Videonetics, world’s AI & DL powered Unified Video Computing Platform (UVCP™) development company, announced that its AI-powered Intelligent VMS 3.0 (IVMS) is now ONVIF Profile ‘Q’ Compliant that allows easy set-up mechanism and basic configuration of IP cameras over the network, directly from the IVMS. It also supports Transport Layer Security (TLS), a secure communication protocol, that allows ONVIF devices themselves to communicate with clients across a network in...
Camden Door Controls, a provider of innovative, high-quality door activation and locking products, has published a new application spec guide for specification writers designing a wireless barrier-free restroom control system. This application utilizes standard push plate ‘push to open’ switches and a mushroom ‘push to lock’ switch, with CM-TX9 battery-powered wireless transmitters, and CM-RX-91 and CM-RX92 receivers. Control of automatic doors ‘Occupied’ a...
Euralarm’s Services Section reports an important step forward for service providers and end-users of remote services: the very positive vote on the EN 50710, requirements for the provision of secure remote services for fire safety systems and security systems. The successful vote is the icing on the cake of the section’s efforts to guarantee more certainty for a future in which remote services play an increasingly important role. Secure remote services Jon Könz, Chair of Eura...
Vicon Industries, Inc., a subsidiary of Cemtrex Inc., designer, and manufacturer of video surveillance and access control software, hardware, and components fills the supply gap caused by NDAA compliance and the emerging FCC ban on certain Chinese surveillance cameras and components with a sophisticated portfolio of compliant solutions. Since Congress passed the 2019 National Defense Authorization Act (NDAA) more than two years ago, many U.S. businesses have been faced with the adversity of rem...
The New DICE Corporation is bringing its innovative technology, products and unique services to Latin America. With an evolutionary vision for alarm and video monitoring, this expansion will provide the growing global security industry with a game-changing way of doing business. Phase one will consist of introducing software as a service that enables interactive and advanced video monitoring services with video analytics that includes artificial intelligence for enterprise end users, guard comp...
Acronis, the pioneer in cyber protection, appoints cloud software and hosting industry veteran Patrick Pulvermueller as Chief Executive Officer, effective as of 1st July 2021. Pulvermueller succeeds Serguei Beloussov, who founded the company in 2003 and has served as CEO since 2013. Pulvermueller joins Acronis from GoDaddy, where he most recently served as President of the Partner Business. In that role, he led the company’s strategic expansion of its hosting, productivity, and security s...
Meesons, a provider of high security entrance control solutions, launches the new fortis range of full height turnstiles, certified to Loss Prevention Standard (LPS) 1175: Issue 8 up to C5 (SR3). The fortis full height turnstile provides controlled pedestrian access on the perimeter fence line and is designed to withstand a forced attack. This entrance control solution complements Meesons LPS 1175 range of certified security revolving door and security portals to provide a robust physical barrier on the perimeter fence line. Highly robust barrier The fortis range now enables specifiers to secure the perimeter entrance to a site, through to the building façade and internal zones all to LPS 1175: Issue 8, up to C5 (SR3). The fortis range of full height turnstiles has been developed first and foremost to meet the requirements of the LPS 1175 standard. This enabled the design team to produce a product that maintains the openness of a standard full height turnstile yet provides a highly robust barrier to forced attack. The LPS 1175 standard reflects a broad range of threat scenarios including tool attacks by intruders The LPCB certification provides independent verification that it will deliver significant levels of resistance to forced entry by hostile actors, be they burglars, terrorists, or protestors. The LPS 1175 standard reflects a broad range of threat scenarios including tool attacks by intruders acting without fear of attracting attention to their actions by using tools and entry techniques likely to generate sustained levels of noise. Pedestrian access solution Martin Washby, Meesons Technical Services Manager commented “We started the fortis development with the objective of creating a full height pedestrian access solution to meet the requirements of the LPS1175 standard, whilst maintaining a very open feel when approaching and transiting through the turnstile. Rather than taking an existing turnstile and adding further structure to meet the attack testing, such as cladding and paddles arms, we tried to make the product as aesthetically pleasing as possible while still maintaining its functionality.” “Having built up extensive knowledge and experience from previously testing our LPS certified security portals and security revolving door this enabled the team to focus on the key areas of the product to create a highly robust and functional, yet aesthetically pleasing solution.” Preventing unauthorized entry Meesons’ LPS 1175 Issue 8 full height turnstile is in a permanent state of attack-readiness Meesons’ LPS 1175 Issue 8 full height turnstile is in a permanent state of attack-readiness, meaning it requires no user intervention to stop criminals who are prepared to use force. The fortis turnstile is high security, 4-wing rotor, bi-directional full height turnstile that remains as secure during the day is it does at night, preventing forced attack 24/7. Available as a double unit, the fortis duo full height turnstile enables a higher throughput of users whilst preventing unauthorized entry. The fortis range features different operational transit modes to aid site managers by selecting either free-flow exit, unidirectional or bidirectional flow of authenticated users. Rigorous certification standard Jeremy Terry, Founder and Chairman at Meesons commented “I am immensely proud to introduce our new fortis full height turnstile range, which is LPS1175: Issue 8 certified up to C5 (SR3). With an increased perceived threat from mob attack this solution adds a proven level of delay to criminals who are prepared to use force.” The fortis full height turnstile has been specifically designed by Meesons and is manufactured in the UK" “The fortis full height turnstile range adds to our already broad offer of LPS1175: Issue 8 approved entrance control solutions, enabling specifiers to select approved products from the perimeter to the building façade and through to internal zones. It's great credit to the team who have developed the fortis full height turnstile to meet the requirements of the LPCB’s LPS1175 rigorous certification standard. The fortis full height turnstile has been specifically designed by Meesons and is manufactured in the UK.” Security-Related products “It marks a significant milestone for the business with the first Meesons designed and manufactured product for over 20 years. We are looking forward to introduction further innovation that the company is working on in the near future.” The range has also been accredited by Secured by Design (SBD) and is the latest addition to the Meesons portfolio of already approved products. SBD is the national police crime prevention initiative, for meeting its police preferred specification for its robust qualities to deter and reduce crime. SBD is the only way for companies to achieve police preferred specification for security-related products in the UK. The fortis full height turnstile forms part of the extensive range of LPS 1175 certified products that are recognized by SBD, which already includes 11 security portal models and a security revolving door.
AEOS, the physical access control system developed by Nedap, now has an extra seal of approval - CPNI certification. CPNI is the UK Government’s national technical authority for physical and personnel protective security. To gain approval, systems must go through detailed CPNI testing to ensure they meet the required test standards. And provide the intrinsic level of protection needed for the UK’s critical national infrastructure. Severe economic damage AEOS software, door controllers, and card readers have all met these standards successfully. The CPNI aims to reduce the vulnerability of the UK’s essential services to threats such as terrorism, espionage, and sabotage. These essential services include those in the emergency, healthcare, communications, energy, finance, food, government, transport, and water sectors. AEOS software, door controllers, and card readers have all met these standards successfully Any threat to these services could have serious implications, including severe economic damage, social disruption, or even loss of life. Which is why CPNI ensures the systems protecting them are up to the job. Any UK sites classified as critical infrastructure, should use a tested and approved physical security system. AEOS is now included in the CPNI’s Catalog of Security Equipment (CSE), which is available to help security practitioners identify appropriate physical security equipment. CPNI security standards The CSE provides a range of products that have been evaluated against specific CPNI security standards and the performance rating achieved. The AEOS access control system offers a variety of compelling benefits over and above its approval with the CPNI. It is: End-to-end secure for optimal cybersecurity – from the card reader to the server. Always up to date – AEOS software updates ensure support for the latest technologies, features, and security. GOVPASS certified. Highly scalable and based on open standards, allowing you to expand gradually and add many integrations. Supported by an extensive network of certified partners for implementation and maintenance.
The Electronic Security Expo (ESX) 2021 Virtual Experience, presented by the Electronic Security Association (ESA), wrapped up on June 17, delivering a wide breadth of educational content, product innovations, and networking opportunities. Security professionals from all corners of the industry attended ESX to hear from thought leaders and industry experts on business strategies and best practices. The Main Stage delivered thoughtful strategies for security dealers, integrators, and monitoring companies to implement into their businesses. During the opening keynote, sponsored by NAPCO StarLink, Ryan Estis delivered a powerful message on how to take the company to the next level with his ‘Adapt and Thrive’ presentation. Industry-Specific sessions At the OpenXchange, sponsored by Security Central, the CEOs of Brilliant, RapidSOS, and RSPNDR gave their perspectives on how security professionals should consider navigating the changing competitive landscape. And for the General Session, sponsored by NMC, John Mack from Imperial Capital provided a session about the challenges, trends, and opportunities in the business of security. Over 24 educational sessions, presented by industry peers and business experts, revealed best practices and ideas on how to achieve exceptional operational and financial performance and gain valuable business strategies. Industry-specific sessions and case studies delivered actionable content for a wide range of solutions for security professionals to consider and adapt. Attendees also benefited from a host of opportunities to review the latest technologies and product innovations in the industry. Smart home systems The Innovation Award program recognized breakthrough technologies that were recently introduced Through the Virtual Expo and TechTalks, solutions providers, such as ADI, Alarm.com, Axis, DMP, NAPCO, and Resideo, showcased products and services that help security professionals provide more value to end-users, and increase revenues and profits. As part of the overall ESX 2021 Virtual Experience program, the Innovation Award program recognized breakthrough technologies that were recently introduced to the market. More than a dozen products were recognized as category winners across a portfolio that included access control, intrusion systems, monitoring systems, video surveillance, and smart home systems. "Once again, ESX brought together the best and most innovative business leaders along with a full suite of highly relevant and valuable content, to learn, share, and explore new ways to leverage technology and business strategies that drive the security industry forward,” said George De Marco, ESX Chairman. Mark the calendar and stay tuned for more information about ESX 2022, taking place live and in-person June 14-17, 2022, Fort Worth, Texas.
Milestone Systems promotes Dr. Barry Norton to Vice President of research. Dr. Barry Norton joined Milestone Systems in May 2018 as Director of research. In his new role as Vice President of research, Barry will also—in addition to continuing leading Milestone’s growing research department—be responsible for increased collaboration with universities. This will help move forward with machine learning, especially in relation to computer vision. Dr. Barry will be instrumental in helping to create the next generation of video software technology that will not only be innovative but will be used for the greater societal good. Predicting future technologies “Milestone Systems has high ambitions for the future. We need to understand and predict future technologies and megatrends to help accelerate Milestone Systems’ ambitious growth journey. Increasing our focus on research will gear this journey.” Barry is always more than one step ahead when it comes to applying future technologies" “Barry is always more than one step ahead when it comes to applying future technologies because of his profound knowledge and ingenuity. I’m confident that Barry will play a key role in taking Milestone’s video software technology to the next level,” said Bjørn Skou Eilertsen, Chief Technology Officer, Milestone Systems. Over the years, Milestone Systems has gradually increased investment in research capability and expertise. Ambitious growth journey With the newly created Vice President of research role, Milestone Systems will further develop its business and core strategic initiatives to accelerate the company’s ambitious growth journey and offer more cutting-edge, high-quality product features. The vice president of research will report directly to the Chief Technology Officer at Milestone Systems. Dr. Barry Norton, Vice President of research, Milestone Systems, commented: “Milestone’s ‘Make the World See’ mission is a clarion call to bring together the latest achievements in artificial intelligence from the lab to deliver true situational understanding in the real world. The commitment to deliver such technology in a responsible manner makes Milestone the ideal environment to deliver on this vision.”
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, is hosting two dealer-focused events to provide customers with information about the company’s products and how they can grow their business by selling these solutions. The company is hosting a webinar on Tuesday, June 29, at 2 p.m. ET to focus on new features and enhancements to existing solutions, as well as three new offerings: Gunshot Detection, License Plate Capture, and Gen III Mounts. Force recognition sensor Rather than using microphones, infrared sensors, or complex analytics, the self-contained Gunshot Detection device relies on an affordably simple concussive force recognition sensor to detect gunshots. When a gun is fired, the bullet creates a shockwave as it exits the barrel of the gun and travels through the air. This shockwave creates a unique concussive force that the 3xLOGIC solution is able to detect This shockwave creates a unique concussive force that the 3xLOGIC solution is able to detect. With a detection radius of 75 feet and 360-degree coverage, offering 15,000 cubic feet of coverage per device, the solution minimizes the number of sensors required for affordable coverage with no need for software, servers, or relay control board. Cloud-Managed solution The company’s License Plate Capture camera with mount is designed for scaled-down applications where post-event investigations require precise imaging to identify license plates. The VX-5M20-B-RIAL camera offers remote zoom lens, 5MP resolution, and a visible light lens filter that allows IR light band to pass. This allows the camera to effectively and accurately capture license plates day or night for video review post-event. In addition to the webinar, 3xLOGIC is hosting a series of weekly Demo Days sessions designed to allow dealers to get up close and personal and ask technical questions of the 3xLOGIC product team about the company’s new cloud-managed solution, VIGIL CLOUD. Demo Days will take place on Thursdays at 1 p.m. ET.
York company, cards-x, is championing British manufacturing after producing and selling more than 5 million security ID card holders in the last six months alone. The firm is now expanding its team as it launches the world’s first completely biodegradable card holder. cards-x is one of Europe’s suppliers of security products, ID cards, and the specialist print equipment used to create them. The German-based company expanded into the UK last autumn, opening a new base at Malton near York. Expanding product range In December, cards-x then acquired Evohold, which manufactures ID card holders, and the company now produces hundreds of thousands of card holders each week, which are exported to countries throughout the world. To meet this rising demand, cards-x has appointed Craig Kail to oversee the manufacturing process and Charlotte Hoggard has joined the customer services team, managing the distribution of completed products. Further investments, in both staff and machinery, are planned in the coming months as the company continues to expand its product range. Its latest product to hit the market is the fully biodegradable ID card holder. It uses innovative technology to significantly increase the biodegradation rate of polymers in anaerobic microbe rich environments such as landfill and oceans. Biodegradable card holder The product complements Evohold’s existing range which includes recyclable and antimicrobial products The product complements Evohold’s existing range which includes recyclable, compostable and antimicrobial products, as well as detectable products that include metal particles. The UK division of cards-x, which is a ‘Made In Britain’ member, is headed up by Managing Director, Andy Reeves. He said: “Since expanding into the UK and then acquiring Evohold late last year, we’ve enjoyed a very busy six months with high demand across our product range and particularly for our card holders. As the only manufacturer of these products in the UK, we’re now on target to surpass 12 million units a year.” “The appointment of Charlotte and Craig, combined with further investment in new machinery, will support this growth. Craig brings a wealth of experience in the plastics industry to the role and Charlotte has spent more than five years working in customer services and has immediately hit the ground running.” Detectable card holders Andy continued: “Our new biodegradable card holder is proving very popular and particularly with businesses and organizations that are keen to demonstrate their green credentials. Our innovative technology means it biodegrades approximately five times quicker than conventional plastic.” “This launch also coincides with many countries banning the use of oxo-degradable plastics. Until recently these were marketed as a solution to plastic waste, but it was discovered they actually fragment into smaller pieces, known as microplastics, but don’t break down at a molecular or polymer level like biodegradable plastics, making them a major contributor to plastic pollution. This makes it a really exciting time to be adding this pioneering product to our range of recyclable, compostable, antimicrobial and detectable card holders, as well as flying the flag for eco-friendly British manufacturing.”
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Zigbee is a familiar name in the smart home arena, and the Zigbee Alliance is expanding its technology approach to address the challenges of the Internet of Things. As the Internet of Things (IoT) has evolved, the need has become obvious for stronger unity among brands and ecosystems to enable products within smart environments to work together more easily. Working to serve that need is the Zigbee Alliance, which seeks to promote collaboration in the Internet of Things by creating, evolving, and promoting universal open standards that enable all objects to connect and interact. Shifting the Smart home market Their IoT effort took off when Amazon, Apple, Google and the Zigbee Alliance announced an industry working group in December 2019 to take the ‘best of market’ technologies from smart home standards, portfolios and ecosystems and to develop a ‘super spec’ that will be open, inclusive and a significant industry shift in the smart home market. Zigbee Alliance has been for a while now working on openness and interoperability" “Zigbee Alliance has been for a while now working on openness and interoperability, which has led us to the Project Connected Home over IP (CHIP), which is looking to unify the environment, under one technology, one certification program and one logo,” says Chris LaPré, Zigbee Alliance’s IoT Solutions Architect. “It really does fuel IoT possibilities, whether in security or any other sectors.” Project CHIP is a royalty-free connectivity standard that unifies brands and ecosystems into a single smart home automation system that operates any other technology based on Internet Protocol (IP). Simplifying product development The intent is to simplify product development for device manufacturers, broaden consumer choice, and to ensure easy discoverability, deployment and engagement to fuel connected living. “We have noticed that, as the IoT has evolved, there is a stronger need for unity, which is why we are developing Project Connected Home over IP,” says Jon Harros, Zigbee Alliance’s Director of Certification and Testing Programs. “It fits with the Zigbee Alliance’s goal to unify systems, and to focus on everyone using the same application at the top. It unifies that environment, whether you are integrating your system with Amazon Echo devices or connecting to Google Home.” Participating in development of Project CHIP are 125 companies of various types from around the world working together with more than 1,100 of their experts serving across sub-committees to formulate specifications and fine-tune the project. Home system technologies The original Zigbee protocol is used for many applications around the world, including smart homes Although the technology is being developed for the home market, the specifications have been formulated with an eye toward expanding into the commercial market in the future. Development of open, interoperable systems provides greater freedom for consumers to choose among the many technology choices on the market, without being tied to a single brand or ecosystem. Zigbee Alliance certifications and memberships span the globe, with roughly a third in Europe, a third in North America and a third in Asia. Involvement in Europe is slightly higher than the other regions. Alliance members represent manufacturing sites all over the world. Project CHIP is a newer initiative of the Zigbee Alliance, which previously developed Zigbee Pro to enable home system technologies to operate using IEEE 802.15.4 wireless signals on the 2.4GHz radio band over a self-healing true mesh network. The original Zigbee protocol is used for many applications around the world, including smart homes. Certification transfer program Among the strengths of the Zigbee Alliance are years of experience certifying products, which includes testing them and confirming that they comply with the promoted specifications and functionality. The specifications are open standards that are developed in cooperation with all the companies that are Zigbee Alliance members. Another route is the certification transfer program, in which a company chooses a certified white-label product, becomes a member of the Alliance, and then rebrands the product while retaining the certification. “It helps them get products on the market quickly while they build their own knowledge base,” says Harros. “All our work is focused on standardizing the behavior and functionality of products and making sure everyone is following the same standard to get interoperability,” says Harros. “Members all contribute to the standards.”
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
A new large scale social housing complex, developed by Metroman Ltd, has joined forces with Videx UK to install a state-of-the-art door entry system for its residents. The London based development is split into 11 apartment blocks - Anika House and Jasleen Court - and fitted with Videx’s flagship VX2200 door entry system along with Videx MiAccess access control and hands-free video monitors. Suitable entry system Installer Dave Abrams, who owns DA & Son, was asked to recommend a suitable entry system that not only provided first rate security but was also easy for residents to use and convenient too. As well as meeting residents’ needs, the system also had to meet specific regulations, including Secured by Design (SBD), a police initiative for designing out crime to improve the safety and security of where people live. SBD’s product-based accreditation scheme - the Police Preferred Specification - provides a recognized standard for all security products that can deter and reduce crime. The Videx VX2200 system is one product that has the accreditation. Convenient door entry The VX2200 panel is also fitted with Videx’s standalone offline proximity system The VX2200 panel is also fitted with Videx’s standalone offline proximity system, MiAccess which enables the use of remote management of the access control system including adding and removing access key fobs, for example if a fob stops working, needs replaced or a new user needs to be added, a visit to the development isn’t needed. Dave Abrams said: “I recommended the Videx VX2200 as I have installed the system several times before and it’s a great kit for secure and convenient door entry. Being SBD accredited also means that it’s a system that actively deters and reduces anti-social crime such as vandalism. Videx has a long-standing reputation of providing first class products with lifelong support. I know if there’s any issue with the system, it will be quickly and easily resolved through the Videx tech team. The post installation customer support really is second to none.” Maximum-Security benefits The VX2200 is a preferred choice for a wide range of residential developments across the UK including social housing because of its ease of use and maximum-security benefits it provides. The VX2200 is a preferred choice for a wide range of residential developments It can cater for a wide range of buildings from 1-way systems to much larger systems that include up to 1,000 apartments making its flexibility a very attractive choice for secure and convenient entry on a large range of projects. Mabs Alam, Regional Sales Manager for London and South East at Videx UK, said: “Not only is the VX2200 a highly versatile entry system, it’s also accredited by Secured by Design, a key police initiative for designing out physical crime meaning it has been tested to the highest of security standards.” Ensuring maximum security “Because of the integrated MiAccess, residents simply need a programmed fob to gain access to their home and if they lose or misplace a fob, it can be reprogrammed remotely with another one easily and quickly by a management team.” “This means the system requires minimum maintenance and there’s no routine software upgrades needed either. What’s more there’s no moving parts, just the video handsets in each of the individual apartments. It’s such an easy to use and effective system and one of our most popular entry choices for residential developments in particular. The addition of MiAccess makes the system even more easy to use and maintain while ensuring maximum security.”
Providing a safe and secure environment to drive into the lane and fuel up vehicles is a key factor in ensuring improved customer satisfaction for a gas station. To offer better service to the customer, VIVOTEK the global pioneering IP surveillance provider has assisted BP Manor Garage Gas Station, located in Pietermaritzburg, South Africa, to upgrade their existing security system. Most of the existing cameras on-site at the BP Manor Garage Gas Station, installed about four years ago, were adequate for the customer's current requirements. The BP Manor Garage Gas Station did not want to replace most of the older cameras, meaning that retrofitting was an essential aspect of the project. However, major updates were required. Some of the older cameras were damaged because their seal had worn out, allowing water to enter. On the storage side, the user needed to retain recorded footage for four months while enabling remote viewing from a location that was about 5kms away. IP surveillance systems BP Manor already had a strong and positive history of using VIVOTEK complete IP surveillance systems, including network cameras, network video recorders (NVR), and video management software. This long-term partnership and trust ensured that the company continued to choose the same brand. A total of 50 cameras were installed, covering areas from driveways to cash points, the shop floor, pump islands, and staff rooms. VIVOTEK began the project by replacing the damaged cameras with IB9360-H and IB9388-HT. These bullet cameras deliver high-quality images and are weather-proof with an IP66 rating and vandal-proof with IK10-rated housing. In order to meet the unique demands of the gas stations, a mini fisheye camera with a 360-degree surround view can cover the shop floor, while box and fixed dome cameras cover an indoor cashpoint, and weather-proof and vandal-proof bullet cameras protect outdoor driveways. Network video recorders The result has meant that BP Manor can continue to grow its business intelligently The transformation also included three existing network video recorders (NVR) were replaced with a single 128 channel, 16 hot-swappable HDD bays NVR, the NR9782-v2. The whole system was connected and managed by VIVOTEK's state-of-the-art video management software VAST 2, empowering the customer to control the footage better with smart search, video analytics report, and third-party data source with Data Magnet functionality. Data Magnet The Data Magnet enables importing PoS data into VAST 2, providing rapid access to the recorded data while supporting the simultaneous display of sales transaction information during live streaming. The result has meant that BP Manor can continue to grow its business intelligently. Their customers can be assured of their safety and security as they return to this trusted brand, just as BP Manor has returned to VIVOTEK. "Ever since 2010, we have been supplying and installing VIVOTEK's IP surveillance system and offering them to our customers as a premium option. They provide unparalleled quality and performance. We remain loyal to the brand and can vouch for the product's durability and performance,” stated Azam Paruk, Azrea Installations, Managing Partner.
For the jewelry business owner, ensuring the highest level of security has always been a top priority. VIVOTEK, the IP surveillance provider, has built up a rigorous surveillance system for Peyrelongue Chronos, a well-known luxury boutique offering high-end jewelry in Mexico, to monitor their precious products without any blind spots and to prevent robbery or theft. Peyrelongue Chronos has recently remodeled its facilities, including an overall of the video surveillance system. In search of the best solution to meet demands for both outside and inside the store, Peyrelongue Chronos found all of its requirements met by the wide range of VIVOTEK cameras. Harsh outdoor environment The 180-degree multi-sensor MS8391-EV was mounted on the facade of the boutique to maximize the field of view with 12-megapixel high-quality images and reduce the number of cameras required, thus cutting down installation costs. The camera is also ideal for the outdoors because of the robust housing that resists rain, dust and protects it from vandalism or tampering. The 180-degree multi-sensor MS8391-EV was mounted on the facade of the boutique To enhance the outdoor security of the building, two FD9360-H cameras were added to monitor the avenue in both directions and provide clear night views despite the harsh outdoor environment. Inside the Peyrelongue Chronos store, two of MS9390-HV, the most efficient panoramic network camera, were installed in the jewelry area to surveil all displays as well as all movements within them. Receiving alarm notification With its unique and stylish dual-sensor design, the MS9390-HV offers a 180-degree field of view and range of up to 20 meters and is capable of maintaining a higher field of view (FOV) than traditional multi-sensor panoramic cameras using four sensors. Within the spacious and comfortable luxury watch area, two 12-megapixel fisheye cameras, the FE8191, and FE9191 were chosen to monitor the product showcases, delivering blind-spot-free 360-degree surround imaging of wide areas. Further enhancing performance, the FE9191 features AI-powered Video Content Analyses - Smart 360 VCA, including intrusion detection, crowd detection, and loitering detection, which enables the security staff to receive alarm notification for any notable event. Finally, for the shared area, such as aisles, entrances, and exits, the ability to capture high-quality images both in low light and high-contrast environments is a critical issue when selecting surveillance cameras. Providing quality service The most remarkable thing when working with VIVOTEK is technical support" The 5-megapixel and 2-megapixel dome cameras, FD9189-HM and FD8166A-N, were chosen precisely for this reason. The FD9189-HM is equipped with 30 meters range IR illuminators for enhanced night vision, and the FD8166A-N is armed with invisible 940nm IR illuminators and capable to see up to 6 meters in total darkness, making it a sure bet to meet all the surveillance requirements in transit zones within this renowned boutique. “Thanks to VIVOTEK’s high-level security system, we are confident that we can guarantee our clients the best experience from the moment they walk in. Peyrelongue Chronos feels secure with VIVOTEK’s surveillance solution while servicing clients,” pointed out Ana Lucía García, Marketing and PR Manager of Peyrelongue Chronos. “The most remarkable thing when working with VIVOTEK is technical support. They assisted me both pre-sale and post-sale to provide quality service to our customers. No matter what types of security issue my clients may have, I know I can solve it with VIVOTEK’s technology,” remarked Serafin Sanchez, Automatization Server Manager and Integrator Certified by VIVOTEK.
A frequent target for terrorism, airports faces considerable challenges in securing the flow of traffic. Concerns over security can ground flights, grinding operations to a halt. Whether one needs to inspect all vehicles entering the airport grounds or just those entering higher-security areas like the apron and the container space, there is no room for long waits during inspections. Passengers are counting on their flights leaving on time, and security delays could lead to flight delays. However, one can’t afford to compromise the security standards either. Propane gas cylinders While security is usually heavy in the terminal buildings themselves, in some international and local airports, there are not enough measures in place in the external road and parking areas leading to the departure and arrival zones. The attack resulted in ‘only’ five people injured and heavy damage to the terminal building For example, on June 30, 2007, a Jeep Cherokee laden with propane gas cylinders and gasoline cans was driven at a high speed into the doors of the Glasgow Airport departure area on one of the busiest days of the year. The attack resulted in ‘only’ five people injured and heavy damage to the terminal building. Incidents like this one really emphasized the need for an automatic and efficient method for inspecting vehicles entering the different areas in and around the airport. Heavy traffic control The airport apron, flight line or ramp is the area of an airport where aircraft are parked, unloaded or loaded, refilled, or boarded. In most airports, the security regulations in this area are heavy, and only authorized, trained personnel are allowed to drive in and out while withholding heavy traffic control rules. One can only imagine the danger of terrorists or other hostile people entering in an authorized vehicle. There needs to be a method to make sure these types of people cannot use fake license plates if the recurring vehicle list does get into the wrong hands. While clearly the number of civilian passengers who use airports has risen dramatically as time has gone by, the risks associated with airports and airline travel have also increased. Identifying vehicle passengers The device is available in both a mobile and a stationary, fixed version and works in extreme conditions The threat of bombs or cargo-related explosives is significant, but security measures have not necessarily risen at the same rate as threats and number of flights and passengers. The financial and physical risks of illicit and dangerous materials entering sensitive areas in and around an airport are clear, and a new generation of screening is required to tackle these challenges. UVeye scans, analyses, and records all passing vehicles, ensuring security while also keeping flights on schedule. Helios by UVeye is the perfect option to protect both the access roads and parking facilities around the airport and important areas like the apron. Helios improves security while keeping security personnel safe. The device is available in both a mobile and a stationary, fixed version and works in extreme conditions. Their technology can even identify vehicle passengers with high body temperatures to help prevent the spread of COVID-19. High-Resolution cameras Helios UVIS uses machine learning and artificial intelligence to inspect the undercarriage of any vehicle that drives over its multiple high-resolution cameras. It alerts security personnel about any irregularities or foreign objects hidden in the undercarriage, whether its weapons intended to be used in a terrorist attack, improvised explosive devices, or illegal cargo to be loaded onto a plane in the apron of the airport. Inspecting the undercarriages of vehicles is very difficult for security personnel and is sometimes neglected due to the number of vehicles entering an airport. Before Helios, there was never an effective solution for under-vehicle inspection, and even if security officers inspected the undercarriage, they probably didn’t know what to look for. Reducing inspection times UVeye is here to solve this problem by providing drive-through solutions in selected access points UVeye has built its products as drive-through solutions that reduce inspection times to as little as a few seconds, supporting a quick flow of vehicles entering or leaving the premises. With Helios, the security guard can inspect the vehicle from a safe distance by simply looking at the high-resolution images on a tablet or computer screen, checking for anything suspicious or unusual in the undercarriage, automatically marked by the system. Many airports do not have enough staff or the capacity to inspect every vehicle entering or leaving secure areas. UVeye is here to solve this problem by providing drive-through solutions in selected access points, alerting security personnel of any irregularities or potential threats attached to a vehicle. Helios is the only product on the market able to detect issues in the undercarriage of a vehicle passing through the system for the first time. Fingerprint ID feature The apron of the airport is the most sensitive area of the facility, and with UVeye’s technology and unique fingerprint ID feature, every vehicle entering or exiting the apron will be marked using artificial intelligence and receive a unique ID that will be saved in the database. This way, security personnel will not need to rely on license plates alone when inspecting vehicles on the authorized vehicle list. If someone attempts to enter using a fraudulent license plate, the system will recognize that it is not the same vehicle, and the attempted trespassers will be stopped in their tracks. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by even massive vehicles like trucks and buses. It is fully operational at temperatures between -20 and 40 degrees Celsius and is IP 68/54 compliant, meaning it offers full protection against sand, dust, or rain. Airport access roads UVeye’s thermal sensor can also detect the body temperatures of vehicle passengers entering the external airport access roads, which can help identify visitors with potential fevers, improving the safety of everyone in and around the airport. Airports around the world can enhance their security efforts with automatic vehicle inspection systems Integrating to the centralized server provides the capability of connecting multiple systems or lanes across different sites while enabling central management and control via one screen. The centralized management system enables the client to access the different systems deployed and manage the different users and historical data. Airports around the world can enhance their security efforts with automatic vehicle inspection systems, providing an extended layer of safety in and around the airport. Access control systems Uveye took into consideration heavy traffic entering the access and parking areas of an airport when it built its drive-through scanner, Helios, which can quickly find any threat attached to or hidden in the undercarriage without slowing down vehicle traffic. Helios is the perfect solution to prevent any weapons, bombs, drugs, or other illegal or dangerous items from entering the apron of the airport and potentially accessing the airplanes about to take flight. Integrating Helios with other security and access control systems can provide a multi-layer approach that will tighten the entry and exit points to any sensitive site while keeping personnel and data safe. UVeye is ideal for airports and also can be implemented at border crossings, seaports, military bases, embassies, data centers, and other secure perimeters.
FLIR PT Series cameras were used in a surveillance project to detect and monitor illegal fishing and poaching activities along the Spanish Galician coast. The FLIR thermal imaging cameras combined with maritime video analytics from Gradiant were ideal for spotting illegal vessels on a 24/7 basis and at a long range. The vastness of the Galician coastline and the multitude of fishing and farming activities call for a more automated surveillance approach. Fishing, shellfish harvesting, and marine aquaculture - mainly mussel farming in inshore waters are important economic activities in Galicia (northwest of Spain). Local public authorities strictly control these activities to prevent exploitation, fish stock depletion and resulting economical losses. They are fighting a constant battle against this unfair and illegal competition that affects thousands of professionals who make a living from the fishing and seafood industry. Challenges of coastal monitoring Illegal fishing and poaching has an enormous impact on the environment and food safety Illegal fishing and poaching of seafood resources also has an enormous impact on the environment and food safety; especially during periods of toxic algal bloom (red tides), when fishing conditions are hazardous for public health. The detection of unauthorized fishing and shellfish harvesting is of paramount importance for the Galician authorities. However, monitoring and protecting all of Galicia’s inshore and offshore fisheries, shellfish harvesting areas, and marine aquaculture farms is a challenging task. Galicia has 1,200 km of coastline. Its protection involves the surveillance of activity in 122 ports, including around 5,000 fishing boats, 400 beaches dedicated to shellfish harvesting, and 47 mussel aquaculture farms, with a total of more than 3,000 bateas (floating mussel farms). Long-range thermal imaging Moreover, most illegal activity takes place at night, making it extra difficult for law enforcers to detect any type of vessel. The Galician climate does not help either. With an average of 128 days per year of rain, visibility conditions are usually not ideal for surveillance operations. Manned surveillance patrols can only do so much; they are hindered by the climate and visibility conditions, making it impossible (from a practical and financial standpoint) for coast guards to cover the entire Galician coastline. In 2017, the Galician Coast Guard started a project to test video surveillance of the coastline based on thermal imaging cameras. The pilot included the use of FLIR’s PT Series multi-sensor camera, combined with maritime video analytics software from Gradiant (Pontevedra, Spain). Multi-sensor installation FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications The multi-sensor installation was extensively tested on two different locations along the Galician coast. One set-up was used to monitor illegal vessels on coastal waters at short/medium range, while another set-up was used for long-range monitoring. The PT Series thermal cameras allowed the Galician Coast Guard to monitor the required area over a long range on a 24/7 basis, even at night and in adverse weather conditions. In addition, the FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications. This software is specifically adapted for monitoring coastal environments and allowed the coast guard to detect, track and geo-localise people and vessels, including small wooden and plastic boats. Visible-light camera The software enabled the thermal cameras to detect objects and people despite adverse maritime conditions, such as high waves, low contrast due to low light, fog and rain, reflections on the sea surface, camera vibrations, and the presence of distractors, such as birds and vessel wakes. The FLIR PT Series is a high-performance multi-sensor pan/tilt security camera, incorporating an uncooled thermal camera with sensitivity of <35mK and a visible-light camera with 36x optical zoom. While the thermal camera is used to detect threats over a long range based on their heat signatures, the visible-light camera can be used for verification and identification. Long-range surveillance The requirements for this long-range application were extremely challenging for any thermal camera" “FLIR is the reference for long-range surveillance applications with thermal imaging,” says José Antonio Rodríguez, Head of Video Analytics at Gradiant. “The thermal performance of the camera and the fact that this technology is easy to set up makes it ideal for this type of application. In addition, FLIR supported us from the start for lens selection, calibration of the system and much more.” “The requirements for this long-range application were extremely challenging for any thermal camera,” says Nikitas Koutsourais, Product Marketing Manager at FLIR Systems. “Thanks to the FLIR PT Series’ unique thermal sensitivity of less than 35mK, we could provide the best image performance in the market.” IP video streaming Two different configurations were used in this application. The long-range surveillance station used a FLIR PT-606 camera, and was able to detect a rubber inflatable boat at 4,000m. Despite its narrow field of view, this camera allowed for wide coverage thanks to the high-precision pan/tilt unit. The camera was able to sweep a wide field of view span in a pre-programmed sequence of pan/tilt presets. The port surveillance station used a PT-625, offering a good compromise between detection range and field of view with a single pan/tilt preset. The integration of the video analytics software with the camera was easy thanks to IP video streaming and the camera’s ONVIF compliant interfaces for pan/tilt control. Long-range surveillance typically requires the use of lenses with a narrow field of view, which is a problem when you want to monitor wide areas. Coastal protection applications The FLIR thermal cameras provided the Galician coastguard with increased situational awareness However, the video analytics from Gradiant was able to take advantage of the Preset Sequencing mode of the FLIR PT Series. This allowed the coastguard to cover a wide field of view with a single camera and to perform video analysis on each pan/tilt preset. The FLIR thermal cameras provided the Galician coastguard with increased situational awareness and allowed them to respond much quicker to illegal fishing activities. The pilot project was performed in a realistic surveillance environment along the Galician coast and generated very positive results. The combination of a multi-sensor system with Gradiant’s maritime video analytics proved to be effective to deal with the intricate Galician coast lines and a lack of open view. In addition, this technology combination is a cost-effective alternative, making automated surveillance applications accessible for fish farm companies worldwide. Extremely rugged systems Finally, the PT-Series are extremely rugged systems, which makes them ideal for coastal surveillance, especially in an extremely humid environment such as the Atlantic coast of Spain. The system’s vital core is well protected against dust and water ingress, and complies with IP66 requirements.
Revader Security has supplied its Transit mobile CCTV cameras to Argoed Community Council in Flintshire, North Wales. The cameras are operated on a daily basis by the local police, primarily for the purposes of tackling antisocial behavior and street crime. The Transit range of mobile cameras are ruggedized outdoor surveillance solutions which have been proven over many years to deter crime and secure the vital video evidence necessary for prosecution. Local police forces are actively using the fleet of mobile cameras in the Argoed and surrounding area to combat long-running issues of antisocial behavior and criminality in the community. Mobile CCTV cameras combat crime Police are able to regularly reposition each camera around the locality to respond to the movement of crime hotspots, and only minimal planning is required prior to deployment, since the units can be installed in virtually any location within minutes. Rhodri Hampson-Jones, Clerk to the Council, said, “The mobile CCTV cameras supplied by Revader Security have proven to be highly effective. I would have no hesitation in recommending them to CCTV operators seeking to combat antisocial behavior and criminality in the community.” Following successful results in the local area, Argoed Council placed repeat orders to increase their stock of mobile cameras. The council is fully supported by Revader Security’s technical team throughout the life cycle of the products.
Round table discussion
In-person training sessions were mostly canceled during the worst of the COVID-19 pandemic. However, the need for training continued, and in some cases increased, as the security industry sought to adapt to the changing business climate of a global emergency. So how well did we as an industry adjust? We asked this week’s Expert Panel Roundtable: How has security industry training changed in the last year?
During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
Ruggedized products: Manufacturers & Suppliers
Smart And Reliable Rail And Metro OperationsDownload
5 Ways RFID Readers Can Secure Your WorkplaceDownload
Simplified Security for Utilities & Critical InfrastructureDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload