Remote video surveillance
Installations around the world by Ultimate Visual Solutions (UVS) have completed more than one million hours of uninterrupted operation since COVID-19 lockdown began in March. The security video wall technology experts currently have almost 250 installations in 18 countries, ranging from the UK and US to Vietnam and Tanzania. UVS Managing Director Steve Murphy said all the sites had operated continuously since lockdown began in March. The company, based in Burney, launched a full suite of...
Dahua Technology, the globally renowned video security and smart IoT solutions provider, is helping businesses reopen amid the COVID-19 pandemic. Thermal imaging, face detection, and other technologies play key roles in screening for skin temperature and determining whether someone is wearing a mask or not. Thermal temperature monitoring “Since the start of the COVID-19 pandemic, Dahua has been devoted to providing an array of solutions to help keep businesses running wherever possible,&...
Dallmeier electronic, one of the manufacturers of video security systems, introduces the remote-controlled "Privacy Shield" for their Panomera® cameras. With a few mouse clicks, government authorities, police forces as well as private businesses can cover the lenses of the cameras with a kind of "privacy curtain" in order to protect the privacy rights of individuals concerned. The use-cases could be during peaceful public assemblies, company staff meetings or strikes. Data protection One...
Milestone Systems announced a webinar panel discussion of safety and security professionals, including representatives from Nemours Children’s Hospital Health System in Jacksonville, Florida, and The City of Calgary in Alberta, Canada. They will share insights and ideas on how to address change, support their core mission and assist other parts of their respective organizations. The webinar will focus on how these three different organizations are using their video management system to he...
Razberi Technologies has extended its software platform to integrate deeper with video management software (VMS) from Milestone Systems, providing increased uptime assurance, cyber threat protection and faster problem resolution. Monitor security network With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network – especially relevant during these times of social distancing requirements. IT professionals can quickly review cyber s...
Johnson Controls, a globally renowned company in creating smart buildings solutions and helping reopen buildings, as part of the ‘new normal’ in COVID-19 pandemic period, announced the launch of its smart elevated skin temperature scanning solution, the Tyco Illustra Pro Thermal EST. A healthy and safe environment starts with a holistic approach that encompasses not only a building’s heating, ventilation, and air conditioning (HVAC) infrastructure, but adds temperature screeni...
As organizations start actively planning to open workplaces safely, Vanderbilt is providing customers with smart and reliable strategies to help create a safer environment for staff and visitors. The company has explored best practices for protecting employees and visitors when it comes to a building. Below they outline a scenario of how products can be used for remote security management. Example Scenario: The rise in staff working from home has increased even further since the COVID-19 lockdown was introduced, and it is, therefore, critical that security staff can maintain control and monitor their organization’s security systems remotely. On-premise security systems are designed around local monitoring and on-site system management. Visitor check-in and tracking processes can be integrated with the ACTpro access control system. Real-time data provided by the visitor management solution will also enable organizations to know the number of visitors and time when visitors are entering your building. This data can help manage access levels while ensuring staff can be prepared to monitor social distancing. Visitors can make changes to their visitor fields on any check-in button and collect extra information from whoever is entering the workplace, and keep that information stored in the event log. Secure QR codes can be an effective way to provide a contactless visitor management experience. This will reduce the need for visitors to sign-in with a highly used touch screen or for a plastic card or lanyard. Cloud-based security ACT365 is a low-cost solution ideally suited to projects with multiple locations and limited IT Infrastructure. ACT365 is the only off-premise solution that offers access control and video verification from one application. Benefits of Vanderbilt security solutions: Ensure that security systems are activated during off-hours Receive automatic alerts when alarms are triggered, or other conditions are met Remotely view live video and receive analytics notifications Lock/unlock access-controlled doors remotely Remotely issue access control credentials or change user access. ‘Helping Customers Get Back To Work’ This article is part of Vanderbilt’s initiative of ‘Helping Customers Get Back to Work’. The other articles in this series, where they have explored best practices for protecting employees and visitors when it comes to a building, include: Part 1: Scenario of how Vanderbilt products can be used for area counting and pre-booking systems for occupancy management when social distancing. Part 2: Scenario of how Vanderbilt products can be used to minimize contact with touchless access control devices. Part 3: How Vanderbilt products can be used for contact traceability reporting.
Alarm systems have been available for decades, but many solutions offer little functionality beyond a sensor triggering an alert in the event of a break in. To take alarms to the next level, Hikvision is bringing a number of new and innovative technologies to market, allowing customers to meet their home and business security requirements more fully and to help expand the alarm business. No one can stay alert for a potential home or business security breach every hour of every day. That’s why alarm solutions are critically important for customers in terms of identifying and reacting to any incident in the fastest and most effective way possible. Enhancing residential and corporate security Hikvision offers a broad range of alarm solutions and technologies for different customer requirements But not all situations require the same kind of alarm system, which is why Hikvision offers a broad range of alarm solutions and technologies for different customer requirements. In some cases, for example, a customer needs to be aware when the perimeter of a site or location is breached. In other situations, they may need to monitor entrances or site perimeters, to track multiple intruders at the same time, or to speed up responses in the event of attacks in buildings or in public spaces. Hikvision innovative alarm solutions To address this broad range of end-customer requirements, Hikvision has created a broad portfolio of innovative alarm solutions that are sophisticated, automated, and always fit for purpose. These allow one to: Meet customers’ home security requirements with Hikvision Intrusion Alarm A break-in at a customer’s home can cause major upset, as well as material and financial losses. With Hikvision Intrusion Alarm solutions, they can get peace of mind that their home is properly protected at all times. Hikvision Intrusion Alarm solutions To maximise home security, the intrusion alarm solutions combine a wide range of integrated detectors To maximize home security, the intrusion alarm solutions combine a wide range of integrated detectors, including door and window-contact detectors, break-glass detectors, vibration detectors, smoke, and temperature detectors. Customers can also stream video from their security cameras direct to their mobile phones with Hikvision’s pioneering Intruder Verification as a Service (IVaaS) technology, which seamlessly unites video with cutting-edge intrusion detection capabilities in a single platform. Wireless alarm control panels The Hikvision Intrusion Alarm solution includes wireless alarm control panels and peripherals that make it fast and easy to deploy in home environments. Wired products are also available for small commercial applications. For residential applications, end users can connect into the alarm control panel, receive alerts, and watch streamed video from CCTV cameras on their handheld device. They can also configure their home security system remotely and view alarm reports. Detect and track multiple intruders concurrently over large distances with Hikvision Security Radar Customers with large sites to secure may need to track multiple intruders concurrently. They can get this capability with Hikvision Security Radar, which offers a detecting distance of up to 120 meters and a 120° detecting angle. That means customers can cover sites of 15,000 square meters and – most importantly – they can track up to 64 targets simultaneously. Hikvision Security Radar To make life easy for customers’ security teams, they can define the different areas they want to monitor, such as the warehouse, the car park, the perimeter or entrance, and others as needed. One Hikvision Radar can link up to 4 PTZ dome cameras at the same time to check multiple targets via video. With Hikvision, customers also get an extremely low rate of false alarms. This means they can focus on real intruders rather than pets or other animals, or weather interference such as fog, rain or snow. Stop criminals before they can do any damage with Hikvision Perimeter Protection The best way customers can minimize safety risk and damage to their assets is to stop intruders while they are still outside of the site or building, and that’s what Hikvision Perimeter Protection is all about. To stop criminals in their tracks, we use two parallel infra-red bars that have to be broken at the same time for the alarm to be sounded. Hikvision Perimeter Protection solution With two infra-red bars, customers can filter out all kinds of false alarms With two infra-red bars, customers can filter out all kinds of false alarms, from small animals crossing their perimeter, to falling leaves or flickering lights, which means they always know when an intrusion threat is real. Furthermore, their solutions are temperature and weather hardened, enabling deployment outside, in all kinds of perimeter locations. Their customers can also monitor their perimeter security remotely via their handheld devices. Increase safety for people in public places with Hikvision Emergency Alarm An emergency situation can unfold anywhere, in a school, on a university campus, in a park, or in the street. To help security teams work effectively, and ensure that people feel safe wherever they are, Hikvision has created the Emergency Alarm system. Hikvision Emergency Alarm system This solution allows a person in an emergency situation or attack to call for help by pushing a button, or by broadcasting a call for help to police or emergency response teams, or both. The Hikvision solution has a built-in camera and audio recording facility to collect evidence of the events taking place. In addition to these benefits, the Hikvision solution is available in different formats and can be integrated with joined-up ‘safe city’ technologies, including dome cameras, license-plate recognition cameras, low-light cameras, and much more. This kind of solution is already being deployed to improve safety in cities, parks, universities and schools worldwide and can be deployed in a wide range of other customer scenarios. Fit-for-purpose alarm solutions for every application Based on these four key application areas, Hikvision alarm solutions cover all of customers’ home security and business security requirements. While Hikvision Intrusion Alarm solutions protect homes and small businesses against break-ins, their Security Radar, Perimeter Protection, and Emergency Alarm solutions enable protection of people and assets and rapid responses on a far larger scale, either for large sites or in smart-city environments.
Dahua Technology, a globally renowned video-centric smart IoT solutions and services provider, has announced the release of DMSS, its newly designed mobile client. DMSS can connect Dahua products via the Internet or Ethernet through P2P or IP, and can also be operated remotely. It supports all kinds of product types, including NVR, XVR, IPC, TPC, VTO, Alarm Hub, and Access Control, etc. Remote operations DMSS can work in an environment with multiple internet connections. It connects Dahua products through both Internet and Ethernet. P2P enabled internet connection features great simplicity, while IP or domain name enabled Ethernet connection guarantees strong stability. Through its global network coverage, DMSS can be operated remotely to quickly and stably control specific devices all around the world. Numerous functions including PTZ controlling, video image adjustment (such as White Balance, focus, etc.), alarm subscription, video preview and playback, voice intercom, etc. can be done remotely. Enhanced data security DMSS adopts multiple layers of data encryption protection to provide better data security to users From a product to the platform and then to the mobile client, DMSS adopts multiple layers of data encryption protection to provide better data security to users. DMSS has also been certified by TÜV Rheinland, meaning the product complies with the GDPR (EU, 2016/679), and meets the TÜV Rheinland 2PfG 2624/06.17 standards, offering state-of-the-art information security and privacy protection. Featuring more detailed interaction design, DMSS offers smoother user experience. In addition, a version that supports both day mode and night mode will be released soon. Supports thermal products To provide better support towards the global efforts in pandemic prevention and control, DMSS also supports thermal products, including thermal cameras and access control and temperature monitoring terminals. It enables the operators to remotely control thermal products and perform their duty in a much safer manner. In the future, DMSS will extend its application scope to support more SMB solutions, providing installers and small and medium-sized businesses with more user-friendly solutions. With its mission of ‘Enabling a Safer Society and Smarter Living’, Dahua Technology will continue to focus on ‘Innovation, Quality and Service’ to better serve its partners and customers around the world.
A series of free interactive webinars is launched by 2N – global provider in Internet-enabled intercoms and access control systems. 2N On Air aims to help owners of residential and commercial property, architects, designers, security firms and building managers to identify and apply touchless technology which protects buildings and their occupants. The webinar series, beginning on 11 June, will profile the latest products for door controls in residential and commercial property. It will also include interactive question and answer sessions for those seeking to understand how to address the needs of their proposed or existing buildings. Coronavirus has already presented many challenges to business. Lockdown in the UK and many European countries has imposed fundamental short-term changes on business as well as individuals. Effect of COVID-19 on businesses Some companies have suffered dramatic drops in demand, with many employees furloughed with many factories, offices and shops empty or with skeleton staffing. Other businesses have been able to adapt in the face of continuing or even increased demand. Some businesses may be better equipped to emerge from lockdown into the new socially distanced normal Production lines have been redesigned to meet new hygiene and distancing regulations. Business processes have had to be adapted rapidly to remote working. Retailers and B2B suppliers have pivoted to an online model, resulting in extraordinary pressures on the infrastructure and capacity of distribution and delivery companies. There have been some clear winners; Joe Wicks, Ocado, Zoom, DHL and the makers of home-baking products. All will hope to carry their lockdown successes forward. By adapting to new public attitudes, some businesses may be better equipped to emerge from lockdown into the new socially distanced normal. For premises, 2N have products to help make them fit for 2020 and beyond. Remote door-controls CEO Michal Kratochvíl explained 2N’s motivation for the 2N On Air initiative. He said: Commercial property managers can integrate Internet Protocol intercoms and remote door-controls with other software" “After this great upheaval in our lives, our attitudes towards hygiene and security may have changed. More than before, we may want to avoid touching surfaces such as keypads which we are not sure are clean. We may want to avoid unnecessary face-to-face meetings with strangers, especially at our own front door.” “In the workplace, there may be greater spacing between employees, including receptionists and security staff who may feel nervous about direct exposure to employees and visitors as they enter and exit buildings. Apartment buildings equipped with intercom or mobile-enabled access control systems offer reassuring security without exposing residents, guests and tradespeople to unwanted face-to-face exposure or unhygienic keypads.” “The 2N On Air series offers seminars on the products in the market – offering resilient security while maintaining social distancing and good hygiene - and advice to those who are considering whether and how they might future proof their buildings. Commercial property managers can integrate Internet Protocol intercoms and remote door-controls with other software such as employee time recording systems.” “Effective high quality video and mobile-enabled door access controls are already recognized as a competitive advantage for forward-thinking building designers and operators. In the new post-coronavirus environment, the resulting wellbeing of building occupants has an even greater value.” Remote control of visitor access 2N itself saw no let-up in demand for its products and its expertise during the lockdown. The advantages of touchless entry controls, remote control of visitor access and socially distanced video intercoms are all the more apparent when so much focus is on hygiene. 2N’s production hub, near Czech capital Prague, continued to operate throughout the period, with automated production and assembly lines and a mixture of social distancing protocols and home working. One of central Europe’s largest hospitals invited 2N to advise on a tailored door control system to flexibly manage access to COVID-quarantined parts of the estate.
Transit agencies have traditionally relied on multiple single-purpose proprietary systems that don't interconnect. To help security, IT, operations and vehicle maintenance staff work together, Genetec Inc. (“Genetec”), a technology provider of unified security, public safety, operations, and business intelligence solutions, announced a portfolio of solutions designed to help transit organizations unify their security and operations from a single intuitive interface. The Genetec Transit Portfolio enables key stakeholders to work in sync using a solution that unifies wayside and onboard security with operational and intelligence products that leverage their existing security infrastructure to bring additional insights. Unified security and operations platform Most on-board and wayside systems are built on separate, closed architectures that require costly custom updates and integrations to communicate with other systems in a limited way. Transitioning to a single, open platform under a single pane of glass helps unify systems while laying the foundation for coordinated processes, efficient incident response, and collaborative work. A unified system establishes an infrastructure that facilitates sharing data while keeping it secure This makes it easier to build internal processes to increase an agency’s overall operational efficiency. Additionally, transit agencies are increasingly being solicited for information from external partners (neighboring transit agencies, law enforcement, city services, etc.). A unified system establishes an infrastructure that facilitates sharing data while keeping it secure. “To meet evolving demands and travelers’ expectations, transit agencies need to find creative ways to provide a safe and seamless journey for their customers, while also having the right systems and protocols in place to ensure efficient operations”, said Jermaine Santoya, Industry Marketing Manager for Intelligent Mobility at Genetec. “Using a unified security platform allows them to track all events in their vehicles and premises, record and retrieve actionable information efficiently, and provide an optimal experience for all commuters.” Genetec Transit Portfolio Genetec Transit Portfolio is the Genetec Security Center platform which unifies video management, access control and Automatic License Plate Recognition (ALPR) capabilities. Security Center Omnicast™ video management system (VMS), transit agencies can monitor their infrastructure and vehicles to help protect commuters and staff using a wide range of cameras, encoders, and CCTV equipment. Security Center Synergis™ access control system secures entrances for staff and commuters, improves compliance, while leveraging existing network and third-party access control devices. Security Center AutoVu™ automatic license plate recognition (ALPR) makes it easier for parking management teams to enforce parking restrictions by locating and counting vehicles of interest like buses, taxis, and car-sharing services, and providing a real-time inventory of vehicles on access roads and in monitored parking lots. Fleet and vehicle monitoring The Genetec transit portfolio also includes a number of transit-specific capabilities: Security Center Fleet Monitoring: provides a unified, non-proprietary solution, to configure and interact with the different devices on board each vehicle in a fleet to provide live video, GPS localization, and vehicle telematics. Security Center Transportation Sensor Management: ingests data from a wide variety of sensors to count people or vehicles entering the premises, track occupancy, and serve as triggers for procedures. Sipelia™ Communications Management: extends a transit organization’s security with SIP-based communications that promotes collaboration between colleagues through embedded audio and video calls while allowing operations staff to manage public address systems as well as incoming and outgoing calls with intercom devices. Additions to security portfolio The portfolio also includes a number of additional options including: Genetec Mission Control is a collaborative decision management system that empowers transit agencies to use their existing sensors and security devices to collect and qualify data to identify complex situations and incidents. Once incidents are identified, the system launches a response that allows operators to follow transit-specific processes and meet compliance requirements. The Genetec Clearance collaborative investigation management system can help speed up investigations by allowing agencies to securely collect, manage, and share evidence from different sources with both internal and external stakeholders. Streamvault is a line of turnkey security infrastructure solutions that range from workstations to fully furnished servers and hardened onboard computers for vehicle fleets.
Rhombus Systems, a cloud physical security platform, announces a strategic partnership with global real estate investment management company CA Ventures, through which Rhombus Systems will provide CA with a video security platform for multifamily and student housing communities. The platform will be capable of supporting an unlimited number of cameras and locations from one console – fully accessible from any web browser or mobile device. “The real estate sector has been going through a massive technological shift, accelerated in many respects because of the COVID-19 pandemic,” said Mark Zikra, vice president of innovation at CA. “Aligning with technology companies is an absolute must to stay relevant in today’s industry and provide a level of resiliency that’s not achievable with traditional systems. Rhombus’ AI software makes it possible to manage and improve internal operations while delivering an experience for our residents, which is our top priority.” Remote access video security solution Rhombus Systems provides a centralized video security solution to help CA scale its security across its properties. By being cloud-based, Rhombus Systems provides 24/7 remote access and is not limited by the number of cameras, locations, or users it can host on the platform. This enables CA to standardize security and streamline operations for community managers to better serve their residents. Additionally, Rhombus Systems includes AI technology so that managers can receive alerts for specific events – such as trespassers, loiterers, and vandals – and easily share video with local authorities, promoting the safety of residents and their guests, as well as neighbors in the surrounding community. With its advanced security cameras and smart IoT sensors, Rhombus Systems is also exploring ways to help property developers like CA be more agile and resilient in the face of challenges like COVID-19. Commercial video security “Historically, trying to deploy a video security system is a major pain point for commercial real estate organizations with multiple locations,” said Garrett Larsson, CEO of Rhombus Systems. “Organizations are often forced to go with subpar systems without realizing there’s better options out there. That’s why we designed Rhombus to be as simple and straightforward as possible to ensure video security is seen as a powerful operational tool rather than just a video recording device. This partnership with CA will show other commercial property owners how vital video security is in promoting an upscale and comfortable environment for tenants.” Additionally, CA Ventures will take advantage of Rhombus’ ability to integrate with other enterprise systems, including cloud access control and modern intercom systems. By leveraging these interoperable systems, CA will be able to elevate the guest experience by utilizing, smart technologies. Surveillance of the exterior of the building CA Ventures’ and Rhombus Systems’ first planned deployment will take place at Uncommon Tuscaloosa, an off-campus student housing community near the University of Alabama, and will feature more than 100 cameras throughout the exterior of the building, parking garage, and amenity spaces. “Innovation and technology are at the forefront of our strategic global vision,” said Zikra, "Partnering with Rhombus provides a critical piece of our integrated building and operations platform that will supplement existing systems and processes that promote resident comfort.”
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
By now your organization should know the drill. To keep your enterprise safe from unauthorized access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vulnerabilities that require immediate and constant attention to stay safe in a hostile security world. Protect Against Burst Attacks You may be aware of DDoS, or distributed denial of service attacks. In fact, Cisco writes that these online attacks — where high-volume traffic floods a system’s servers, making web traffic extremely slow — grew 172% in 2016. But in the last few years, Cisco documents how "burst attacks", a type of DDoS attack that floods traffic in short bursts at random times over a prolonged period, has skyrocketed. They claim that in one study, 42% of the companies faced a burst attack in 2017. Burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack According to Radware, on-premises DDoS protection needs to adapt to counter these often less than one-minute attacks. While the majority of these solutions detect burst attacks, they write that "most of them limit the rate of bad (and legitimate) traffic to a certain threshold, resulting in a high level of false positives." One big challenge is burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack. They recommend adopting two key solutions: 1) a behavioral DDoS protection system that utilizes machine learning algorithms to identify the patterns of burst attacks, and 2) measuring the degree-of-attack (DoA) surface, which looks at the bandwidth or rate of a specific type of traffic and the percentage of a given type of traffic out of the entire distribution of traffic. If an attack rates high in both the bandwidth and percentage parameters, then it gets a high DoA surface score, showing that a burst attack likely occurred. Prioritise Network Infrastructure Nefarious actors have been exploiting both enterprise level and small/home office and residential routers For companies with in-house information technology staff, network infrastructure usually gets plenty of attention. Proper configuration, maintenance and security are often key considerations for infrastructure due to its importance to the business. What about smaller entities? Do you have a small switch or router you either purchased or leased from your internet service provider? If so, when was the last time you updated it? In Alert TA18-106A, the United States Computer Emergency Response Team (US-CERT) shares information dating all the way back to 2015 on how nefarious actors have been exploiting both enterprise level and small office/home office and residential routers and switches. If you haven’t changed passwords and updated the software/firmware on these devices yet it should be near the top of your priority list. Hide Sensitive Web Pages From Search Engines Search engines are an easy first step for someone looking to exploit your environment. They can conduct searches of your known web presence, looking for pages which might not have been meant for the general public but are still accessible. Using robots.txt pages can be excluded from search engine crawlers. Entrepreneur.com suggests checking out a tutorial from SEObook.com to learn more about how you can do this. Keep in mind this will only deter the most basic attackers as more sophisticated attackers will conduct manual searches. Update Passwords On Your IoT Devices Data at rest is important, but data in transit is just as important to encrypt, particularly sensitive information It is shocking how many IoT devices are used in our daily lives, such as security and video conference cameras, cars, and smart sensors, but also contraptions you probably forgot are now connected to the internet, such as garage doors, appliances, etc. Tom’s Guide gives a good list of the many things you should remember to update. Use Encryption To Protect Data In Transit Encryption your data at rest – when it is stored somewhere – is incredibly important. However, your encryption efforts should not stop there. Data in transit is just as important to encrypt, particularly sensitive information. This could include communication between your websites and applications or even just communications within your company. Unencrypted information is at risk to an eavesdropper on your network. To prevent the data from being usable to potential eavesdroppers, ensure you are using encrypted connections such as HTTPS, SSL, TLS, FTPS, etc.
From robots to drones to counter-drone solutions, a range of new technologies will be displayed at ISC West 2019. The Unmanned Security Expo will return, including a dedicated complimentary education theater for attendees offering sessions on a range of topics. UAVs, UGVs And Autonomous Systems Also included will be demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. The market growth for unmanned technologies being used for security and safety benefits is progressing at a rapid pace. Let’s look at some of the exhibitors in the 2019 Unmanned Security Expo: Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations. Indoor environments, which are confined and controlled, present fewer navigation challenges for robots, which can quickly become familiar with the surroundings and navigate easily through an office space. Indoor robots can provide benefits beyond security, too, such as facility management, promoting employee health and safety, and emergency response Compact Surveillance Radar (CSR) System SpotterRF provides the world’s most advanced compact surveillance radar (CSR) system for affordable wide-area, all-weather perimeter security and small force protection. Incorporated in 2009, the company attained profitability quickly and is ahead of forecasts. Dedrone has remained at the front of the issue of drone threats, integrating installations to military bases, stadiums, public events, and private individuals. The company has expanded its operations to include a new office in Washington, D.C, and has continued to upgrade its DroneTracker software. DroneTracker is the industry’s first airspace security solution that includes automated summary reporting for instant diagnosis of drone airspace activity. Airspace Security And Drone Tracker Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider. Founded in 2007 in Israel, Magos first specialized in advanced radar solutions for the military and defense markets. In 2015, Magos’ technology was declassified, allowing the company to focus on developing best-in-class systems for the commercial security market. Today, Magos radars are used in over 30 countries in critical infrastructure, data centers, electric utility sub stations, and oil refineries as well as in other commercial verticals like vineyards and car lots. Now, Magos is positioned to see increased adoption of its solutions in the U.S. Patriot One Technologies Inc. develops solutions to detect concealed weapons, utilizing novel radar technologies. Their innovative radar technology provides first responders and security personnel valuable time in active threat scenarios. The technology offers stand-off detection of concealed threats typically employed in public locations. These are just a few of the exhibitors in the Unmanned Security Expo. They represent technologies that will help to shape the future of the security marketplace.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future at ASIS 2016: Autonomous drones that can patrol a perimeter 24 hours a day, seven days a week, managed remotely and able to perform multiple tasks on-site. The technology was developed by Israeli-based Percepto, based on innovation with roots in the Israeli military. Percepto has sharpened its focus on computer vision and applied it to allow drones to fly autonomously, using global positioning systems (GPS), vision sensors and algorithms to constantly analyze what the drone “sees” through an on-board camera. The system can work with any camera that provides an adequate image for real-time vision algorithms. Perimeter Security At ASIS Tyco Integrated Security invited Percepto to display its technology in the large integrator’s booth at ASIS. “It was the first show where we targeted perimeter security,” says Ariel Avitan, Percepto’s Chief Commercial Officer. “Tyco took us under their wing. We had about 100 conversations at the show. After about 10 minutes everyone understands the business logic behind the solution. You have to talk to the end users to understand that your concept is validated.” Percepto is in the contractingphase with TycoIS and alsohas a number of other pilotprojects, including energycompanies in Europe TycoIS is also working with Percepto on several pilot projects to demonstrate and fine-tune the technology. Percepto is in the contracting phase with TycoIS and also has a number of other pilot projects, including energy companies in Europe. “Our challenge is robustness,” says Avitan. “The technology is trustworthy. We just need to make sure the system is. And the industry needs to identify applications where we can provide more value.” Autonomous Drone Performance Percepto’s products include a hardware base station to control the drones, and the PerceptoCore module is installed on board the drone to allow it to interface with the base station. The core is pre-loaded with multiple task applications that enable the drone to perform tasks relevant to its purpose – autonomously. The “core” can be installed on almost any size or type of drone, whatever the manufacturer. In addition, Percepto provides an interface that integrates with existing systems in the security department’s control room. Cloud management software enables remote access and management of multiple drones. The software collects, analyses and presents data, while streaming live video on an ongoing basis. Perimeter security is just one application where drones will be deployed in the near future. Having a drone stationed on-site, charged and protected by its hub, enables fast reaction to any need in the field, day or night. Additional sensors and other equipment can be added to drones to detect gas leaks, thermal energy, or smoke, and even to provide life safety capabilities. Lighted drones with voice messaging could be used to direct employees or the public to the best exit route in case of a mass evacuation. 24/7 Perimeter Security Using drones to patrol 24/7 addresses the needs of perimeter security. Adding more sensors and providing additional data to operators helps expand the system’s utility and increase return on investment (ROI), says Avitan. “These applications are a tremendous benefit for security,” he says. “We actually find that adding safety and inspection applications is a good way to increase security. When you have a drone that knows how to provide ROI, it saves tons of money. It’s always about security, but above that we want to add value and increase ROI.” In addition to perimetersecurity, drones will soonbe used to inspect thethousands of solar panelsat solar energy sites In addition to perimeter security, drones will soon be used to inspect the thousands of solar panels at solar energy sites. Drones with cameras can detect the presence of dust or other factors that lower solar-panel efficiency, or cracks or malfunction of the actual panels. Thermal imaging on board a drone can detect which panels are under-performing. Drones could also be used to provide alerts if a transformer or cabling overheats in a power plant or critical infrastructure application. Restrictions On Drones The U.S. Federal Aviation Commission is evolving its position on autonomous drones. Drones are restricted from populated areas, can only fly at certain altitudes, and must be equipped with lights if flying at night. Currently, applications require that there be an unmanned autonomous vehicle (UAV) pilot on site, maintaining “line of sight” with the drone, who can take control if needed. However, the requirement for the UAV license has been lowered to allow certification with an online course. There have also been some exemptions granted for the line-of-sight requirement (e.g., railroad inspections). “We include control mechanisms now to be compliant, and when the barriers come down, we are ready for that,” says Avitan. Many global jurisdictions are following the FAA’s lead, although some countries do not regulate drone traffic. Avitan says he expects regulators to allow drones to fly autonomously beyond line of sight in specific closed facilities in the next 12 months. Based on the pilot projects, Percepto will fine-tune the system, streamline manufacturing and launch a fully commercialized system by Q1 2017. Avitan expects to have up to 100 units deployed in 2017, and up to 1,000 units deployed in the next 18 to 24 months. Like I said: Sooner than you think.
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that City Council District E in New Orleans has taken an innovative approach to address illegal dumping using Security Center, the unified security platform from Genetec. Countering illegal dumping menace Illegal dumping is a problem in most cities around the world, but enforcing laws to prevent it can be quite difficult and resource-intensive. To catch culprits in the act, law enforcement and other city staff have to physically watch known sites and wait to spot illegal dumping activity. Most city officials know that's an impossible task, as officers can't be everywhere all the time, and offenders take full advantage of that reality. New Orleans’ RTCC and Sanitation Department has begun installing a network of cameras at known dumping sites In response, New Orleans City Council District E Councilwoman, Cyndi Nguyen, has taken a hands-on approach tackling illegal dumping head-on as a part of a larger push toward revitalising the community she serves. Nguyen’s team, working in partnership with New Orleans’ Real Time Crime Center (RTCC) and Sanitation Department has begun installing a network of cameras at known dumping sites. All cameras are portable so they can be moved to new dumping hotspots as needed. Genetec security technology platform deployed “This security technology from Genetec certainly helps re-enforce the message I’m putting out there, that we can and will enforce illegal dumping offenses in District E. We also have this great partnership with the Sanitation Department, our local Police Department, and the RTCC, and that’s extending out into our community as well,” said New Orleans City Councilwoman, Cyndi Nguyen. She adds, “I am working hard to get more residents and businesses involved in supporting these initiatives, because keeping our city safe and clean is a shared responsibility.” Real Time Crime Center (RTCC) The Real Time Crime Center (RTCC) already uses Security Center to manage its citywide public safety improvement initiatives. To help monitor illegal dumping activities, the Crime Center’s IT department also set up an event-to-action rule in the Security Center platform to processes motion detection in a defined zone of the camera’s field of view. As soon as motion is detected, the security system bookmarks it and notifies IT staff As soon as motion is detected, the security system bookmarks it and notifies IT staff so that they can evaluate the situation and determine if collection of the debris is warranted. The system also takes a snapshot of the video and emails it to designated personnel on the team, so as to enable them to identify and investigate any potential dumping perpetrators, and take appropriate action. Crime detection with video evidence In an example of a recent case, this event-to-action led to the arrest of a repeat offender who had previously been convicted and sentenced for dumping 14,000 tires. All snapshots and video evidence were securely shared with the New Orleans Police Department so as to enable them to quickly identify the perpetrator, apprehend him and complete their investigation. “Without this technology, finding these offenders comes down to chance or it could take a police officer hours and hours of investigative work. Instead, it took us minutes to set up the event-to-action in Security Center, and just about two days from the time we were notified about this offender to the time we were able to apprehend him,” said Bill Wood, IT Supervisor at New Orleans’ Real Time Crime Center (RTCC). Bill adds, “We love working with the Genetec Security Center security platform. It’s very user friendly and helps us cut down that investigation time exponentially.”
When talking about penguins, people normally think of snowy Antarctica. However, many would be surprised to know that Africa is also home to penguin families. The African penguin is a unique species that has been classified endangered from a population of over a million in the 1920s to only 13,300 breeding pairs left in South Africa currently and could be extinct in the wild by 2030. Saving African penguins Historical factors of guano scraping for agricultural fertilizer destroyed the African penguins’ breeding habitat, leading to predation during the crucial fledgling stage. An estimated 13 million-plus penguin eggs were harvested as a delicacy that caused the initial crash in numbers. In addition, the African penguin also faces issues of predation by gulls/seals/sharks, oiling, marine pollution, and a lack of fish due to overfishing in their crucial hunting grounds. Hikvision and DICT partner to protect African penguins At the initial phase of the conservation project, Hikvision cameras and solution were deployed at APSS Since 2006, the Dyer Island Conservation Trust (DICT) has been rescuing birds and providing nests to help them during the fledgling stage, which improves the breeding success. In 2015, DICT opened the African Penguin and Seabird Sanctuary (APSS) with a fully equipped lab and the vet on standby. Now, Hikvision has partnered with DICT to protect the African penguin. At the initial phase of the conservation project, Hikvision cameras and solution were deployed at APSS, which makes it possible for the public to view the feeding and rehabilitation process, and bring the conservation message of the African penguin to a wider audience. Hikvision cameras installed at APSS “We have always wanted to share the daily work we do at the APSS with a larger audience. Through the use of cameras, this will be possible. The planning of this project started in 2019. At the time, little did we know that the lockdown caused by the epidemic would prohibit visitors from temporarily viewing the penguins. So being able to view the penguins from one’s home will mean we don’t have to forget about our feathered friends,” said Wilfred Chivell, the Founder of DICT. Ping Yu, Cape Town Branch Manager of Hikvision South Africa, elaborated on the partnership, stating “Hikvision is committed to using technology for good. We are very pleased to be able to support the efforts of APSS’s critical conservation work.” PTZ cameras for non-invasive wildlife observation Hikvision’s cameras have the latest technology that provides multiple views and high-quality images Hikvision’s cameras have the latest technology that provides multiple views and high-quality images. The pan-tilt-zoom functions of Hikvision products are ideal for non-invasive wildlife observation, part of the efforts to ensure future breeding populations. In the next phase of the project, DICT plans to deploy Hikvision cameras on Dyer Island, once a thriving colony that had 25,000 breeding pairs of the African penguins in the 1970s. They are now less than 1,500 pairs left. Deploying Hikvision cameras on Dyer Island Due to the sensitive nature of the island, it is not open for the public, but with the use of Hikvision cameras, people can observe the penguins as they interact in their natural habitat. This will help with scientific monitoring and bring the island to the general public, and the video technology and solution provided by Hikvision are expected to improve the conservation work from a few other aspects: It can help to evaluate the nesting and breeding on Dyer Island. It is an innovative method to identify possible injured or compromised birds without causing unnecessary disturbance to breeding birds. The staff and volunteers can immediately treat any birds, thereby increasing their survival rate. It is a useful tool for island rangers to spot trespassers on the island. Hikvision is committed to exploring how innovative technology can secure the sustainability and biodiversity of the world.
With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network during a time of social distancing. IT professionals can quickly review the cyber posture data in case of a cyber-breach. Razberi Monitor™ provides secure, remote visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. Remote monitoring The tool simplifies the monitoring and support of a multi-site enterprise security system, predicts and prevents problems for security professionals while providing a centralized view that benefits both IT and Physical Security departments. We have listened to the surveillance industry and created our software platform to enhance relationships" According to Tom Galvin, Chief Product Officer, Razberi Technologies, "We have listened to the surveillance industry and created our software platform to enhance relationships and align Physical Security and IT departments. Razberi Monitor allows security professionals to be proactive by predicting problems." Aligning network and surveillance departments Razberi Monitor's software platform, paired with Razberi's video recording and switch appliances, has enabled Tropical Shipping to save on the cost of sending maintenance crews to check on potential issues in their US and Caribbean facilities. "Our network is highly distributed across the US and Caribbean with up to 125 users viewing camera feeds at one time. Razberi Monitor has helped us increase our camera uptime assurance and align our network and surveillance departments," said Chad Nelson, Director of Security, Facilities and Cargo Compliance, Tropical Shipping. "They now have a clear view of all operations, and it puts me in the driver's seat to be able to provide specific alerts to each port remotely, quickly and more efficiently than sending a tech to troubleshoot."
STANLEY Security, one of the UK’s renowned security and business solutions providers, has installed a wall mounted Thermal Temperature Monitoring Solution in the reception area of Amcor Flexibles Winterbourne site, as a valuable addition to the raft of measures that the company has in place to protect its staff from COVID-19. As a key manufacturer of pharmaceutical and medical packaging, Amcor Flexibles Winterbourne, based in the UK, has a workforce which has been designated as key workers in the COVID-19 pandemic. Remaining open for business and working at full capacity during the lockdown was and continues to be vital. COVID-19 specific safety measures Amcor has put in place a raft of COVID-19 specific safety measures, with the latest requirement being a temperature monitoring solution that could be used to detect elevated temperatures of anyone entering the main reception area, without putting reception staff in any danger. While a raised temperature is not necessarily an indication of illness, and many people with the COVID-19 virus are asymptomatic, monitoring temperatures of people arriving on site is one extra measure to help protect against the spread of the virus. Thermal Temperature Monitoring Solution STANLEY Security provided Amcor with an automated Thermal Temperature Monitoring Solution STANLEY Security provided Amcor with an automated Thermal Temperature Monitoring Solution, featuring a wall mounted hybrid thermal network camera, a blackbody calibration device, and an NVR. The contactless, non-invasive system is able to monitor temperatures within large groups of people at a distance, reducing manpower requirements and improving personnel safety. The blackbody device provides a constant reference temperature in view of the thermal camera, for accurate temperature monitoring during continuous operation. This prevents changes in the ambient temperature, such as air conditioning being activated, from affecting the systems accuracy. Security alerts When a person with an elevated temperature is detected by the system, an alert is raised which is then acted upon by reception staff during office hours or security staff out of hours. Amcor has a clear policy for dealing with this situation, which differs depending on the nature of the visitor. For Amcor Flexibles Wintebourne’s Operations Manager, Shaun Golding, the system has proven very straightforward to use and is a valuable addition to the raft of measures the company has in place to protect its staff from COVID-19. Elevated temperature detection Shaun said, “So far we’ve only had one person who was detected with an elevated temperature and was sent for a test. But that single person could have come into contact with five or six people during the course of their working day. By having this Temperature Monitoring Solution in place, we prevented that from happening, further reducing the risk.” He adds, “STANLEY Security installed the system in less than a day, without any disruption to our business. The services they have provided us have been really good and I would recommend them.” As an existing customer, STANLEY Security was familiar with the Amcor site in Bristol, having installed CCTV and access control systems there in the past.
Axis Communications, the provider in network video, has helped develop an innovative and clean energy solution which illustrates the potential of sustainable surveillance technologies in remote locations. In response to a request to produce a system to document part of a major program of improvements to Scotland’s A9 carriageway, Axis and its partner Camera Control UK, developed a solution which is capable of capturing high-quality 4K time-lapse imagery using entirely renewable sources. One of the main challenges was that the solution needed to be able to capture high-quality surveillance video in an area with no communication networks or local power, while coping with weather extremes and construction logistics. With diesel generators disregarded due to the pollutants they would produce, and the challenges associated with trying to lay power cables over a considerable distance along a route that twists and turns, a clean and sustainable solution was required. Video surveillance helps in better traffic flow The highways project will see a 10-mile stretch of the A9 from Perth to Inverness widened to increase the efficiency of the route and allow for smoother traffic flow. After winning a tender to document the project, local company, MB Productions Ltd, commissioned Camera Control UK to produce a solution. Camera Control UK in turn contacted Axis Communications, the provider in network video technology, to work in collaboration. The resulting video would be used for audit purposes, to provide evidence of best practice, and to serve as example material for future projects. All captured video is relayed back to a central control location using a dedicated wireless network Martin Naylor, Director of Camera Control UK, elaborates: “We realized it had to be an off-grid solution to avoid using local power; a solution that could incorporate wireless communications and utilize renewable energy sources to be environmentally friendly and sustainable over the longer term.” Bullet cameras To bring the solution to life, AXIS P1448-LE 4K short bullet cameras were chosen for their robustness and durability. The final system uses eight solar power packs, charged by a mixture of wind turbine and solar PV panels. Eight towers with mounted cameras are employed at various key touchpoints along the A9. Communications masts, installed to enable cloud connectivity, ensured that the Axis cameras, connected via the IoT, were able to deliver imagery of incredible quality. The whole solution illustrates the possibilities for innovation when utilizing the natural elements, having a virtually zero carbon footprint. All captured video is relayed back to a central control location using a dedicated wireless network. The whole system can be remotely monitored to continually check its status of operation. Remote management also enables the cameras to be fine-tuned for precision imagery of the work in progress, without the need to manually touch the cameras, or even to be on-site in person. 4K Imagery Martin Naylor commented on the relationship with Axis that has made this solution possible: “Axis really values innovation and is therefore an ideal partner, not only because the team takes the time to understand the challenges when trying to push the boundaries of what’s possible in surveillance, but also because their drive towards sustainable and ethical practices is an inspiration to other technology companies.” Matt Brown, Director, MBP, said of the solution: “We are now able to capture fantastic 4K imagery of the ongoing work on the A9. Camera Control UK has produced an entirely green solution, an incredible feat of engineering. The Axis cameras are in a completely different league, in terms of quality, to others we’ve seen. This project has been a great success.”
Perusahaan Gas Negara (PGN) is a company in Indonesia for the transportation and distribution of natural gas. The total length of distribution pipelines of this company is 3,187 km, serving around 84 million customers. As the owner and operator of four transmission pipelines, PGN is responsible for guaranteeing security along the entire chain of conservation and distribution of gas and for delivering products and services in accordance with the needs of consumers. Securing gas supply lines During the transport phase, the gas is pushed through the pipelines at very high pressure. When it reaches the end-users, however, its delivery pressure must be adjusted so that it falls within an acceptable range (as detailed in the contractual delivery specifications). This is to prevent consumers from being exposed to the full transport pressure reached within the pipeline. A meter and regulator station is used to regulate the Natural Gas outlet pressure, and reduce it to an acceptable value. To this end, PGN has developed a meter and regulator station (the Master Control Station) that works via remote control, directed from the control room. This project plays an active role in the PGN's commitment to achieving Operational Excellence in process management, with the focus on optimizing safety, improving efficiency and on maximizing reliability throughout the gas supply chain operations. PTZ cameras and remote monitoring To guarantee reliability and security of the control function, it is necessary to monitor the process using specialized CCTV equipment for hazardous zones. 10 PTZ units from the MPXHD series have been chosen for the realization of this surveillance system, because of their reliability in providing perfect video footage and their compliance with the security standards for operation in hazardous areas. The PTZ units are used to directly monitor the metering and regulating operations remotely from the master control room.
Round table discussion
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?
Once again, ISC West has come and gone. The show continues to please exhibitors and attendees. Reviews are generally glowing and enthusiastic. For all its successes, however, there is a certain repetition from year to year – a lot of the same players, the same technology trends (not to mention the same venue every year, but who doesn’t like Vegas?) But even among the repetition, there is usually at least one element that is surprising. Perhaps it’s the unexpected elements that keep us all coming back. We asked this week’s Expert Panel Roundtable: What surprised you most at ISC West in 2017?