, the new system has been providing 24-hour coverage of the falcon pair, including highly-resolved images of the peregrines flying in to the perch with their prey.” “Despite the difficult and potentially hazardous installation on the ancient building, and the use of an unorthodox mounting system that puts the cameras in very exposed positions, the 4K video from the IP bullet cameras is of amazing quality both day and night. The Hikvision equipment has recorded ground-breaking images of a wide range of behaviours, including nocturnal hunting, and all in incredible definition. These 4K images are most probably a first for peregrine observation in the UK. What’s more, this unique 4K footage has been providing valuable information to external Peregrine experts, like Ed Drewitt, naturalist, broadcaster and writer of the book Urban Peregrines.” The team plan to raise more money so the views of the birds can be live streamed to the Internet via their web-site Ground-Breaking Images An Open Day was held at the end of March to allow the local community to see for themselves the result of their donations that fund the entire project. In addition, Somerset Ornithological Society and the BBC Springwatch team have shown great interest in the communities’ efforts and a large following is emerging on social media. Now, the team plan to raise more money so the views of the birds can be live streamed to the Internet via their web-site, which is currently under construction. Michael Leigh-Mallory, Project Leader of the Taunton Peregrine Project, said, “The Hikvision cameras have provided images of incredible definition! We have been able to record ground-breaking images of nocturnal hunting and a wide range of behavior. The 4K images are probably a first for peregrine observation in the UK and this unique 4K footage has been providing valuable information to Peregrine experts like Ed Drewitt, naturalist, broadcaster and writer of the book Urban Peregrines.” Results Ground-breaking 4K images of nocturnal hunting and a wide range of behavior for the first time. 2 months of uninterrupted operation with cameras operating in very exposed positions. Difficult and potentially hazardous installation on ancient building. Very satisfied End User. HIKVISION Equipment DS-2CD2685FWD-IZS - 8 MP WDR Vari-focal Network Bullet Camera 8MP Ultra HD high resolution 1/2.5" Progressive Scan CMOS Triple stream - Max. 3840 × 2160@20fps 2.8-12mm motorized vari-focal lens Up to 50m IR distance H.265+ compression IP67 weatherproof 120dB Wide Dynamic Range 3D Digital Noise Reduction Supports on board storage (up to 128GB) DS-2CD2542FWD-IS - 4MP WDR Mini Dome Network Camera 4MP high resolution Full HD1080p video Dual stream 2.8mm/4mm/6mm fixed lens 120dB Wide Dynamic Range 3D Digital Noise Reduction 3-axis adjustment Up to 10m IR range H.264+ compression IP67 weather-proof protection DS-2DE4A220IW-DE - 2MP Network IR mini PTZ Camera 1/2.8" Progressive Scan CMOS 1920 x 1080 20X Optical Zoom WDR 3D intelligent positioning function Up to 50m IR range DS-7616NI-K2/16P NVR –Embedded Plug & Play 4K NVR Third-party network cameras supported Up to 8 Megapixels resolution recording Support 1-ch HDMI, 1-ch VGA, HMDI at up to 4K(3840x2160) resolution 8/16-ch network cameras can be connected with 80M/160M incoming bandwidth Up to 2 SATA interfaces Plug & Play with up to 16 independent PoE network interfaces Support dual-OS to ensure high reliability of system running Support various VCA detection alarm and VCA search Support H.265/H.264/MPEG4 video formats 4K Monitor