Pelco by Schneider Electric, the trusted global provider of end-to-end video security solutions, will be exhibiting products, solutions, and services for several market segment applications at ISC West 2019, held in Las Vegas from April 10-12. Pelco is shaping the future with leading technologies such as Cloud Services, Automatic License Plate Recognition, 4K imaging capability, and advanced deep learning-based analytics. Pelco will showcase VideoXpert Video Management System (VMS) platform enh...
Verizon announced the addition of BlackBerry Cylance’s AI-driven antivirus security solutions to its industry-leading Managed Security Services (MSS) portfolio. “Businesses of all sizes are suffering alert-fatigue generated by other endpoint solutions. Many are turning to managed security services to gain holistic, expert-level management across their endpoints, gateways and networks on a round the clock basis,” said Stuart McClure, co-founder of Cylance and president of Black...
MOBOTIX and Konica Minolta are currently developing a new camera platform that specifically meets the requirements of deep learning methods and will lead to innovative recurring revenue models for both companies: MOBOTIX Camera Platform The new MOBOTIX camera platform, jointly developed with Konica Minolta, is based on the distributed intelligence in our camera system and is crucial for artificial intelligence and at the same time the key for the communication of our products with other sensor...
It’s the first quarter of a New Year and businesses are already busy reviewing budgets for ways to save money. One line item that can impact business the most – loss. Employee theft alone is a crime that costs U.S. businesses $50 billion annually*, according to Statistic Brain. So if you aren’t sure who is keeping watch over your property and assets, and how they reduce preventable loss, it might be time for a security audit. According to GuardOne, the security patrol and remo...
Sargent and Greenleaf (S&G), a manufacturer of high-quality mechanical and electronic locks, announces its newest centrally controlled, Internet Protocol (IP) safe lock: NexusIP. As an IP security system and part of S&G’s Digital Platform, NexusIP is a fully scalable solution that allows for real-time, remote monitoring and control of one lock or multi-lock location network for a more reliable IP safe lock. Utilizing Wi-Fi networks that are already in place, NexusIP requires...
Matrix Comsec, a manufacturer and provider of security and telecom solutions, is participating in ISC WEST 2019, Las Vegas, USA on 10th April 2019. Matrix will be showcasing its comprehensive range of IP video surveillance, people mobility management - an innovative range of access control and time-attendance solutions at the event. Both these solutions are specifically designed for large and multi-location enterprises, SME and SMB organizations. Matrix is known for offering technology driven,...
Qognify - the trusted advisor and technology solution provider for physical security and enterprise incident management - announced that it has completed the acquisition of the IP video management software (VMS) company - On-Net Surveillance Systems (OnSSI), including the pioneer of IP video technology - SeeTec GmbH. Backed by the global investment firm Battery Ventures, Qognify announced the agreement on December 22, 2018 and the deal closed on December 28, 2018. Expanding Geographic Reach With Qognify, OnSSI and SeeTec operating under one umbrella, the company is today one of the largest VMS, Video Analytics, PSIM and Critical Incident Management companies in the world, serving mid-market and enterprise organizations. We look forward to focusing on 2019, supporting all Qognify, OnSSI and SeeTec partners and customers"Steve Shine, CEO and President of Qognify states: “Following the swift closing of the deal, we look forward to focusing on 2019, supporting all Qognify, OnSSI and SeeTec partners and customers, while substantially expanding our geographic reach and market penetration.” Combined Technologies Portfolio Qognify’s VisionHub, NiceVision, FAST and Situator solutions are trusted by financial services companies, mass-transit infrastructure, large international airports and seaports, as well as smart and safe city projects around the world. The OnSSI Ocularis and Cayuga VMS solutions are deployed across education, gaming, government, healthcare, logistics, manufacturing, retail, public safety, transportation and utilities organizations, in more than 100 countries. Shine adds: “Today, through our combined portfolio of award-winning and market-leading technologies, infrastructure and expertise, we expand our global presence, creating an entity capable of meeting the exacting requirements of mid-market and enterprise organizations anywhere in the world.”
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, has announced that Jordan Rivchun has joined the company to drive its most important retail projects and to lead solutions and strategy in the retail vertical and other related customer segments. In his business development role, Rivchun will be instrumental in increasing retail end users’ awareness of Hanwha’s leading security products. Security And Loss Prevention Expert “Jordan is a dynamic leader and is well respected within the loss prevention industry. His extensive experience as a loss prevention executive and practitioner fully supports Hanwha’s mission to engage and listen to our end users to envision the solutions our customers trust us to build,” said Ray Cooke, Vice President of Business Development, Hanwha Techwin America. “He will be influential in making an even stronger connection between our end users and product development team. We are thrilled to have him on board.” Rivchun brings more than 15 years of security and loss prevention experience. Most recently, Rivchun was director of loss prevention with DSW (Designer Shoe Warehouse), where he was responsible for all facets of the Loss Prevention program including physical security, internal investigations, loss prevention systems and data analytics, as well as the field organization. Rivchun was also an active member of RILA’s Asset Protection Leaders Council (APLC). Prior to his 8-year career at DSW, he worked for Security Risk Management Consultants, Target, and Nordstrom in both security and loss prevention capacities.
IDIS America will make its first appearance at the ISC East security trade show in booth #251, November 14-15, at the Javits Center in New York, to highlight the company’s award-winning end-to-end video surveillance solution, and speak to the specific market-needs and requirements of integrators partners in the region, as well as key vertical industries concentrated in the eastern United States. At ISC East, IDIS will demonstrate key offerings from the IDIS Total Solution—an end-to-end, single sourced offering that delivers exceptional plug-and-play simplicity combined with highest-quality performance and a low total cost of ownership. Compatibility, now featuring the longest recorder warranty in the industry, with a low total cost of ownership. Additionally, IDIS’s critical failover features and hardened network security protocols provide complete reassurance against a full spectrum of risks. IR Fisheye Camera And H.265 4K Recorder IDIS technology featured at ISC East will include the DirectIP 12MP Vandal-Resistant IR Fisheye Camera with true WDRIDIS technology featured at ISC East will include the DirectIP 12MP Vandal-Resistant IR Fisheye Camera with true WDR and both onboard camera- and client-side image dewarping (including mobile devices, client PCs, and NVRs); the DirectIP 8300 Series 64 Channel H.265 4K Recorder, delivering enterprise-level performance with a single next-generation NVR; and IDIS VA in the Box, a powerfully versatile analytics tool that arms small- and medium-sized businesses, especially retail operations, with the business intelligence they need to make to be as competitive as possible. The IDIS booth will also feature a robust preview of the company’s new IDIS Compact Solutions line, a choice of network and HD-TVI cameras and recorders, easy to install and configure, at a highly competitive price point. The line, designed for rapid installations (including multi-site rollouts), comes without any compromise on IDIS’s signature reliability and performance and addresses specific requirements and challenges of both integrators and end-users looking to protect small- and medium-sized operations in a variety of vertical markets, including retail. Connecting With Current And Potential Partners The technology solutions IDIS will feature are all key components of the latest offering in the powerful IDIS Total Solution“IDIS is looking forward to joining the conversation at ISC East this year,” noted Keith Drummond, Senior Director, IDIS America. “ISC East’s reputation as a valuable forum to address regional challenges and highlight industry innovation is well known, and the show will provide IDIS with the opportunity to connect with current and potential partners end-users from the east coast and beyond in a direct and meaningful way. “We’ll be highlighting technologies developed to meet market-identified challenges, and showing how they can specifically meet the challenges and requirements most common in the region. We look forward to a great show.” The technology solutions IDIS will feature at ISC East are all key components of the latest offering in the powerful and award-winning IDIS Total Solution.
For over a century, IEEE's mission has been to advance technology for the benefit of humanity. As the world’s largest technical professional organization, IEEE’s global community includes over 420,000 members in engineering, computing and technology, collaborating on communications, consumer electronics, robotics, sustainable energy, aerospace, life sciences, and many other critical initiatives. Dave George Felicitated With IEEE Life Membership Dave George has been an active IEEE member for over 40 years As the Chief Technologist behind Pryme Radio’s communications innovations, Dave George has been an active IEEE member for over 40 years. Recently, Mr. George was honored with IEEE Life Membership, a top echelon designation reserved only for those individuals demonstrating long-standing leadership, dedication, and who have made a significant impact on the development of technology. “I’m grateful for IEEE’s recognition, but it’s my job to find ways to better the lives and professions of Pryme’s customers through communications,” said George. “The fact that technologies have become ever more exotic and exciting is a bonus.” Never comfortable tooting his own horn, George’s demure demeanor belies the important role he’s played in moving the communication industry forward. In fact, George credits IEEE as being his primary source for leading edge electronic science data, which often help lead him to develop ground-breaking new products at Pryme. Pryme's Future Product Line In Sync With IoT George is a regional member of the IEEE Communications Society (ComSoc), Robotics & Automation Society (RAS), Intelligent Transportation Systems Society (ITS), and the Vehicular Technology Society (VTS.) His involvement has given rise to future product developments at Pryme that support emerging networks such as IoT, mesh, 5G, soon to be 6G, as well as intelligent vehicle to vehicle communications. George may shy away from the spotlight, but he is fearless when it comes to entering unexplored technological territories. The reward Dave George reveres most is creating products that make a difference. George’s philosophy mirrors the IEEE’s mission and is also reflected in Pryme’s guiding principle — Invent communications technologies that benefit public safety, security, government, education, transit, utilities, construction, manufacturing, retail, hospitality, field services, facilities, healthcare, professionals and humanity as a whole.
Opening up new possibilities for competitive video surveillance deployments in retail, restaurant and small business applications, IDIS has launched a compact range of robust, high performance cameras and recorders. The IDIS Compact Solutions series is designed for rapid installations and both single and multi-site roll outs, allowing for the mixing and matching of analog and IP technologies, making upgrades and system extensions more affordable than ever. IDIS Compact Solutions The new line includes a choice of network and HD-TVI cameras and recorders, all of which are easy to install through one-click network configuration. A highly competitive price point comes without any compromise on IDIS’s signature reliability and performance, while hardened network security protocols provide complete reassurance against hacking risks. The new Compact Solutions line features 4-channel compact recorders that can be conveniently desktop or wall mounted, and for end-users and operators - including branch managers, small business owners and security personnel – the line combines high performance features with simple operation and a choice of client software. The IDIS Compact Solutions range is hard-wearing, making it particularly durable and perfectly suited for busy environments where reliable capture of high definition video images is important. IDIS Dome And Bullet PoE Cameras IDIS’s DC-D4212R dome and DC-E4212WR bullet PoE cameras are perfect for confined spaces yet deliver full-HD performance IDIS’s DC-D4212R dome and DC-E4212WR bullet PoE cameras are perfect for confined spaces yet deliver full-HD performance in live view and playback (including on remote devices such as smartphones) and come with motion detection, tamper alarms, zoned privacy masking, day and night ICR and IR LED up to 20m. A choice of four and eight channel IP or HD-TVI recorders allows fast and trouble-free installation and lets installers take advantage of existing coax cabling. The IP recorders also benefit from H.264 live view which eliminates the need to upgrade hardware peripherals. For highest performance streaming capacity, H.265 and IDIS Intelligent Codec compression deliver bandwidth savings of up to 90 percent, ensuring smoother real-time viewing and full evidence retention. “The new IDIS Compact Solutions line continues our longstanding tradition of market-responsive offerings, designed and developed in house to meet the real-world needs of our industry partners and end-users. This new line of fills an important need in the market, for high value, high performance technology from proven market leaders able to reliably meet highly specific requirements in vertical spaces, such as retail, and smaller business operations,” noted Keith Drummond, Senior Director, IDIS America. IDIS Total Solution As with all IDIS products the Compact Solutions range is backed by industry-lauded technical support and service, including the company’s global technical support operation, co-located with IDIS America’s regional headquarters near Dallas, Texas. The new IDIS Compact Solutions line is the latest offering in the powerful and award-winning IDIS Total Solution—an end-to-end, single sourced offering that delivers unrivaled plug-and-play simplicity (combined with highest-quality performance, compatibility, now featuring the longest recorder warranty in the industry), with a low total cost of ownership.
Audio over IP pioneer Barix announced that the company has promoted Reto Brader to CEO, following a highly successful tenure as Vice President of Sales and Marketing. The change in company leadership correlates with the availability of new products that Barix introduced in 2018, including its award-winning RetailPlayer platform for background music distribution. Barix Appoints Reto As New CEO The remaining Barix management team, which has worked together effectively for the past several years, will continue in their established roles with full support from Brader. This includes company founder Johannes Rietschel as CTO, Joan Parrilla as VP Engineering, and Mario Almeida as VP Production. Rietschel founded Barix in 2001 upon anticipating the need to move audio and control signals over IP networks. The company has since shipped more than 450,000 Barix and private-labeled OEM hardware devices worldwide and has more recently evolved into SaaS and managed services for business music and advertising distribution for retail, hospitality and other location-based businesses. Enhancing IoT Solutions Portfolio Barix has invested heavily in the development of its next generation products that follow the latest IoT architecture Barix has invested heavily in the development of its next generation products that follow the latest IoT architecture, and that support the highest internet security standards. With Rietschel behind product development and Brader driving marketing strategy, 2018 also saw the introduction of the IPAM 400, a quad-core Linux-based IP audio module for OEMs and developers; Instreamer ICE, Barix’s first AAC+ encoder with an integrated Icecast server; and AudioPoint 3.0, Barix’s low-latency audio-to-mobile streaming platform. Effective immediately, the Barix board has appointed Brader as CEO to seize the market opportunities afforded through these innovations. Before joining Barix as VP Sales and Marketing, Brader held key business and technical roles at Hewlett Packard and Alcatel. He has a degree in Electronical Engineering and an MBA. Audio And Control Over IP Applications “Reto knows the market and has demonstrated his strength in building and managing the distribution channel and key customer relationships,” said Rietschel. “His many years at the frontline in the worldwide AV and broadcast markets are key assets to Barix.” In recent years, Barix has built up an agile organization that can support both small businesses and enterprise-level customers for a wide area of audio and control over IP applications. Recent company milestones include ISO 9001 certification for quality management systems, and the introduction of double-sourcing with a new manufacturing partner in Europe. The latter adds redundancy to the company’s global supply chain. “It is now important that the entire company is focused on leveraging first market success of our new products to build on recent successes, and continue to drive global business growth,” says Brader. IP Audio And Control Solutions Barix headquarters in Zurich remains the hub for further product development, marketing and support for its product line Barix headquarters in Zurich remains the hub for further product development, marketing and support for its product line. “A key area of our business is to help customers integrate our modules and solutions into their system,” says Rietschel. “This is very support-intensive, and we are proud to be recognized for excellence in that area,” says Rietschel. While Barix will continue to focus on its core markets, Rietschel and Brader’s leadership positions will play a central role in moving Barix forward into new areas of opportunity for IP audio and control solutions. Departing CEO Ivo Killer will leave Barix following a three-year tenure that laid the business foundation for Barix’s recent success. “We thank Ivo for his years of excellent service and wish him well in his future endeavors,” said Rietschel. “I’m excited about what we have achieved in the last three years, and I look forward to working closely with the new executive team in order to bring all our new and exciting innovations to market, as well as to better serve our global systems integration, end user and OEM customer base.”
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced Approach To Data Security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analyzed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The Importance Of Data-At-Rest Encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring Drives To Be Common Criteria Compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing An Additional Layer Of Security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries In Need Of Data-At-Rest Encryption Healthcare organizations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its partSMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing Every Hardware And Software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialog and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalization and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity In Physical Security Industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing Social Mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organization for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realize their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New Companies Introduce New Technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer Service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customized products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job Satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring Safety Of People, Property And Assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
With increased demands being placed on safety and security globally, and supported by advancements in IP cameras and 360-degree camera technology, the video surveillance industry is growing steadily. Market research indicates that this worldwide industry is expected to reach an estimated $39.3 billion in revenue by 2023, driven by a CAGR of 9.3 percent from 2018 to 2023. Video surveillance is not just about capturing footage (to review an event or incident when it occurs), but also about data analysis delivering actionable insights that can improve operational efficiencies, better understand customer buying behaviors, or simply just provide added value and intelligence. Growth of Ultra-HD Surveillance To ensure that the quality of the data is good enough to extract the details required to drive these insights, surveillance cameras are technologically evolving as well, not only with expanded capabilities surrounding optical zoom and motion range,4K Ultra HD-compliant networked cameras are expected to grow from 0.4 percent shipped in 2017, to 28 percent in 2021 but also relating to improvements in signal-to-noise (S2N) ratios, light sensitivities (and the minimum illumination needed to produce usable images), wide dynamic ranges (WDR) for varying foreground and background illumination requirements, and of course, higher quality resolutions. As such, 4K Ultra HD-compliant networked cameras are expected to grow from 0.4 percent shipped in 2017, to 28 percent in 2021, representing an astonishing 170 percent growth per year, and will require three to six times the storage space of 1080p video dependent on the compression technology used. Surveillance cameras are typically connected to a networked video recorder (NVR) that acts as a gateway or local server, collecting data from the cameras and running video management software (VMS), as well as analytics. Capturing this data is dependent on the communications path between individual cameras and the NVR. If this connection is lost, whether intentional, unintentional, or a simple malfunction, surveillance video will no longer be captured and the system will cease operations. Therefore, it has become common to use microSD cards in surveillance cameras as a failsafe mechanism. Despite lost connectivity to the NVR, the camera can still record and capture raw footage locally until the network is restored, which in itself, could take a long time depending on maintenance staff or equipment availability, weather conditions, or other unplanned issues. Since microSD cards play a critical role as a failsafe mechanism to ensure service availability, it is important to choose the right card for capturing video footage. It has become common to use microSD cards in surveillance cameras as a failsafe mechanism if an NVR breaks Key Characteristics Of microSDs There are many different microSD cards to choose from for video capture at the network’s edge, and they range from industrial grade capabilities to commercial or retail grade, and everything in-between. To help make some of these uncertainties a little more certain, here are the key microSD card characteristics for video camera capture. Designed For Surveillance As the market enjoys steady growth, storage vendors want to participate and have done so with a number of repurposed, repackaged, remarketed microSD cards targeted for video surveillance but with not much robustness, performance or capabilities specific to the application. Adding the absence of mean-time between failure (MTBF) specifications to the equation, microSD card reliability is typically a perceived measurement -- measured in hours of operation and relatively vague and hidden under metrics associated with the camera’s resolution and compression ratio. Therefore, when selecting a microSD card for surveillance cams at the edge, the choice should include a vendor that is trusted, has experience and a proven storage portfolio in video surveillance, and in microSD card technologies. Endurance, as it relates to microSD cards, represents the number of rewrites possible before the card can no longer store data correctly High Endurance Endurance, as it relates to microSD cards, represents the number of rewrites (program/erase cycles) that are possible before the card can no longer store data correctly. The rewrite operation is cyclical whereby a new stream of footage replaces older content by writing over it until the card is full, and the cycle repeats. The higher the endurance, the longer the card will perform before it needs to be replaced. Endurance is also referred to in terabytes written (TBW) or by the number of hours that the card can record continuously (while overwriting data) before a failure will occur. Health Monitoring Health monitoring is a desired capability that not many microSD cards currently support and enables the host system to check when the endurance levels of a card are low and needs to be replaced. Having a card that supports this capability enables system integrators and operators with the ability to perform preemptive maintenance that will help to reduce system failures, as well as associated maintenance costs. Performance To capture continuous streams of raw footage, microSD cards within surveillance cams perform write operations about seventy to ninety percent of the time, whereas reading captured footage is performed about ten to thirty percent. The difference in read/write performance is dependent on whether the card is used in an artificial intelligent (AI) capable camera, or a standard one. microSD cards deployed within surveillance cameras should support temperature ranges from -25 degrees Celsius to 85 degrees Celsius Finding a card that is write-friendly, and can provide enough bandwidth to properly capture streamed data, and is cost-effective, requires one that falls between fast industrial card capabilities and slower commercial ones. Bandwidth in the range of 50 MB/sec for writes and 80 MB/sec for reads are typical and sufficient for microSD cards deployed within surveillance cameras. Temperature Ranges Lower capacity support of 32GB can provide room to attract the smaller or entry-level video surveillance deployments As microSD cards must be designed for continuous operation in extreme weather conditions and a variety of climates, whether located indoors or out, support for various temperature ranges are another consideration. Given the wide spectrum of temperatures required by the camera makers, microSD cards deployed within surveillance cameras should support temperature ranges from -25 degrees Celsius to 85 degrees Celsius, or in extreme cases, as low as -40 degrees Celsius. Capacity Selecting the right-sized capacity is also very important as there needs to be a minimum level to ensure that there is enough room to hold footage for a number of days or weeks before it is overwritten or the connectivity to the NVR is restored. Though 64GB is considered the capacity sweet spot for microSD cards deployed within surveillance cameras today, lower capacity support of 32GB can provide room to attract the smaller or entry-level video surveillance deployments. In the future, even higher capacities will be important for specific use cases and will potentially become standard capacities as the market evolves. When choosing the right storage microSD card to implement into your video surveillance system, make sure the card is designed specifically for the application – does it include the right levels of endurance and performance to capture continuous streams – can it withstand environmental challenges and wide temperature extremes – will it enable preventative and preemptive maintenance to provide years of service? It is critical for the surveillance system to be able to collect video footage whether the camera is connected to an NVR or is a standalone camera as collecting footage at the base of the surveillance system is the most crucial point of failure. As such, failsafe mechanisms are required to keep the camera recording until the network is restored.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defense force. Wireless Technology For Cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need For More Security In K-12 Schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging The Gap Between IT And Physical Security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT And Cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fueling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training Courses For Integrators And Partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instill added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new center in Barcelona (in addition to current R&D centers in Copenhagen and Sofia, Bulgaria). Making Camera Installation Easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the color of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras With Sound Detection Technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analyzing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralize systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine Learning Engine For Crime Prevention In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focused on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyze shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT Devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition Of IP Door Intercom Company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analog components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
ASIS 2017 was off to a strong start on Tuesday, presenting a new wave of innovation to the U.S. security end user community. Many attendees to the Dallas show are well-placed in their companies to influence or direct the purchase of security products and equipment, and exhibitors sought to impress them with a range of new and enhanced options. Moving From Integration To Unification In general, the ASIS show has a quieter, less frantic feel than the spring ISC West show in Las Vegas. Conversations are more "intimate" than those common at integrator-focused shows. "End users are very honest about the challenges they are facing," observed Derek Arcuri, Product Marketing Manager of Genetec. "The challenges we are hearing are a symptom of similar problems we hear in conversations with other users. It's more than just technology, it's planning out the strategy and showing them how they can slowly inch toward their vision by investing in a platform that is open and unified." Unification is a buzz-word you hear more and more often in the security industry, and unification means something beyond integration. In the case of Genetec, unification summarizes a strategy that leverages an identical technology approach underlying every facet of a broad-based solution, including video, access control and other technologies. Arcuri says customers should commit to a unified platform and then use integration to accommodate existing installed products and enable a gradual transition to a systemwide unified system as costs allow. Among Genetec's current and future offerings highlighted at ASIS 2017 are vertical-focused product lines such as Airport Sense, Retail Sense and Traffic Sense, which offer specific capabilities and are all built on the Genetec unified platform. Johnson Controls Accelerates Product Development A year after the headline-making acquisition of Tyco, Johnson Controls kicked off the first day of the ASIS 2017 exhibition with a press event revisiting the big story one year later. Johnson Controls says they are making significant investments in engineering to ensure accelerated introduction of products in the video, access control and intrusion categories – around 100 engineers have been added to the product development team, a 15 percent increase. A press conference by Johnson Controls kicked off the ASIS 2017 exhibition, about a year after their headline-making acquisition of Tyco "As we have come together, all the positives have been realized," said Brian Young, Johnson Controls Senior Vice President of Global Sales and Marketing. The complementary nature of the two businesses -- a prime motivator promoted when the acquisition was announced last year -- has been realized in many ways, including how the technology platforms work together, and even the sales cycles (Johnson Controls typically has a longer sales cycle, while Tyco's business moves faster.) "We are starting to deliver real value," says David Grinstead, Global Vice President and General Manager of Security Products. Johnson Controls executives estimate the overlap of the two businesses is about 15 percent, which translates into 85 percent of new opportunity for crossover business to enhance both operations. March Networks Transitions To Video Software Companies are changing as the market changes. March Networks is transitioning from being a hardware provider to developing software reporting tools that can increase the value of video and data by correlating the two. "Video is becoming more of an operational feature that every institution wants to have. We are more of an information company than ever, focused on software and services," says Peter Strom, President and Chief Executive Officer. "We are seeing how video can play a role beyond security." For example, March Networks' new Searchlight for QSR (quick service restaurants) combines video with various data points, such as those provided by point of sale (POS) systems, to provide a "dashboard" to help a business owner track his business (with data tied into video to enhance the value). Video is stored locally, and data is stored in the cloud; the service is provided for a monthly fee. The company has similar data-driven products in other verticals: Searchlight for Retail and Searchlight for Banking, both providing a "360-degree view" of a business. March Networks has historically emphasized the importance of cybersecurity - driven by demands of its financial and retail verticals Cybersecurity In The Video Surveillance Market March Networks also has historically emphasized the importance of cybersecurity -- driven by demands of the financial and retail verticals they play in. Their cybersecurity approach predates by a decade or more the current concerns in the market, says Strom. March Networks is among the companies that see video taking a new, higher profile among customers -- and not just for security applications. Two verticals that March Networks is active in -- financial and retail -- have been especially impacted by the transition to broader use of video in a company. At ASIS 2017, March Networks is also announcing integration of Patriot One Technologies' covert weapons detection solution with video. The cognitive microwave radar technology detects concealed handguns and other types of weapon, and sends real-time alerts to security. The system is "trained" and continues to "learn" after deployment, getting better and smarter at detecting hidden weapons with each screening. Arecont Vision Emphasizes Ease Of Use Arecont Vision continues on its theme of making it easier for integrators to install products. They have extended "no-touch" remote setup to the MegaDome G3 Series. A vari-focal motorized lens can be set up remotely in any position with pan, tilt, focus and zoom. The remote setup avoids a technician having to stand on a ladder to adjust and fine-tune the image, which takes extra time and can be hazardous. The MegaVideo 4K 8.3 megapixel camera also has multiple motorized lens options for remote setup. Arecont Vision plans to carry the approach through its entire product line over time, expanding ease of installation to an ever-broadening array of products. This is just a sampling of what I saw and heard on the first day of ASIS, with plenty more still to come. Read SourceSecurity.com's Day 2 Coverage Here
Millennials are an important market, and in one sense, they represent future possibility. The changing tastes and trends of this tech-savvy “Generation Y,” who came of age around the turn of the millennium (circa 2000), are an important consideration in the marketing of security technologies, among many other things. Fortunately, according to a recent survey from ADT, millennials will likely be dependable consumers of security technology products and services for years to come. Smart Phones Essential For Personal Protection Millennials’ dependence on smart phones and smart watches is legendary, and ADT’s survey points to a not-so-obvious benefit this demographic derives from their smart devices: Peace of mind. According to the survey, 90% of millennials say smart phones and related technologies provide them peace of mind when they are alone. In effect, millennials see smart phones as essential devices for their personal protection (in addition to serving almost every other human need). Further, fearless millennials also admit their sense of adventure has limits: some 74% say they have been worried about their physical safety at some point in the last 12 months. Some 75% say they are interested in purchasing a personal security device (such as ADT’s Panic Response app and monitoring service available on Samsung smart watches). Security Concerns Of Millenials 76% of millennials - men and women - have avoided specific experiences due to concerns about personal safety. in the past 12 months, 34% of millennials have avoided crowded spaces such as sporting events or malls. 30% percent of respondents have avoided public transport, 26% have opted out of solo travel, and 25% have not exercised alone due to personal security 90% of millennials take a different route home, switch up the time and place of their exercise, and/or carry pepper spray. 91% of millennials living in urban areas (versus 82% of rural dwellers) think of technology as a safety net. How millennials perceive danger It goes without saying that we live in a dangerous world, and it behooves us (of all ages) to take precautions and be attentive to security. How people perceive danger, and how willing they are to take precautions, is another variable that can ensure a lucrative future in the consumer market for security products and services. That perception and that willingness can be observed in Generation Y. The ability to fully perceive risk comes as a function of age. Young people, for example, may engage in risky behavior because they feel immortal or they do not fully grasp the dangers involved. It is encouraging to know that the tech-savvy millennial generation has developed a healthy awareness of the dangers of the world – and they will likely be good customers for the security marketplace for years to come. Further, the next wave of consumers, “Generation Z,” is growing up in an even more sophisticated media and computer environment – they are also likely to see technology products as a useful safety and security tool.
Most retailers invest in a video surveillance solution to improve security. Many also use it as an investigation tool to help resolve customer disputes, liability claims and reduce losses from theft and fraud. Intelligent Video Solutions Complete Releaf relies on its intelligent video solution for all of those reasons, however compliance with state regulations was the primary objective when CEO and owner Eric Ryant started looking for a video system for his new, 3,000 square foot cannabis dispensary in Lafayette, Colorado. Unlike many other types of retail environments, cannabis dispensaries must comply with strict rules governing the type of video surveillance equipment used, where cameras and equipment are placed, and how long video evidence must be retained. Already familiar with the regulations based on his experience operating a second dispensary and a cultivation center in Lafayette, Colorado, Ryant sourced multiple bids for his new video solution. In the end, I selected the March Networks proposal. It had everything I was looking for, including POS integration, and additional capabilities" POS Integration “Once all the bids were in, I went through the process of analyzing each one and ended up narrowing the contenders down to two,” said Ryant. “In the end, I selected the March Networks proposal from our systems integrator, Falcon Networks. The solution had everything I was looking for, including POS integration, and additional capabilities I thought might be useful down the road. It met all of the compliance criteria, and the price was comparable.” Prior to opening the boutique dispensary in January 2018, Ryant worked with its system integrator to design and install a fully-compliant video solution. IR Dome Cameras Today, IR dome cameras mounted inside the dispensary capture clear 4MP video of all activity at entrances and exits, in storage and equipment rooms, and at each point-of-sale (POS) system. In addition, 360° cameras are installed above the sales floor and in every corner to provide further panoramic coverage. The 360° cameras are also installed on the dispensary’s exterior to capture people entering and exiting, as well as any activity in the surrounding parking lot and back loading area. The cameras were selected and placed strategically to ensure that the system meets multiple legislated requirements, such as recording all activity occurring within 20 feet of any ingress/egress point, capturing clear video in all lighting conditions, and making sure that the recorded video is sharp enough to identify customer and employee facial features at each POS. Hybrid Network Video Recorder At the center of Complete Releaf’s video solution is a hybrid network video recorder (NVR) At the center of Complete Releaf’s video solution is a hybrid network video recorder (NVR). The recorder provides IP and analog video capture and unparalleled reliability through features such as diagnostic LEDs, an internal battery backup, and a customized embedded Linux operating system. All IP channel licenses are included with the recorder, making it a convenient and cost-effective option for the dispensary. Equally important, the recorder provides Complete Releaf with 32TB of internal storage, so it is compliant with the state’s 40-day video retention requirement. “Essentially, we need 100 percent coverage with no ‘blind spots’ on our retail floor, and a clear picture of people’s faces. It’s a truly reliable product, and we’ve had no difficulties achieving our 40 days of archived video,” said Ryant. Searchlight Intelligent Software While security and compliance were both top priorities for Ryant, finding a video solution that would also help him run Complete Releaf more efficiently – and profitably – was also important. That’s why he’s so pleased with the March Networks Searchlight for Retail application software he is also using. The intelligent software enables Ryant and his team to proactively identify and review suspect transactions using integrated video and transaction data pulled from the dispensary’s Green Bits POS system. It provides them with an easy-to-use loss prevention tool that reduces the time it takes to investigate incidents from hours to minutes. It also arms them with strong video and data evidence to support successful prosecutions or recoveries. Ryant is also testing the Searchlight application in his cultivation facility “Having video surveillance in our dispensary definitely deters theft,” said Ryant. “Combining the video with transaction data goes a step further and really causes people to think twice before they do something they’ll probably regret.” Radio Frequency Identification Tags Ryant is also testing the Searchlight application in his cultivation facility, taking advantage of the software’s ability to integrate with data from the Radio Frequency Identification (RFID) tags he is required to add to each plant through the cultivation process as part of Colorado’s Inventory Tracking System (Metrc). The software would enable Ryant to leverage his RFID investment by making the data searchable in the dashboard and tying it to recorded video. If there’s ever an incident during the cultivation process, Ryant could use the software to easily locate the video footage to see what actually happened and who was involved.
Traditionally, many stores have used an assortment of tags and labels on a diverse range of merchandise, most of which were designed for an entirely different set of products. As a result, many apparel retailers have recognized that in some instances merchandise and textiles are being damaged. Checkpoint Systems, renowned supplier of source-to-shopper solutions, has therefore developed an innovative new anti-theft solution to meet their specific requirements – Mini NeedleLok. Mini NeedleLok Anti-Theft Solution Designed to protect all types of garments, including very thin fabric, the one-piece solution deters thieves while preventing damage that would usually occur on application of pinned security tags. While other products on the market feature a hinged mechanism which can snag and rip textiles, Mini NeedleLok uses a needle in place of a separate pin, which separates the fibers rather than breaking through them. This allows store assistants to gently spread fabric threads on application to avoid leaving a visible hole after removal. In order to reduce time spent on in-store tagging labor, the Mini NeedleLok mechanical design allows quick and easy application, while the solution’s wide opening also allows freedom of placement anywhere on the garment. Minimum Product Damage Risk The Mini NeedleLok speeds up the self-checkout process The Mini NeedleLok also speeds up the self-checkout process. It can be removed quickly and efficiently at the point-of-sale, thanks to its single-piece design and wide opening, enabling store associates to assist with other enquiries, improving the in-store customer experience. It also eliminates the risk of damage to the merchandise, or injury to the customer, as the needle is never exposed. Not only that, with 70% of purchase decisions made at the shelf, Mini NeedleLok has been designed with display in mind. Its sleek look and smart black color ensures it doesn’t impede on the garment’s aesthetics in order to help turn a browser to a buyer. For those retailers wishing to take their visual merchandising a step further, the solution can also be customized, from adding a logo to a bespoke colorway that matches the company’s branding. Anti-Theft Retail Solution Irene Fernandez, Product Management Europe at Checkpoint Systems, commented: “We’re more customer focused than we have ever been in our history, which is demonstrated through the diverse range of solutions that we now offer retailers across a variety of markets. With the Mini NeedleLok, we took our existing technologies and created a product that fits our apparel customers’ requirements - an effective anti-theft solution that protects merchandise, with the added benefit of being customizable. This is ideal for fashion brands where aesthetic is crucial to their identity.”
Bosch experts for building safety are networking the IKEA MAR Shopping mall in the Algarve, Portugal with trendsetting solutions. They make sure everybody can feel at ease and safe during their shopping experience. Scores of tourists are attracted every year to the Algarve, Portugal’s most southerly region where vacationers enjoy the sun and beaches and descend on popular seaside resorts like Lagos or Albufeira. However, whenever people have had enough of sunbathing, the Algarve also offers a multitude of other things to do – whether it is hiking or shopping, there is something for everybody. Those fancying a spot of the last mentioned have every opportunity to do just that in “IKEA MAR Shopping” – an IKEA-run mall in the Algarve that is home to about 100 other brand shops. Every day numerous visitors frequent the mall and they not only present a challenge to the staff at the checkouts. The safety technology in such a mall also has to work smoothly and on the dot. It is why the architects and planners of the IKEA MAR Shopping mall decided to use a connected, smart safety solution from Bosch Building Technologies. Intuitive And Fully-Integrated Security Solution “Our customer wanted a fully-integrated solution whose systems could be controlled via a single management system,” is how Luis Gomes, Bosch Building Technologies Sales Manager Iberia, describes the remit. Networked systems that communicate with each other have to facilitate quick and precise measures in emergencies. The customer also requested a means by which they could schedule the deployment of security personnel more efficiently plus intuitive-to-operate and clearly-structured systems to make their jobs easier. The Bosch Intelligent Video Analytics software which is installed in each and every camera processes the image data in real time Together with the customer and partners, Bosch has created a harmonious overall picture consisting of a video and public address system, a fire and intrusion detection system and access control within the space of two years. It includes 1,100 loudspeakers inserted in the ceiling and 390 video cameras. The mall is equipped with a total of 4,000 fire detectors and 520 sensors for both intrusion alert and controlling access to IKEA MAR Shopping. Bosch Intelligent Video Analytics The Bosch Intelligent Video Analytics software which is installed in each and every camera processes the image data in real time and recognizes suspicious activities by means of an algorithm. Whenever there is danger, it can make all the information available to the staff who need it as quickly as possible to initiate appropriate measures. For a person, it is virtually impossible to continuously retain an overview of the images provided by 390 cameras. “Intelligent Video Analytics and the complete solution make the security personnel’s everyday jobs significantly easier,” says Luis Gomes. “At the same time, the customer has lower costs – and every shopaholic can feel safe.”
With a century-long tradition for trade and commerce, the Hala Koszyki market hall was opened in 1908 on Koszykowa Street in Warsaw, Poland. Known as the ‘People’s Bazaar’, the Art Noveau-style building endured numerous social and political changes throughout its storied history. Between 2009 and 2016, Hala Koszyki was remodeled entirely according to a design by Polish star architects JEMS Architekci. Since its grand reopening in autumn 2016, Hala Koszyki has emerged as a major attraction for food connoisseurs in the Polish capital. The remodeled building retains some of the architectural layout of the historic original while offering international flavors in a variety of restaurants, bars, and food shops, plus several office spaces in a premium ambiance. Retail Solutions Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions Providing integrated security for Hala Koszyki called for a vendor that could solve three key challenges: First, the security system needed to blend in with the market’s stylish interior without attracting attention. Second, shop and restaurant personnel as well as office workers required specific access privileges to otherwise restricted areas. And third, building operators wanted a customisable system to meet the specific demands of Hala Koszyki’s shops, cafes, offices, parking spaces and other areas. Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions, also including the high-profile New Union Square shopping center and office tower in Downtown Warsaw. The experts equipped Hala Koszyki with video security, intrusion alarm, and access control systems. Intelligent Video Analytics The market hall’s video security system features moving and fixed IP-based cameras from Bosch throughout the premises. Integrated on the Bosch Video Management System (BVMS), the cameras are monitored by security staff in an on-site control room. For added security, cameras in critical areas feature Intelligent Video Analytics to recognize threats, unauthorized access, and suspicious behaviors automatically. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorized visitors, Bosch installed access control readers Aside from greatly reducing the manpower needed to monitor video screens, the system also offers forensic search functionality for evidence in a user-friendly interface. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorized visitors, Bosch installed access control readers. Answering a key requirement, the access control system also logs the entry and exit times of employees, while keeping track of the current number of employees in the building. Complete Security Solution Safeguarding the Hala Koszyki against intruders, the integrated security solution features Professional Series intrusion detectors equipped with PIR (passive infrared) sensors. Combining these detectors with the intrusion panel Modular Alarm Platform MAP 5000 ensures continued operation in events such as short circuits or interruption of the power supply in a scalable system that can grow with customer requirements. The complete security solution for Hala Koszyki is managed by the Building Integration System (BIS). Overall, the integrated Bosch solution achieves the feat of accommodating Hala Koszyki’s various security and access requirements ‘under one roof’ while blending into the architecture, so end consumers are free to enjoy their shopping and dining experience undisturbed.
Edesix, a provider of Body Worn Cameras (BWC), announces that it has teamed up with retailer Asda to enhance in-store security. After a successful trial, which began in 2016, there are now over 900 Edesix VideoBadges being utilized in over 250 sites nationwide, with more growth expected in the near future. Edesix collaborated with CBES, Asda's preferred security installer, to design and install a tailored wearable CCTV deployment system perfectly suited to the retail giant's needs. Edesix and CBES worked closely at Asda's national security center and across four store deployments to provide them with the knowledge and expertise so the cameras could be rolled out in the remaining stores with minimum impact on store efficiency. Improved Colleague Security Asda has been able to improve colleague security, diffuse aggressive and volatile situations and reduce valued investigation time This system, which is intuitive to use and requires minimum training, has enabled staff to integrate the cameras into their daily working processes with minimal fuss. As a result of this partnering strategy, which relied on both the innovative nature of Edesix's technology and communication between all parties, Asda has been able to improve colleague security, diffuse aggressive and volatile situations and reduce valued investigation time, thus reducing costs. Since the deployment, Asda has proven the viability of these cameras by securing numerous convictions relating to theft and violence against staff. Confrontation preventer Richie McBride, managing director of Edesix, explains: "Asda, along with CBES, identified the need to re-think its key security policy around challenging aggressive behavior towards staff. In searching for a technology partner, CBES chose Edesix as their BWC provider, to deploy initially to the most affected stores, eventually rolling out to over 250 sites across the UK. The aim was to improve the safety of colleagues in public facing roles and shoppers within the stores, while producing compelling evidence when needed." The Body Worn Cameras act as a confrontation preventer, as it is proven that members of the public are far less aggressive to staff members" McBride adds: "The Body Worn Cameras act as a confrontation preventer, as it is proven that members of the public are far less aggressive to staff members if they know they are being filmed." Winning major contracts Edesix, which was recently acquired by US-based security specialists Vigilant Solutions, has enjoyed a great deal of success lately, ranging from winning some major contracts with the likes of UK prisons, Scotrail and South Australian Police, to being named in the Sunday Times Hiscox Tech Track 100 league table. Edesix currently supplies markets across the globe, through direct sales and international partners, to geographies including the UK, Europe, USA, Canada, the Middle East and Australasia.
Videowall technology supplied by Ultimate Visual Solutions (UVS) is at the heart of a new security control room at iNTU Trafford Center. High-End Videowall Technology The new facility helps ensure 30 million annual visitors have a safe and enjoyable time at what is the single best-known and most iconic retail and leisure destination in the UK. Burnley-based UVS, formerly eyevis UK, provides video wall displays and audio-visual solutions to a range of clients across the UK. UVS Full HD Videowall As part of the new state-of-the-art facility, UVS installed a 7.2m wide by 2.7m high videowall As part of the new state-of-the-art facility, UVS installed a 7.2m wide by 2.7m high videowall, made up of 24 eyevis 55-inch XSN extremely narrow bezel LCD screens with Full HD resolution. The displays offer 1920 × 1080 pixels, direct-LED backlight technology, a mechanical bezel width of only 3.5 mm between two displays and a brightness of 500 cd/m2. The installation also includes a control room meeting space featuring a videowall made up of four eyevis 46-inch XSN screens with 3.5mm bezel. Netpix 4900 Videowall Controller Both videowalls connect to a Netpix 4900 videowall controller configured for multiple analogue video feeds, IP video feeds, graphic PC data and web browsers. iNTU security staff, who monitor the center and liaise with visitors, will be able to send live videos from their tablets directly back to the video wall to share incident video with security staff. Video Monitoring And Visitor Management iNTU Trafford Center is a retail and leisure destination and it is important that the control room has the latest videowall technology" UVS managing director Steve Murphy said: “iNTU Trafford Center is a retail and leisure destination enjoyed by millions of people each year and it is important that the control room has the latest videowall technology.” He adds, “We are delighted to have been involved in such a prestigious and important project.” Lee Barlow, Security Manager, iNTU Trafford Center said “The security and safety of our customers, retailers and staff is our number one priority so having a control room that allows us to keep them safe is really important. The new videowall and meeting room screens allows us to do just that and we are really happy with them.” New Control Room With Videowall The new control room was designed and refurbished by Intech Solutions, which specialize in technical and control room furniture including full control room fit-outs in the UK and worldwide. UVS also worked to deliver the videowall with its security integrator partner, Nottinghamshire-based Quadrant Security Group.
Round table discussion
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analyzing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realize its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?
By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the form of smarter video cameras and other devices that store and/or process data locally. We asked this week’s Expert Panel Roundtable: What’s new “on the edge” of security and video surveillance systems?
Video systems today offer more capabilities than ever. Consequently, the systems can be used in new ways. For a variety of reasons, however, many customers don’t take full advantage of the capabilities of their video systems and therefore are leaving value on the table. Education and training are tools to alleviate the situation, but the first step is to identify the new ways that video can be used. We asked this week’s Expert Panel Roundtable: How do customers under-utilize their video systems, and what should they do differently?