Security alarm systems
Senstar, a pioneer in video management and perimeter intrusion detection solutions, is pleased to announce the release of Senstar Symphony 7.4.1 featuring support for PostgreSQL high availability. The award-winning Senstar Symphony delivers an all-in-one solution for video, security, and information management. Senstar Symphony works with cameras from all major manufacturers, scales to deployments of any size, and is easy to use and configure. Video management software With built-in support f...
Johnson Controls is announcing exacqVision 20.09, which offers an integrated, cost-effective face mask detection solution that can quickly put information into the hands of facility decision makers to help maintain safe environments for employees and visitors. Based on Artificial Intelligence (AI) analytics versus pixel-based analytics, exacqVision 20.09 with Face Mask Detection offers improved accuracy and a scalable, efficient solution for organizations where public health and safety is a pri...
Pyronix announced an addition to its camera range with the launch of the brand-new LightCamera. The outdoor Wi-Fi LightCamera offers another layer of perimeter protection to properties, with powerful Full-HD performance, ultra-bright lights and active defense capabilities. “We’ve brought this product to market as we understand evolving end user requirements, whilst also ensuring that our installers can remain at the cutting edge of developments. The LightCamera provides installers...
Hikvision, an IoT solution provider with video as its core competency, has announced its new generation of wireless alarm systems – the AX PRO – delivering comprehensive alarm solutions for both residential and commercial applications. The newly launched AX PRO product family includes a compact panel hub for a wide range of detectors and peripherals, covering intrusion detection, video verification, smoke detection, flood detection and home automation. Developed with both the instal...
FelenaSoft announced the release of Xeoma software version capable of detecting people that are or are not wearing protective facial masks. With the start of the pandemic a facial mask has become an essential part of the everyday life and an integral element of the safety rules in many governments. Thanks to current technological advances, cutting-edge solutions like Xeoma can aid humanity in the struggle. Xeoma’s Mask Detector is a fully automated, artificial intelligence-powered feature...
Pyronix is delighted to announce the launch of its brand-new heat detector, the HEAT-WE. Part of the ever-expanding life safety range, the thermistor-based detector adds yet another option to installations; protecting properties, families and delivering even greater peace of mind. “Recognizing that security is consistently developing, we’re delighted to expand our life safety range with the HEAT-WE,” Laurence Kenny, Pyronix Marketing Manager, said. Wireless heat sensor...
A substantial focus of the security industry is on the selection and installation of security systems, and there is no doubt that this is a critical element of the process. However, in order to ensure that security systems such as access control, video surveillance, intrusion detection and panic alarms deliver on ‘game day’, an equal if not greater emphasis has to be put on the actions that are taken after the installers have closed the doors on the truck and driven away. This article covers some important issues that were covered at the 2019 International Association of Professional Security Consultants (IAPSC) annual conference in Miami, Florida, where Frank Pisciotta, CSC, Business Protection Specialists, Inc. and Michael Silva, CPP, Silva Consultants, facilitated a discussion among security professionals on the topic. Backwards compatibility in access control solutions David Barnard of RS2 security highlighted the importance of backwards compatibility in access control solutions David Barnard of RS2 Technologies LLC highlighted the importance of backwards compatibility in access control software solutions. Reputable manufacturers are constantly evolving software products and it is critical that software continues to work with all installed hardware or owners will find themselves purchasing equipment a second time, which is never good news. An example, a case study with a client where the video management software upgrades were not backwards compatible through the mobile app and a small manufacturing site was looking at a US$ 75,000 price tag to upgrade cameras to make them compatible with the ‘updated software’. Risks of failures in door hardware products Jim Primovic from ASSA ABLOY cautioned about the risks of failures in door hardware products resulting in a failure to attention to detail in the selection and, in particular, the installation process. He explained the importance of using certified installers to avoid operation problems. In light of constantly evolving software revisions, how often does one see any additional training provided to end users when software updates are released? Charles Johnson of Open Options raised this important point and it is an excellent one. As organizations think about structuring maintenance agreements, it might be wise to consider ongoing training to cover software updates and ensure that end users can continue to optimize the features and benefits of software revisions. Software Support Kim Kornmaier of Honeywell mentioned another element of security system lifecycle consideration, which is ‘Software Support’. Maintenance agreements are available and will likely be offered from every installer and come in a variety of flavors. However, care needs to be exercised to ensure that whatever services and support are included, in the scope of a maintenance agreement, have a clear correlation between service and software upgrades versus the fee charged. Software upgrades and system testing Maintenance agreements should be avoided that simply guarantee the free replacement of parts (which may or may not ever get used, even after you pay for it). Services that should be considered include software upgrades, system testing and replacement of consumable parts, like back up batteries. Another key issue ties directly to periodically measuring and ensuring the risk reduction results of security systems, for example, with an access control system, there are several actions recommended for system owners, including: Conduct periodic door and alarm testing - This presumes users have installed all of the necessary parts to enable alarm monitoring). These tests should include the mechanical testing of doors and confirming door-held-open-too-long and forced-door alarms are properly reporting to the alarm client. Importance of harnessing door alarming capacity Excessive door alarms are an indication of either a user or system problem Excessive door alarms are an indication of either a user or system problem or all alarms should be investigated to determine root cause and corrective action needed. Organizations who fail to harness door alarming capability are giving away up to 50 percent of the system's potential benefit. Ensuring the integrity of the access control database is of prime importance. The failure to manage this can lead to unauthorized access and serious security incidents. This can be achieved in a variety of ways, but in the majority of risk assessments they have conducted over the years, it is common to find separated employees and contractor records with active credentials in the database. Ways to mitigate this risk include: Integrating your access control database with active directory (works for employees, not so well for contractors); Utilizing expiration dates on contractor credentials; Periodically manually auditing contractor and employee active badge reports for anomalies, which may indicate process weaknesses in the change management process; Utilizing the ‘use it or lose it’ feature in many software programs that automatically disable a credential after a set period of non-use (e.g., 90 days); and Establishing processes to limit the removal of certain badges from the site (e.g., those issued to contractors or temporary employees). ‘First Card Unlock’ feature Irregular schedules, holidays and natural disasters can result in access vulnerability. For instance, if access-controlled doors at a site are programmed to open on a timer and something prevents persons from arriving at work (e.g., snowstorm), a site may be left exposed. A mitigation technique against this type of risk would be to employ a concept called ‘First Card Unlock’. Under this feature, a lobby entrance to an office, for instance, would not enter into an unlocked state, until the first authorized employee presented a card and entered the workplace. Changing holiday programming in security systems Holiday programming in some systems needs to be changed on an annual basis Holiday programming in some systems needs to be changed on an annual basis. Managing holidays in an access control system results in doors staying secure which would otherwise be unlocked on a normal business day. Similarly, intrusion detection, duress devices and video surveillance systems can let users down without the proper care and feeding. Examples would include: A panic device fails to communicate an emergency situation because it was not properly reset or the wiring has been damaged due to poor installation. Panic devices should be regularly tested and ideally the activation during testing should be by a person who would be required to use the device in an actual incident. The objective here is to build competency in the persons who may need to activate a device discretely. Similarly, intrusion detection systems should be carefully tested to ensure that all devices are properly reporting to the panel and that the panel is communicating properly to the central station. If there are redundant communications channels, each should be verified. In the same way someone would conduct audits of active credentials in an access control system, it is strongly recommended that users perform a similar review with PIN codes, which have been assigned and would allow for an unauthorized person to disarm a system. Utilizing the failure-to-close feature to ensure that through collusion or negligence, if the last person out of a restricted area fails to arm the panel, the central station will notify a responsible party about the omission. Further, reviewing opening and closing reports might well detect inappropriate entries by authorized personnel which are indicative of suspicious or illegal activity. These features and reports will likely be at an additional cost, but they are important insurance to protect against insider threat. It is not uncommon to hear about an incident happening and during the investigation, the owner of the system discovers that the needed camera was not recording. Where video is not under routine observation, it is recommended to determine if your video management system can send an alarm in the event of video loss. This would allow for rapid remediation before the video loss is discovered in the course of an investigation. Avoiding degraded video quality over time In almost every case, degraded video quality is directly related to resource saturation With respect to video surveillance, as systems grow and evolve over the life of the system, organizations may experience degradation. Darren Giacomini of BCDVideo has studied this issue extensively and concludes that in many cases, installers or others are simply putting too many devices on a VLAN, which results in latency and other conflicts. Degraded video quality has a finite number of potential root causes. In almost every case, degraded video quality is directly related to resource saturation. The resources on a surveillance network consist of IP cameras, network switches, network uplinks, viewing stations, database management and archives. Resource depletions According to Giacomini, each of the resource shares a common thread. And, at the basic level, each of those items is nothing more than a purpose-built computer with limited CPU, memory and network capacity. When any of these resources exceed their capacity, the quality of service delivered will degrade. The following are common resource depletions that can degrade video quality and require a much deeper dive, but are included here as a starting point: IP camera CPU utilization is in excess of 85 percent; CPU elevation in the decoder or workstation decoding the video; and Network congestion or CPU elevation in the network switch. Maintaining the integrity of archived video data Giacomini indicated that the majority of the time degraded video is associated with resource depletion Giacomini indicated that the majority of the time degraded video is associated with resource depletion in one of these key components. Investigation of the potential causes can save time and effort, and prevent a video management software application from unduly being blamed for poor performance during its lifecycle. Also, on the topic of video, John Kampfhenkel, Director of Technical Sales at Veracity discussed the challenges that organizations face when video management system storage is undersized and the need to carefully plan for video retention of existing recorded data when the video system has to be expanded. This can be a problem organizations face and when they do, it is best to involve a video storage expert to determine options, costs and potential legal requirements for maintaining the integrity of archived video data. Selecting the right security technology Dependent on the level and type of integration between various systems, another challenge may be to preserve the integration between the two systems. System owners will need to coordinate carefully with installer(s) to ensure that a software revision to one system will not result in a disruption to a software level integration. This type of integration may require a delay in being able to upgrade one or the other application software versions until the integration can again be certified. Selecting the right security technology is an important element of an organization's security risk management. However, experts would argue that in terms of getting measurable results from technology, there needs to be a keen focus on sustaining activities after the installer closes the doors and drives away. By adhering to the consultant and manufacturers' guidance in this article, organizations can substantially reduce the risk to people, assets and information, and prevent criminal and terrorist incidents in the workplace.
Temperature monitoring expert, AMETEK Land, has partnered with sister company, Telguard, to offer the VIRALERT 3 non-contact human body temperature screening system as part of Telguard’s distribution channel to the security sector. The VIRALERT 3 provides a camera, thermal imager, and a temperature-controlled reference source on a single mounting platform. Using automatic face detection, the system ensures a valid reading, and provides a measurement that’s accurate to within 0.5oC/ 0.9oF, it then calculates core body temperatures through a rapid test procedure that lasts less than two seconds. Infrared thermal imaging Developed over 18 years by AMETEK Land experts, the VIRALERT 3 provides real-time infrared thermal imaging from a safe social distance. It is designed to screen visitors for elevated skin temperature at an entry point without slowing the flow of people or the need for person-to-person contact. The VIRALERT 3 is easy to use and can be left to operate automatically, with audible and visual alarms alerting when high temperatures are discovered. To ensure the highest levels of accuracy and reliability, it has a blackbody calibration source fitted on the same platform as the integrated thermal imager/visual camera. This makes for a compact system that won’t get in the way of queueing people and can be easily wall or desk-top mounted. Security sector Justin Smith, AMETEK Land Vice President said, “Partnering with Telguard is a perfect fit. Telguard is a leader in cellular communications devices for security systems, and VIRALERT 3 complements these products, providing the security sector with all the systems they need to open facilities safely, and just as importantly, to stay open.” The VIRALERT 3 builds on AMETEK Land’s proven expertise in temperature technology. The company has been developing high-accuracy infrared measurement instruments since 1947 and has been creating human body temperature screening systems since responding to the SARS outbreak of 2002.
Security and monitoring firm Ecl-ips, has bought Bristol-based alarms specialist, Security Group, to expand its services to clients. Ecl-ips is a CCTV and access control system designer and installer based in Worcestershire which has always strived to offer clients the most advanced solutions it can. Its current preferred partners are Avigilon, part of Motorola Solutions, for CCTV and Paxton, for access control. Meanwhile, Security Group specializes in designing, installing, maintaining and repairing intruder alarms. With Security Group’s expertise in alarms Ecl-ips will be able to offer clients a comprehensive security and safeguarding solution. Security Group has been a family run firm since 1996 and has provided its services to private individuals, the public sector and businesses throughout the south-west of England. Intruder alarm system Like Ecl-ips, Security Group has built up a reputation for the quality and professionalism of its services. Each intruder alarm system that Security Group installs is certified to BS EN50131, BS 8243 and PS6662 standards. This gives added peace of mind since they comply to National Police Chiefs Council (NPCC) policy and meet the requirements of the Security Systems and Alarms Inspection Board (SSAIB). Both companies have fully trained and security screened engineers. While Security Group is SSAIB registered, Ecl-ips is NSI-Gold approved thus providing all their customers with confidence in their services.
ASSA ABLOY announced the introduction of Medeco’s Intelligent Key Cabinet (IKC), a complete key access control and storage solution. Ideal for keys and other assets that require a high level of security and accountability, the IKC is an electronically controlled steel cabinet that requires Biometric Fingerprint, PIN, or Prox Card authentication (optional) for access. Authorized users have access to only specific keys stored in the cabinet. The IKC electronically keeps a record of key removals and returns, by whom and when. IKC is also an essential addition to the Medeco XT Intelligent Key system: it can simultaneously secure and charge Medeco XT electronic keys, ensuring they are always ready for use. For optimum efficiency, an optional add-on programming device allows updates of schedules and access rights to XT keys while they are secured in place. Key management system The IKC secures mechanical keys and assets using exclusive iFob technology “Any key system is only as secure as access to the keys themselves,” said Gene Cronin, Medeco Product Manager, ASSA ABLOY. “With the IKC, facilities can not only control access to keys, but track when keys are removed and returned. Imagine no more chasing down keys - always know who took a key and when. It can even capture a photo of the person removing the key." "Add the convenience of charging and programming XT Intelligent Keys, and it’s plain to see that no other key management system offers the efficiency and accountability of the IKC.” Secure mechanical keys The IKC secures mechanical keys and assets using exclusive iFob technology. XT Keys are secured using a locking XT charging port. Designed for maximum scalability, Medeco’s IKC is available in 32 or 64 port sizes. 32 port cabinets can be configured to store either all XT or all iFob ports. 64 port cabinets can be all XT, all iFob, or a combination of 32 XT plus 32 iFob. The IKC system can grow as business needs grow by adding on additional secondary cabinets in either 32 or 64 port sizes and in a combination of technologies (iFob or XT). Features: Available in 32 and 64 port sizes Available in main and add-on configurations XT and iFob versions Securely stores and charges XT keys (XT version) Identifies XT key serial number (XT version) Fingerprint reader Built-in LCD screen for ID Supports 2 factor authentication Audible and visual alarms SMS messages Email messages Camera for security photo capture Comprehensive Reporting & Analytics Emergency Fob Release System (optional) Wall mount or optional stand
Calipsa and Immix are bringing their proven AI Video Alarm Verification solution to central alarm monitoring stations in the Americas. The news follows the successful launch of the solution, known as AI Link, in Europe, Middle East and Africa (EMEA) and the Asia Pacific region (APAC) in May 2020. The integration, which will be available starting September 1, will allow Immix customers to add Calipsa’s False Alarm Filtering technology to their cameras directly via the AI Link feature in Immix Central Station (CS) and Guard Force (GF). The news that Immix will make this integration available to customers in the Americas is a significant development in the partnership between Immix, a global provider in central alarm monitoring station software, and Calipsa, a deep learning technology company who provide a solution for False Alarm Filtering. Following the launch of AI Link False Alarm Filtering to the Americas, the integration will be active for all central alarm monitoring stations globally. Integration of two technologies For existing customers of both Immix and Calipsa, the integration will lead to significant savings in both time and resources The AI Link integration provides improved usability for Immix and Calipsa users by streamlining the way the two technologies work together. Where previously set-up and management was required on both platforms to connect Immix and Calipsa, the new integration will allow for Calipsa’s False Alarm Filtering analytics to be added to cameras directly in Immix CS/GF - with a simple click of a button. Users no longer need to use both platforms to manage their cameras, and can enjoy the benefits of Calipsa’s False Alarm Filtering via their Immix CS/GF account. For existing customers of both Immix and Calipsa, the integration will lead to significant savings in both time and resources as users will now have the option to instantly enable Calipsa analytics on any new or existing device. In addition to improving the operational efficiency for existing Calipsa customers using Immix, the integration will give all Immix customers the opportunity to easily access Calipsa’s cutting-edge False Alarm Filtering Filtering analytics. Reduced nuisance alarms As Calipsa has been proven to reduce false alarms by over 90%, Immix customers who implement the solution will significantly reduce the time spent reviewing nuisance alarms. As a result, there will be more time to review genuine alerts, quicker response times to incidents and more efficient monitoring operation. Monitoring centers This is a quick and easy way for monitoring centers to raise their margins and be more effective" "We are excited to expand our integration with Calipsa through AI-Link to bring this ground-breaking solution to the global market,” said Chris Brown, Immix CEO. “The challenges faced by central monitoring stations have always been managing signal traffic and properly allocating resources, and we feel that this AI Verification solution meets those challenges head-on, enabling video-based monitoring centers to realize significant cost savings while eliminating the “noise” from video monitoring. This is a quick and easy way for monitoring centers to raise their margins and be more effective while only having to focus on true, actionable events. We are seeing the solution deliver meaningful false alarm reduction in our European clients and happy to now see this solution offered in the Americas.” Central alarm monitoring Brian Baker, Vice President of the Americas at Calipsa adds, “We are pleased to be able to offer our AI Link integration with Immix to customers in the Americas. Since launching to the rest of the world earlier this year, we have been overwhelmed by positive feedback from central alarm monitoring stations who have reaped the benefits, so we look forward to bringing the same efficiencies to the US market. We are also delighted to be expanding our relationship with Immix, a partner who shares our core values and beliefs, and look forward to a successful future of collaboration with them.”
As the application scenarios are becoming more and more demanding, traditional security systems are having problems catching up and often face issues such as: too much false alarms triggered by pets, insects, leaves and other non-target objects; can only rely on video playback for confirmation after an event; and difficult evidence retrieval due to uncolored images at night with Black/White monitoring. What’s worse, for a relatively comprehensive system, the user will need to spend more money on additional accessories like external mic, speaker, detector, and alarm light, not to mention the extra time and costs on installation. To address the above-mentioned issues once and for all, Dahua Technology launches its innovative and powerful Three-in-One Camera solution, also known as the TiOC. Powerful AI algorithms This automated and comprehensive security solution effectively solves the aforementioned problems with the following key features: Accurate Alarm: False alarm is always considered a headache for users. With AI-powered perimeter protection and SMD Plus, the Dahua TiOC offers accurate alarm function by precisely targeting people and vehicles, while filtering out non-target objects such as animals, leaves and car headlights. While keeping false alarm rate under 2%, its powerful AI algorithms also delivers a quicker, more accurate and longer range motion detection (detection distance is increased by more than 185%), considerably improving the efficiency of the whole TiOC solution. Real-time alarm functions Active Deterrence and Real-time Alarm: Instead of only relying on the recorded videos as evidence after an event, the TiOC makes it possible to respond during the event with its Active Deterrence and Real-time Alarm functions that can significantly prevent such event from happening. Active deterrence is more effective with red and blue light, which is more eye-catching than white light, and is also visible even in dense fog and heavy rain. An enhanced speaker delivers up to 110 dB, featuring a wailing siren or a recorded voice. APP Alarm Push provides alarm notifications in real-time, allowing users to respond in time such as sending a voice alarm using the two-way talk function. In addition, the system also allows pre-recorded announcements or customized recordings, which enables users to realize content customization and language localization. The cellphone APP also supports one-tap arming/disarming function that brings great convenience to users. Full-color technology Full-color: Enough reliable information is key during evidence retrieval. With industry-renowned full-color technology, the Dahua TiOC delivers color images day and night, considerably enhancing the ability to identify suspects, while increasing the quality of video evidence. Three-in-One: TiOC integrates 24/7 full-color monitoring, active deterrence and AI into one smart, innovative solution, greatly saving time and financial costs for distributors and installers. Enhance public security TiOC works like a responsible guardian to enhance public security TiOC is suitable for private places that need to maintain orderliness and warn off intruders, such as villas, shops, warehouses, etc. TiOC can accurately identify real targets with accurate alarm, effectively warn them off with active deterrence, and notify the user with real-time alarm. The full-color image that the camera records provides more useful human/vehicle evidence for future checking and analysis, offering an enhanced protection to residents, shop owners and warehouse managers. TiOC is also ideal for outdoor scenarios such as fire lanes, which need to be always free of obstructions, in most cases vehicles. Give it a try, and you’ll see that the TiOC can effectively maintain emergency lanes clear, working like a responsible guardian that fulfills its duty to enhance public security. Upcoming PTZ cameras The powerful Dahua TiOC Solution offers 24/7 full-color monitoring, active deterrence and AI with WizSense IP cameras, HDCVI 6.0 cameras and XVRs, and upcoming PTZ cameras, making it ideally applicable to villas, shops, warehouses, fire lanes, and places alike. With its mission of “Enabling a safer society and smarter living”, Dahua Technology will continue to focus on “Innovation, Quality and Service” to serve its partners and customers around the world.
Security and surveillance applications require accurate, scalable, and cost-effective solutions. However, traditional security technologies pose many risks and challenges including frequent false alarms and high costs—both for system installation and ongoing maintenance. Because of the shortcomings of these technologies, many organizations have adopted 3D LiDAR-based security solutions to improve reliability, reduce false alarms, and streamline their operations. Integrated with cameras and video management systems (VMS), LiDAR enhances security by reducing false alarms, allowing for real time tracking of intruders, and enabling automated PTZ camera control for a more comprehensive security system. Choosing the right technology for security and surveillance The most critical element of any security solution is its ability to quickly, accurately, and reliably identify potential threats so that security personal can be promptly mobilised to respond to said threat. Advanced security capabilities and reduced incidence of false alarms are especially critical when protecting sensitive areas like critical infrastructure and other limited access locations However, many traditional security technologies often fail to deliver the low rate of false alarms necessary to reliably protect secure areas, at any time of the day or night and in any weather condition. For example, cameras can be blinded by bright lights and cannot operate in dark conditions. In addition, cameras and other sensing technologies area also affected by harsh environmental factors like high wind and heavy rain—both of which can lead to security failures. The risks posed by an ineffective security system are high The risks posed by an ineffective security system are high. False alarms are costly, wasting valuable time and resources to respond to nonexistent threats. In addition, security personnel may experience alarm fatigue due to frequent false alarms, which can lead to latency in their response to real threats. Because of the consequences of false alarms and other security failures, security solution providers are searching for technology alternatives which can enhance the accuracy of their current Perimeter Intrusion Detection (PID) system as well as interoperate with the existing VMS platform managing their security devices. How LiDAR works differently LiDAR, which stands for Light, Detection, and Ranging—is a time-of-flight sensing technology that pulses low-power, eye-safe lasers and measures the distance between the sensor and objects based on the light reflections off those objects. The resulting sensor data is used to generate a centimeter-level accurate 3D point cloud image, providing spatial location information to reliably detect and track moving targets, such as intruders. LiDAR sensors are operational in various weather conditions and perform reliably in both very bright and extremely dark conditions. The anatomy of a LiDAR-based security solution A LiDAR-based security solution starts with the LiDAR sensors, but it does not end there. In any security application, several LiDAR sensors will be mounted at various points throughout the area, gathering environmental data to provide a complete 360-degree view of the protected space. A 3D perception software platform using artificial intelligence algorithms will detect, track, and classify objects based on the rich point cloud data received from the LiDAR sensors. From there, the object information is routed in real-time to a VMS, which may also compile data from cameras (including CCTV, IP cameras, etc.). The LiDAR-based object information can be used to enable automated PTZ control based on the target’s position, keeping the target in view of security cameras at all times. This provides a complete and nuanced perspective of the area being surveilled. LiDAR technology can pinpoint the exact location of a threat on a map, enabling quick and effective responses when and where they are needed. The fully integrated solution also empowers security personnel with the tools and information they need to respond to threats confidently, thanks to an extremely low risk of false alarms. LiDAR enhances security, reduces false alarms, and enables timely, effective responses LiDAR-based systems are becoming increasingly popular choice for security and surveillance applications due to the technology’s accuracy, reliability, and cost-effective operation. Overall, LiDAR enhances security, reduces false alarms, and enables timely, effective responses to security threats compared to security cameras alone. 4 key advantages of LiDAR for security LiDAR provides many benefits over competing technologies, including high accuracy, real-time tracking and analysis, seamless integration with existing infrastructure, and simple system management. High accuracy and low rate of false alarms In security applications, false alarms are extremely costly. Whenever an alarm sounds, staff must be mobilised to quickly respond to the threat of an intruder. A security system with a high rate of false alarms not only requires more staff members to respond to these false alerts, but it can also require additional devices to enhance the system’s detection accuracy. In addition, frequent false alarms can desensitise operators, lowering their efficiency in responding to alerts. 3D LiDAR sensors can provide greater than 95 percent detection accuracy and 24/7 reliability in all lighting and atmospheric conditions. The accuracy and reliability of a LiDAR-based solution significantly reduces false alarms, ultimately saving time and costs. A lower rate of false alarms provides personnel with confidence in the reliability of the alerts, improving the quality and promptness of their responses. Real-time tracking and analysis With LiDAR, security data is available in real time. The solution automatically tracks individual people and provides real-time location information, enabling security personnel to quickly locate and respond to potential threats. Seamless integration with cameras and existing infrastructure LiDAR sensors can be integrated with PTZ cameras and Video Management Systems (VMS). The positional data from sensors can be used to automate PTZ camera control and accurately identify and track moving objects in areas of interest. PTZ control is programmable, and the location data is used to intelligently select which camera to follow the intrusion based on pre-programmed rules. Some LiDAR manufacturers provide Automatic ID handover™ technology, which works by assigning a unique identification to each object detection enabling the system to track any object across all sensors within an environment and providing tracking continuity regardless of the target’s location within the secured area. This ensures seamless tracking of an individual’s movement across the entire LiDAR coverage area. Finally, when paired with a VMS platform, all sensors and video footage can be managed under one platform with a single visualization pane. The ability to clearly visualise moving targets on dynamic maps allows security personnel to take corrective action quickly and effectively. Easy-to-manage, fully automated solution Some LiDAR-based surveillance solutions use machine learning and 3D perception algorithms to scan the sensor’s field of view, analyze point cloud data, and provide anonymised information on detected individuals. This enables a fully automated security solution that is easy to manage. Overall, LiDAR-based security and surveillance technology reduces the risk of false alarms and enables security personnel to accurately identify and respond to threats—all at a cost-effective price point.
COVID-19 has been a thorn in the side of countless companies within the security industry and far beyond. Here, we speak with Richard Huison, Regional General Manager for the UK and Europe at Gallagher Security, who summises his personal experience from these recent months and how Gallagher has adapted in the face of pandemic-induced adversity. How has the COVID-19 crisis impacted Gallagher on a day-to-day basis? Gallagher was actually well placed as a result of work already in progress with a number of visionaries and innovators within our business, such as our CIO Neville Richardson. They are determined to put the business on the front foot, making it more digital and proactive in delivering high speed change and we had already been migrating to Microsoft Teams before COVID-19 first reared its ugly head. It’s part of our philosophy to make our business and the solutions we create as stable, reliable and resilient as possible. Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world It means Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world. When lockdown was imposed, we set about prioritising our clients’ needs and delivering on our commitments as a critical supplier. The Gallagher leadership team quickly rolled out the means to stay connected, positive and safe as each region went into isolation. Effective communication, both internally and externally, has always been a critical success factor for our business. That hasn’t changed with the more remote and virtual nature of our communication now and, if anything, it’s even more important both for business continuity and for the personal wellbeing of each and every one of our colleagues. We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done in new ways, such as using the emojis on Microsoft Teams. Perhaps the most striking example of this is our new European marketing manager Bethan Thompson, who joined Gallagher on 1 April, little over a week after lockdown was imposed in the UK. She has enjoyed the richest and most comprehensive introduction to the business from the safety of her own home armed with just a laptop and Teams. What can be the benefits of having employees working from home? There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done To be honest, before COVID, we didn’t disconnect enough, close the laptop, switch off our technology and allow ourselves NOT to respond instantly. But trust is an integral part of our culture at Gallagher and we can easily and effectively continue to champion the right balance and support for the team moving forward. How can employees ensure they keep a healthy work/life balance? Working from home can require some personal discipline around taking regular breaks and disconnecting from technology. I encourage all my colleagues to stay active and get regular exercise during the day. Taking time out allows you to process ideas with greater clarity, to be more creative, to plan your day and use your time more effectively – all of which is part of achieving that balance. And it’s important that we do switch off and close our laptop at the end of the day, which requires some discipline when you work for a business headquartered in New Zealand, where they are 11 hours ahead. It’s good to cultivate hobbies and welcome distractions that you are passionate about, to switch off from work more effectively. Personally, I love to be outside on a long dog walk with no technology. It’s liberating. Are you seeing that businesses are already beginning to think differently about their security? We have to remember why security is important. We all have a different view on how we should maintain business continuity. Yes, properties need a reliable detection and defense solution to resist the opportunist. With the mass migration to work remotely, business leaders are concerned that their IT systems are vulnerable to attack and we read daily about the growth in cyber-attacks. It’s common sense to protect your business with a suitable access control and intrusion detection system and the pandemic has proven to business the value of being truly resilient and able to still operate whatever circumstances ensue. What will be the biggest security challenges facing businesses over the next six months? In that timeframe, I don’t see us returning to how things were prior to the pandemic, so businesses will have to adapt to a new normal. We will have to adopt a more holistic view of security, encompassing safety, security and wellbeing, with our teams at the heart of that. In the new world, how can we maintain our teams’ safety at home, or limit them to certain floor space or introduce rotas for office attendance and keep surfaces virus free while they’re there? We need to be alert to where the next threat will come from and mitigate risk against both cyber and biological threat as we’ve seen a virus in either domain can be devastating. How is Gallagher meeting the evolving demands of the market? To be honest, Gallagher has always been ahead of the curve. We’ve been talking about competencies, compliance and resilience for decades, long before cyber became the buzzword. Everything we do is related to business resilience and continuity and security is baked in to our products and solutions at source, providing confidence and reliability for all of our customers.
The software-based technology running today’s access control systems is ideal for creating custom solutions for very specific end-user needs. Those needs may vary from delaying bar patrons’ access to a shooting range to reducing the risk of diamond miners pocketing precious stones. The ability to tightly integrate with and control video, intrusion, and other equipment puts access control at the heart of enterprise security. Often, off-the-shelf access systems provide most of the features an end user requires, but due to their type of business, facility or location, some organizations still have unaddressed needs. That’s where a custom solution can fulfill an essential task. Custom solutions are frequently requested by end users or the reseller to expand access control to meet those needs. Here’s a look at some custom solutions designed for end users. Area & time-based access control The owners of a popular shooting range also operate an onsite, full-service bar, and the owners wanted to delay entry to the shooting range once a customer had consumed alcoholic beverages at the bar. The custom solution works with the access cards customers use to enter the range. When a patron orders an alcoholic beverage, the bartender presents the patron’s credential to a reader at the cash register. With each drink, the access control system puts an automatic delay on the card being used to enter the shooting range. An area and time-based control solution was created An area and time-based control solution was created for a major pharmaceutical manufacturer concerned with potential contamination between laboratories testing viral material and others designing new vaccines. If an employee uses a badge to enter a room with viral material, that employee can be denied access to a different area (typically a clean room in this case), for a customized period of time. This reduces the potential of cross contamination between ‘dirty’ and ‘clean’ rooms. The software can be customized by room combinations and times. Random screening A mine operator wanted to prevent easily portable precious stones from being taken by miners. The custom solution uses the access control system integrated with time and attendance software. As the miners clock in, the system randomly and secretly flags a user-defined percentage of them to be searched as their shifts end. Security guards monitor displays and pull selected employees aside. A nice feature of this solution is that the random screening can be overridden at a moment’s notice. For example, if the process causes excessive delays, guards can override the system to enable pre-selected miners to pass until the bottleneck is relieved. The solution has also been adopted by a computer manufacturer looking to control theft by employees and vendors. Scheduler The system automatically unlocks and locks doors A custom solutions team integrated a university’s class scheduling and access control software to lock doors to classrooms that are not in use. With the custom solution in place, the system automatically unlocks and locks doors 15 minutes prior to and after a class. The doors remain unlocked if the room will be used again within the next 30 minutes. Readers mounted at each door enable faculty to enter rooms early for class setup or to work in a lab knowing students or others won’t be able to walk in. Event management This solution simplifies the visitor check-in process, especially for larger events with multiple guests. Efficiently moving people in and out of events booked at a working intelligent office building and conference center required integrating the access control system with a web-based solution storing the names, email addresses and phone numbers of invited guests. Before an event, guests receive an email invitation that includes a link to a downloadable smartphone mobile credential. Upon arrival, guests present that credential to Bluetooth readers at the building’s gated parking garage. The same credential enables smaller groups (up to 50 guests) to enter the building through turnstile-mounted readers – also used throughout the day by hundreds of building employees. To avoid long lines for larger groups of visitors, the turnstiles are kept open with security guards using handheld readers to authenticate credentials as guests enter the lobby. Additionally, a third-party emergency notification system was added to this custom solution. Guests receive instructions on their smartphones should there be a need to shelter in place or evacuate during an event. The credentials and notifications are disabled as guests leave the building through the turnstiles. This allows the hospital to maintain a secure environment while providing a simplified, efficient access solution Similar custom solutions have been deployed at hospitals searching for a way to provide secure access to patients only expected to be staying a short time for surgery. Patients are emailed a mobile credential to access both the hospital’s parking structure and surgical reception area. They can also designate family members and other visitors to receive emailed mobile credentials. This allows the hospital to maintain a secure environment while providing a simplified, efficient access solution for patients and visitors. Custom solutions are about problem solving. It’s finding answers to needs not specifically addressed by an access control system. The robust software of modern access control systems enables the design of custom solutions to efficiently enhance security, save time and reduce redundant tasks through automated processes.
Trends in the alarm industry point to a need for a software system that accommodates business patterns such as recurring monthly revenue (RMR). Workhorse Service Company provides a software that combines customer relationship management (CRM), enterprise resource planning (ERP) and field service management (FSM) into a “cradle-to-grave” system designed specifically for the alarm industry. “Making an alarm sale is different than making a CCTV sale, and the processes for the salesperson, technician and customer service rep are different,” says Steven Hayes, founder of Workhorse Service Company. He says WorkHorse is built on modern programming languages, is responsive, and provides a pleasant user experience regardless of the device being used. Client experience “Before coming on WorkHorse, our clients have needed to use multiple softwares such as bookkeeping, quoting, central station software, email, spreadsheets, and more,” says Hayes. “This would cause issues with continuity between softwares. Mistakes are made, appointments are missed, and customers leave.” When building WorkHorse, Hayes and his team interviewed dozens of companies to find out what they were missing and what their pain points were. “There are other CRM and FSM softwares on the market, but the ones that are made for our industry are generally designed for dealer programs and selling contracts,” he says. “Others are designed to bill your RMR and have basic service call functionality.” Alarm companies know that they need RMR to survive, and WorkHorse seeks to make it easy. WorkHorse allows companies to have multiple subscriptions inside a single deal. Single point of data entry WorkHorse ensures a single point of data entry for alarm companies Merchant services come with Auto Updater. If a credit card expires or even if it is canceled, the service will reach out to the issuing bank and get the new number or token necessary to bill customers. This means less time with past due bills and calling on customers to get an updated form of payment. With two-way sync integration into central stations, WorkHorse ensures a single point of data entry for alarm companies. Information used at the time of the sale to create accounts is then pushed right from the tech portal to the central station. Employees can Create, Place Online/Offline, on test, and terminate accounts through the use of WorkHorse. The Workhorse call center, ProConnect.io, will answer phone calls and provide a Tier 1 Tech Support line for clients as a well as a concierge service. Operators will trouble-shoot alarm issues or create a service ticket if they cannot help them (subscriptions to both ProConnect and WorkHorse are needed). Operators will also try and collect money that is past due while assisting clients. Misconceptions in the industry Over the next year the prevailing trends will likely be a large swing from dealer programs to the traditional alarm company, says Hayes. This will make software like WorkHorse incredibly important as companies move from a funding program to managing their in-house sales, RMR, service, and customer retention, he adds. There is a misconception is that an owner/operator can purchase a bookkeeping software and run their alarm company efficiently and effectively. Another misconception is that someone can just turn on a software and know how to use it without any help or guidance, that “playing around” with it at night will be enough to make them proficient users. The software used to run a business should be a top priority. The software used to run a business should be a top priority The WorkHorse team is looking to expand verticals into other environments in the future. WorkHorse is built in a way that could easily expand verticals by making changes to the deal and service call modules. “In mid-2020 we plan on starting Pool Cleaning and Pest Control followed by HVAC, Plumbing, Electricians, and more,” says Hayes. WorkHorse has all in-house developers located in South West Florida. The team is continuously working to create additional features and integrations in order to bring the best user experience to clients and their customers.
The Private Security Industry Act of 2001 gives the Security Industry Authority (SIA) the function of setting standards of conduct in the United Kingdom’s private security industry. Time is winding down to provide input during the SIA’s six-week consultation on a new draft code of conduct for SIA licence holders and applicants for SIA licences. The authority is inviting the industry, licence holders, and anyone with an interest in private security to have their say on the draft code of conduct by taking part in a survey. The consultation will end on 23 February. “The ethos of the code of conduct is that it will improve standards and public safety by setting out the standards of conduct and behavior we expect people to uphold if they are entrusted with protecting the public, premises and property,” says Ian Todd, Chief Executive, Security Industry Authority (SIA). Security's Code of Conduct A code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession In security as in many professions, a code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession. SIA is suggesting Six Commitments of behavior that will apply to all licensed security operatives and to applicants. If the code of conduct is sanctioned by the U.K. Home Office, it would become mandatory and incorporated into SIA’s licensing criteria Get Licensed. A commitment to certain standards of behavior is fundamental to what it means to be fit and proper, and to being part of a profession. The six commitments are: Act with honesty and integrity Be trustworthy Protect the people and property you are entrusted to protect Be professional at work Act with fairness and impartiality at work Be accountable for your decisions and actions “We will review the comments from the consultation once it concludes on 23 February, analyze the results and publish a report on our findings,” says Todd. “The SIA will then use the comments it has received to write a final version of the code of conduct. The introduction of a code of conduct will be subject to final approval by Home Office Ministers.” SIA’s current Standards of Behavior provide guidance on professional behavior but are not mandatory. The draft code of conduct builds on the Standards of Behavior. Upholding SIA's Standards The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act “The majority of licence holders uphold the standards of behavior that the SIA, their employers and the public expect of them,” says Todd. “Their professionalism and dedication keep the public safe and tackle crime. However, there are incidents in which some licence holders do not behave in this way. This minority lower the standard of service the public receives, harm public safety, and bring themselves and the rest of the private security industry into disrepute.” The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act. It is likely that they will be required to enforce the code of conduct should it become mandatory. The draft code of conduct is currently out for consultation and the proposal has been shared widely to licence holders, private security businesses, and enforcement partners encouraging them all to take part. “Once the consultation has concluded, we will analyze the findings from the feedback, produce a report and publish it on our website and share this widely via social media,” says Todd.
The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry on issues involving municipal alarm management for the approximately 18,000 public safety agencies in the U.S. and Canada. Specifically, SIAC works to minimize the number of false alarms, which are a costly waste of resources for law enforcement jurisdictions. SIAC works directly with leaders in law enforcement at the national level, such as the International Association of Chiefs of Police (IACP) and the National Sheriffs’ Association (NSA); and at the state and local levels to provide expertise and proven strategies to reduce unnecessary dispatches to alarm sites while maintaining the police response taxpayers endorse and deserve. The primary tools for alarm management are education on causes of false alarms and implementation of the Model Ordinance for Alarm Management and False Alarm Reduction. SIAC's Model Ordinance SIAC works to minimize the number of false alarmsRecently both the International Association of Chiefs of Police and National Sheriffs’ Association passed resolutions supporting SIAC’s Model Ordinance. This has resulted in dispatch reductions between 40-50% in jurisdictions where all of the model’s recommendations have been followed. Adoption of some version of the Model Ordinance grows each year. It has been adopted nationwide by over a thousand large cities and small towns. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee through state associations of chiefs of police. “This enables the industry to work with law enforcement leadership on a regular basis and in a formalized structure to discuss and address issues,” says Stan Martin, SIAC Executive Director. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee SIAC worked with the industry on new alarm panel standards that made it less likely an end user would trigger a false alarm. The overall dependability and sophistication of alarm systems have also helped make them less vulnerable to outside forces that can trigger the system. Video and audio technology are playing an ever-increasing role with helping monitoring centers evaluate whether a crime is in progress before dispatching the police. Dramatic changes in the industry Kirk MacDowell was recently selected as SIAC’s new Chairman of the Board. He is a dynamic industry leader with more than 39 years of experience in the industry. SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes in the structure of the electronic security industry. The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes Some cities require a "verified response" before police officers are dispatched to an alarm. This requirement is problematic for the end-user as it requires a third-party confirmation that a crime is being or has been committed. This creates a significant delay in response to crime victims needing immediate help. Fortunately for citizens, the vast majority of cities have rejected ordinances that require confirmation that a crime has taken place prior to police dispatch – verified response. Over the past 15 years only about 34 of 18,000 public service agencies in the U.S. have adopted some form of verified response and 10 of those cities ended the policy. It is important to note that despite the rejection of verified response in favor of the Model Ordinance, there are still individuals who lobby aggressively to curtail police response without verification. This requires a continued and aggressive education program to get in front of these lobbying efforts which are based on false premises and misleading statistics, says Martin. Despite SIAC’s success, there are a number of important issues that need to be addressed, says Martin. First is the high turnover among law enforcement leaders and elected officials. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders who are currently rising through the ranks of their departments. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders Coordinating challenges Another challenge has been the attempt by at least one city (Sandy Springs, Ga.) to fine alarm companies for customer-generated false alarms. SIAC is currently coordinating a challenge of that ordinance in federal court with the state alarm association in Georgia. SIAC is also working on plans for more secure funding and on succession planning so the organization can continue to move forward aggressively in the future. SIAC, Inc. is a 501(c)(6) not-for-profit Delaware corporation. The Board of Directors has two members from each of the major North American trade associations: Canadian Security Association (CANASA), The Monitoring Association (TMA, formerly CSAA), Electronic Security Association (ESA), and the Security Industry Association (SIA), and an elected official. SIAC is funded by donations from individual companies. There are no memberships dues, and the organization sells no products or services.
RCP21, a pioneering Community Interest Company (CIC), has used SmartTask to help set up and manage an in-house security operation at Langthwaite Business Park in South Kirkby, West Yorkshire. The workforce management software was adopted to coordinate a full-time team of officers, tasked with protecting 120 businesses located at the site, without the need to increase management and administrative resource within the organization. SmartTask has since enabled RCP21 to deliver a superior security service in the most reliable and efficient manner. Workforce management solution “As managing agents of Langthwaite Business Park, we had previously outsourced the security requirements, but we took the decision to bring the service in-house,” explains Nicola Parker, Operations Manager at RCP21. “We recognized the need for a proven workforce management solution that would underpin our security solution moving forward. SmartTask has given us the visibility and control needed to deliver our service and provide customers with complete peace of mind.” SmartTask is used to manage RCP21’s full-time team at Langthwaite Business Park that provides a range of security services including CCTV monitoring, mobile patrols and keyholding and alarm response. SmartTask-enabled smartphones are used to scan 32 checkpoint tags around the site, so RCP21 has full visibility of mobile patrols that take place. Submit incident reports SmartTask has proved to be a hugely useful tool that is delivering value across our security operation" The software’s SmartForm functionality also enables security officers to electronically view their daily tasks; complete vehicle safety checks; and submit incident reports. In particular, the incident reporting tool allows a security officers on patrol or responding to an alarm response to capture all essential information, including any photo evidence, via a smartphone. This means RCP21 has an electronic record of any incident in real-time, so it can take immediate and appropriate action as well as share relevant details to the customer. Monthly performance reports can be taken from SmartTask, while incident data is included within the business park’s newsletter to provide information in relation to crimes and incidents on the park. Mobile workforce management “SmartTask has proved to be a hugely useful tool that is delivering value across our security operation. The software is simple and easy to use by all staff involved and is effective in enabling us to monitor and deliver our security services to a very high standard,” concludes Parker. Paul Ridden, CEO of SmartTask: “Our cloud-based employee scheduling and mobile workforce management software is highly configurable and scalable, making it an ideal solution for any security operation. Whether you are a top 30 security company or a small in-house team, it is possible to take advantage of SmartTask’s user-friendly, feature-rich functionality to better plan, manage, deliver and report on your security services.”
Located 40 kilometers outside the Russian capital, the new Mercedes-Benz passenger car factory is a showcase for Industry 4.0 automotive manufacturing. To ensure the safety of more than 1,000 employees at the massive facility, Bosch provided a fire alarm and security system, replete with voice evacuation capabilities to meet the specific safety needs of modern-day car factories. Future of car manufacturing Walking into the main manufacturing hall of the new Mercedes-Benz Cars plant in the Moscow region is to see the future of automotive production. Amid glass walls and high ceilings, robots and humans work side-by side to assemble the company’s most popular limousines for the Russian market. From chassis welding to windshield installation to painting, the plant combines all production steps in the same building as part of a ‘one-roof concept’. But from a fire safety perspective, the ‘one-roof concept’ with its tall factory ceilings and open floorplan poses challenges. The reason: Conventional, point-type fire detectors exceed their performance limit when it comes to detecting smoke particles inside such a vast, air-conditioned space. Working closely with the client, experts of Ateksis, the system integrator who lead this project, realized that early fire detection would take a solution just as innovative as the futuristic car factory itself. Safety for automotive factories They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released Additionally, Mercedes-Benz required a centrally controlled combination of intrusion alarm and video security to guard the entire perimeter of the 85-hectare facility with its total of seven buildings. And could the solution be ready within a few weeks for the plant’s grand opening featuring international dignitaries? Working on a tight timeline, the team of Bosch and Ateksis experts selected a fitting smoke detection technology: aspirating smoke detectors. Perfectly suited for large warehouses, the detection units are located within a pipe system that constantly ‘inhales’ samples of air, which are checked for smoke particles via intelligent signal processing technology. As a result, the light-based detectors achieve smoke sensitivities as precise as 0.05%. They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released. electrical interference for reliability Aspirating detectors also pinpoint the exact location of fires, thus reliably preventing major damage in most cases. The system also suppresses environmental factors that typically cause false alarms in car factories, including dust, flying sparks and electrical interference for maximum reliability. “The Mercedes-Benz project is an important reference for us. It shows the level of integration and customer focus made possible by Bosch solutions. Our system has succeeded in meeting the specific needs of automobile manufacturers in the next generation of car production facilities”, said Ivan Konukhin, Bosch Security and Safety Systems Russia. audio sound quality The ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces Amid the acoustic conditions inside the vast production plant, a total of 650 horn and ceiling loudspeakers from Bosch deliver sufficient volume and intelligibility. The horn speakers offer a wide opening angle to broadcast sound across factory floors while offering protection from water and dust, as well as the corrosive effects of industrial environments. What’s more, the ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces of the automotive plant. The cabinet loudspeakers are certified according to the fire evacuation EN54-24 standard for reliable performance under emergency conditions. Overall, this level of audio sound quality directly serves to keep workers secure and informed, especially if evacuation becomes necessary. automatic fire detectors In the bigger picture, the total of 248 aspirating detectors inside the main production hall are centrally networked via Modular Fire Panels 5000 series and connected to more than 2,500 automatic fire detectors installed throughout six additional administrative buildings on the premises. For maximum employee safety, clear voice and audio alarm is provided by the PRAESIDEO Digital Public Address and Voice Alarm System. With Smart Safety Link, the interfaced fire and voice alarm system offers a full control in case of emergency, including the customization of the fire verification time and the automatic process that can ensure a safe phased evacuation. To ensure full visibility of the premises and around-the-clock safety, the video security solution consists of 112 high-definition cameras from Bosch. While bullet and moving cameras secure the perimeter, dome cameras monitor inside spaces. Video Management System Integrated on the Bosch Video Management System, all cameras can be controlled by the on-site security team Integrated on the Bosch Video Management System (BVMS), all cameras can be controlled centrally by the on-site security team inside the control room. Bringing security full-circle, the video system has a direct interface with intrusion alarm system containing over 200 detectors. This seamless integration of all solutions on the Building Integration System (BIS) from Bosch enables a host of additional functions: for instance, the system alerts the control room when a fire detector is triggered and sends live images from the nearest camera for full situational awareness. Aspiration smoke detector As Ivan Konukhin at the Regional Representative Center North-West and South Russia at Bosch Security Systems explains: “The cooperative functionalities between BIS and BVMS components were programmed according to customer requirements in an uncomplicated manner via macros, which also supported a timely installation.” Bosch Security System’s solution consists of: FPA-5000 Modular Fire Panel Solution Smart Safety Link License key for voice alarm Aspiration smoke detector 2 pipe systems AVENAR detector 4000 PRAESIDEO Digital Public Address and Voice Alarm System Metal Fire Dome Cabinet loudspeaker, metal, rectangular Horn loudspeaker, 10W, 6x10" Ceiling loudspeaker, 6W, ABS MAP 5000 family IP4000i, 5000i and 6000 cameras AUTODOME IP Cameras Access Control System Bosch Video Management System Building Integration System
Monitoring campuses to protect students, parents, and staff means balancing proactive measures with effective response to incidents. Ava Unified Security (previously Vaion) helps one identify unwanted events like vandalism, intrusion, loitering, parking violations, or people involved in suspicious acts so that one can focus on what truly matters: delivering positive academic experiences. Anomaly detection in real-time Powered by Spotlight™, the dynamic video view with instant notifications draws attention to the relevant video feeds with potential risks. Identify intruder break-ins, loitering, guns, or unauthorized vehicles in real-time. Operators can switch between live and playback with the click of a button. Smart Presence™ depicts people as dots on maps and live footage of persons of interest. Combine with access control to monitor hallways for a complete picture of loitering, theft, or even active shooter scenarios. Gain insights on occupancy counting in classrooms and libraries for better energy efficiency. Accurate search and integrated audio analytics Smart Search™ allows operators to search by appearance, events, objects, similarity, or image Smart Search™ allows operators to search by appearance, events, objects, similarity, or image. Recovering lost or stolen objects, such as laptops or vehicles, identifying suspicious people inside or just outside campus, locating missing students now take minutes instead of hours. With the same or fewer resources, operators can provide compelling evidence and mitigate liability risks. Ava Dome and Ava 360 perform perform exceptionally well either indoors or outdoors and in any lighting conditions making them suitable for different settings, such as classrooms, assembly halls, sports halls, or dormitories, and blend discreetly as interior fixtures. The integrated audio analytics identifies sound patterns and sends instant alerts in cases of broken glass, screaming, and gunshots. Key benefits Build from existing investment while retaining privacy Integrate with existing cameras Add access control to extend capabilities Video & metadata storage remain on-premises Full site survivability and local access Save storage and money Automatically decrease storage demands from all the recordings Reduce bandwidth consumption on critical links with AI-based optimization Pay for what one needs, when one needs it, without the hassle of complicated licensing Safe and welcoming environment Capture every detail at all times with discreet security cameras Increase situational awareness Enable preventative action through immediate response time Collaboration and flexible licencing Globally access live feeds and recordings Share video links with law enforcement authorities to facilitate ease of investigations Maintain the integrity of records with video watermarking With a simple licensing model, Ava always includes services and software upgrades. One no longer has to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces that NC State University in Raleigh, North Carolina, has installed new turnstiles as part of a major renovation of their D. H. Hill Library. Founded in 1887 as a public, land-grant, research university and part of the University of North Carolina system, NC State is the largest university in the Carolinas. The university is home to two libraries: the D. H. Hill Jr. Library on the North Campus and the James B. Hunt Jr. Library on Centennial Campus. Different common spaces The Hill Library houses over one million volumes of the libraries' total collection and offers a number of different common spaces for work and study. A recent renovation transformed the interior with the addition of an open grand staircase. The stairs connect the second and third floors to the lobby and flood the space with natural light. Two of the new turnstiles are for visitors entering the library, and the other two are dedicated for those exiting As part of this renovation, four Boon Edam Lifeline Speedlane Swing optical turnstiles were added to the Hillsboro Street entrance on the north side of the building. Two of the new turnstiles are for visitors entering the library, and the other two are dedicated for those exiting. The Hill Library is open to the general public during certain hours, with visits limited to the campus community the rest of the time. Exterior swinging doors lock During the day when the library is open to all, the turnstile barriers are kept open for free entry and exit. After general hours, the exterior swinging doors lock and authorized visitors must use their ID badges to unlock the doors and subsequently pass through the turnstiles. The Speedlane Swing turnstiles are known for their ultra-slim, stylish cabinets as well as their user friendly and responsive LED lighting system, which turns on when users approach and shows where to present their badge. The turnstiles offer support to security staff in the library lobby, helping ensure that no unauthorized individuals can access the library during non-public hours. If tailgating occurs, the turnstiles sound an alarm and security staff can respond immediately. Avoiding barrier contact On a typical day during the school semester, the turnstiles process approximately 6,000 to 7,000 students and other visitors. During the summer, this number drops to 400, but during exam time, usage peaks with up to 10,000 people entering the library every day. The campus population had no difficulty adapting to the new turnstiles at the Hill Library The campus population had no difficulty adapting to the new turnstiles at the Hill Library, as there were already turnstiles in place at the Hunt Library. According to Travis Tyo, the Director of Facilities for the Libraries, the new Speedlane Swing turnstiles were an improvement from the older turnstiles, due to their accurate ability to sense tailgating attempts and avoid barrier contact with fast moving users. Implementing another installation The University is already implementing another installation of Speedlane Swings at the south entrance to the Hill Library. The new entry will match the layout of the north entrance, with four turnstile lanes and a security guard on site. A future installation at the Hunt Library is also in the works. Travis says of the installation, “We worked closely with our Security and Applications Technologies departments here on campus; we tested different products and everybody liked the Boon Edam turnstiles and the ability of the company to respond whenever we need them. Ultimately it is much simpler and more efficient to have people badge in than to have a security guard look at IDs as each person enters the library.”
On an average, approximately 400,000 tons of cargo passes through Malpensa Airport every year, located in Milan, Italy. The Alha Group is the major cargo handling agent at the 25,000-square-meter site, which houses 32 airlines, with 34 large cargo aircrafts. Handling cargo at Malpensa Airport In 2012, Malpensa Cargo became a certified competence and administration center for air cargo and road transport, especially for premium-quality small goods, such as smartphones, tablets, designer clothing and accessories. The Alha Group chose a system from MOBOTIX AG, a renowned manufacturer of cameras in Germany Since then, passenger transport in Malpensa has increased exponentially, which has driven the Alha Group to procure a video surveillance system that offers the very highest level of protection. The Alha Group chose a system from MOBOTIX AG, which has been manufacturing cameras in Germany for over 20 years. MOBOTIX thermal imaging cameras "We have installed nine MOBOTIX thermal imaging cameras at our sites in Malpensa, Rome Fiumicino, Segrate, Pioltello, Verona and Prato to strategically cover the key traffic areas," said Marco Alesi, Security Manager at the Alha Group. The MOBOTIX thermal systems were installed by Alha's business partner, Trium at the beginning of March 2020, in response to the COVID--19 pandemic. Alha can now reliably control access to its offices and warehouses. Virtual security cage The project also saw the construction of a ‘Virtual security cage’ that Alha uses to protect the valuable goods of its customers that are being transshipped against theft. An infrared alarm system delineates a defined area and the video-based system triggers an alarm, as soon as an intruder enters this area. With the help of live images from the camera, the uninvited guest can be identified and stopped immediately. The Alha Group has consequently replaced an expensive conventional locking system with an advanced digital video solution and sped up routine work processes at the same time. The MOBOTIX cameras are integrated into the burglar alarm system, which is controlled using security badges. A detailed log is kept to track when the system is deactivated. Integrated thermal imaging solution "We were, and still are, extremely satisfied with the MOBOTIX cameras we installed previously," emphasizes Marco Alesi, adding "Not only because of their high quality and durability, but also because of the numerous integration and development options we've been able to make use of over time. This is a huge advantage, and one that applies to our most recent installation too." The timesheet system has an integrated thermal imaging camera that is activated, every time an employee signs in The timesheet system has an integrated thermal imaging camera that is activated, every time an employee in the warehouse and office access area signs in. A recorded message asks the employee to look into the camera and remove any glasses or head coverings that they may be wearing for proper identification. If the camera measures their body temperature as being 37.5 degrees Celsius or less, a green LED on the camera flashes to allow access to the cargo bay. If the temperature measured is higher than 37.5 degrees Celsius, a flashing red light and another recorded message informs the employee to wait for a specialist member of staff to take their temperature using a clinical thermometer. VoIP intercom system At the same time, the system sends an email with a dated camera screenshot, stored personnel data and the measured temperature. The VoIP intercom system integrated into the camera enables Alha security staff to immediately communicate with employees who were temporarily stopped when entering the company building. "The extra checks are making us all safer during this crisis. We see the ability to contact someone immediately after they receive negative results for a preliminary test as an intrinsic part of our duty of care toward our employees," explains Alesi.
Samson Security has adopted SmartTask to support the rapid growth of the business, which has seen the company treble in size in less than a year. The workforce management software is initially being used for electronic proof of attendance, across more than 400 security officers and engineers that deliver a wide range of services, including manned guarding, mobile patrol, alarm response and FM services. Advanced guarding management and monitoring “We needed an advanced guarding management, monitoring and reporting solution that could adapt and expand to our changing requirements as we grow,” explains John Richards, Operations Director at Samson Security Ltd. John adds, “Our mobile and manned services now span the North West, the Midlands and North Wales, so SmartTask will give us the visibility and control needed to coordinate and protect our team, while maintaining our excellent service standards.” SmartTask workforce management software Samson Security selected SmartTask because of the simplicity and flexibility of the system SmartTask will replace a previous time and attendance solution, which no longer met the needs of the business. Having undertaken a review of the marketplace, Samson Security selected SmartTask because of the simplicity and flexibility of the system. The app-based nature of the system means that employees can use the software via a personal or work smartphone, while providing the opportunity to use additional functionality such as patrol monitoring and electronic forms. Security guards are using either a SmartTask-enabled smartphone or an onsite landline to accurately record the start and end times, as well as any required check calls. The app captures a timestamp and GPS location for accurate customer reporting and SLA monitoring for alarm responses. Controlled access Samson Security also uses the control room dashboard at its National Command Center to gain complete visibility of any exceptions, while mobile and office managers have controlled access for their individual areas of responsibility. John adds, “We are already exploring other ways of using SmartTask, which will enable us to consolidate much of our employee scheduling and workforce management requirements into a single system. We have set up bespoke smart forms, so will shortly be rolling out electronic incident reporting to our team, replacing our existing paper-based process.” Scalable, flexible solution He further said, “The scalable and flexible nature of SmartTask means we can take a phased approach, avoiding operational disruption and not overburdening our internal resources.” Paul Ridden, Chief Executive Officer of SmartTask commented, “We have developed our software to meet the precise needs of security and FM companies now and in the future. Possessing high levels of configurability and scalability, backed by first-rate service and support, SmartTask can support the long-term success of our customers in-line with their business and operational priorities.”
Round table discussion
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Security alarm systems: Manufacturers & Suppliers
- DSC Security alarm systems
- Vanderbilt Security alarm systems
- LifeSafety Power Security alarm systems
- TruPortal Security alarm systems
- RISCO Group Security alarm systems
- Bosch Security alarm systems
- Climax Technology Security alarm systems
- OPTEX Security alarm systems
- Visonic Security alarm systems
- Alpro Security alarm systems
- Nedap AEOS Security alarm systems