Security alarm systems
Videonetics, the world’s first AI & Deep Learning-powered Unified Video Computing Platform (UVCP) provider, has announced the integration of its Intelligent VMS 3.0 software with Perimeter Intrusion Detection System (PIDS) of Future Fibre Technologies (FFT). Technology integration The technology integration will empower users to monitor zone alarms and videos from a centralized system, providing further situational awareness, maximizing preparedness and response to perimeter breach o...
Hikvision, a manufacturer and supplier of security products and solutions is launching a special, limited-time promotion on the company’s next generation of intelligent AcuSense PCI series cameras. Employing advanced deep learning algorithms, AcuSense cameras can accurately distinguish people and vehicles from other moving targets such as animals and shadows in real-time, vastly improving detection accuracy while reducing costly false alarms. Improve safety and security “Our next...
Johnson Controls, the pioneer in smart, healthy, and sustainable buildings, and architect of the OpenBlue digital connected platforms, releases the newest version of the Tyco Kantech EntraPass security management software. EntraPass version 8.30 features additional support for Tyco DSC PowerSeries intrusion alarm panels, including a fully functional virtual keypad, enhanced support for EntraPass web macOS functionality, cybersecurity updates, and other optimizations for a more streamlined user...
Agent Vi’s AI-Powered video analytics software platform- innoVi is seamlessly integrated and embedded within Milestone’s XProtect video recording and management platform, enabling end-users to operate through a single client application. The integration allows customers to receive, display and manage events of interest in real-time from multiple video sources. The events are then sent as alarms to Milestone’s XProtect Smart Client. Through the innoVi- XProtect int...
Calipsa, a provider of deep-learning powered video analytics for false alarm reduction, announces the compatibility of its false alarm reduction platform with Milestone Systems' XProtect corporate VMS designed for use by organizations such as airports and train terminals. XProtect corporate's enterprise users deploy large numbers of cameras and will benefit from Calipsa's 90 percent false alarm reduction rate. Alarm reduction platform When XProtect corporate receives an alarm from a connected...
In the past, security managers were primarily concerned with global terrorism. That has changed with the COVID-19 pandemic threatening the health of passengers at airports. Even if the number of passengers remains at a low level in many airports, surveillance won’t become any less complex. In fact, the opposite is true. Hygiene regulations raise new requirements for passenger processing and control. Reason enough for security managers to rethink airport security methods and evaluate how s...
LEONARDO S.p.A. has announced that it has signed a purchase agreement for 25.1 percent of the shares in HENSOLDT AG with HENSOLDT's majority shareholder, Square Lux Holding II S.à r.l., a portfolio company of investment funds advised by KKR. HENSOLDT, thus, will gain one additional major shareholder and future potential strategic partner. The sale is subject to usual regulatory closing conditions. LEONARDO investment in HENSOLDT Square Lux Holding II S.à r.l. will still hold around 18% of HENSOLDT, after completion of the sale to LEONARDO S.p.A. Square Lux Holding II S.à r.l. will still hold around 18 percent of HENSOLDT, after completion of the sale to LEONARDO S.p.A. and after completion of the sale to Kreditanstalt für Wiederaufbau (KfW), which acts on behalf of the German Federal Government. Square Lux Holding II S.à r.l. had agreed to sell a stake of 25.1% to KfW in March 2021. Thomas Müller, the Chief Executive Officer (CEO) of HENSOLDT, said “We very much welcome LEONARDO's investment in HENSOLDT. With this transaction, we will have a second long-term anchor shareholder in our company and a strong potential strategic partner with whom we are already successfully working together on a number of programs.” Key player in the European defense market Thomas Müller adds, “As a leading provider of sensor solutions for defense and security applications, it has always been our goal to play a decisive role in the consolidation of the European defense market. We see multiple opportunities of working together with LEONARDO, to further support our successful strategy and to be able to strengthen HENSOLDT's long-term growth.” As an independent, listed company, HENSOLDT has successfully expanded its market position in recent months. As an important technology partner and strategic supplier of key national technology, HENSOLDT plays a significant role in decisive areas of the German defense and security sector. The shareholder structure, therefore, safeguards both German security interests and the independence of the company.
On May 20 at 12:00 p.m. EEST, Ajax Systems will hold a big virtual presentation of new products. Partners and users will be able to see the new devices that the company has been working on lately and learn everything about them. Ajax Special Event 2021 This time, the show will be broadcasted in 13 languages, including English, Spanish, Italian, Turkish, French, German, Dutch, Arabic, Portuguese, Polish, Romanian, Ukrainian, and Russian. Attendees will also have the opportunity to choose their preference of language, before the presentation starts. The Ajax Special Event is completely free to attend. In order not to miss the presentation, interested individuals can register online on the official website and add the event to their calendar. Hub 2 Plus with LTE support and MultiTransmitter It will be the second Special Event by Ajax Systems. Last year, the company presented a vast range of new features, ranging from two-factor authentication to the much sought-after data import functionality from one hub to another. In addition, Ajax team introduced the new Hub 2 Plus with LTE support and the MultiTransmitter, a module for renovation of old wired alarms, which lets integrating wired detectors into the Ajax system and controlling them via the app.
Vector Flow, the recently launched innovator of AI data-driven physical security solutions, has announced two new appointments to support the company’s rapid growth and expanding sales activities. Mr. Kyle Elliott will oversee global sales and business development as the Vice President of Sales and Mr. Jerry Kane has been appointed as the new Director of Sales, responsible for the company’s sales channel partner strategy and revenue growth. Data-driven physical security solutions “Vector Flow is delighted to add these seasoned sales professionals to our growing team,” said Ajay Jain, Founder and CEO of Vector Flow, adding “Kyle and Jerry’s familiarity with enterprise identity, access and other physical security system technologies, and their long-standing challenges, provides the ideal foundation to support and leverage Vector Flow’s data-driven physical security platform and solutions.” Previously, Kyle Elliott was Vice President of HID Global’s Identity and Access Management Workforce solutions sales organization, where he helped drive the organization’s rapid increase in market share and revenue, by expanding the North American and international sales team, along with channel partners. SOC PSIM and sales expert Prior to HID Global, Kyle was North American Director of Sales with Vidsys, a SOC PSIM solutions provider. Kyle holds a BA degree from the University of Southern California, as well as certificates from many advanced sales strategy and training accreditation programs. Prior to joining Vector Flow, Jerry Kane was the Senior Sales Director at Vidsys, Inc., a provider of converged security and information management solutions, where he was responsible for the company’s channel and partner program in North America. Physical security and software industry veteran Vector Flow’s innovative data-driven physical security platform is built on advanced AI algorithms Prior to Vidsys, Jerry was part of several successful startup companies, including MuleSoft, Vistascape, part of SIEMENS and TIBCO Software, and has over 20+ years of experience in the software industry and 15+ years in the physical security space. He holds a BA degree from the University of Massachusetts-Dartmouth, as well as many Computer Science certificates and accreditations. Vector Flow’s innovative data-driven physical security platform is built on a foundation of advanced AI algorithms, which are capable of processing and analyzing vast amounts of data from otherwise disparate security systems, data stores and input devices. Security Orchestration, Automation and Response The innovative solution simplifies and improves physical security operations, while delivering tangible ROI and lowering TCO, enabling new levels of Security Orchestration, Automation and Response (SOAR). Vector Flow unifies PIAM, surveillance and security systems with alarms, event management and automated ‘playbook’ workflows in real time, in order to deliver actionable insights.
VdS 2540 for reliable CIE comprehensively revised guidelines, includes precise performance characteristics for risk minimization in the control and activation of alarm valve stations, and in fault monitoring. The ‘brain’ of every fire alarm system is the Control and Indicating Equipment (CIE). This is where all information from the monitored areas comes together, where processes such as alarming, clearing an object and, above all, the triggering of connected extinguishing systems are coordinated. Product Guidelines VdS 2540 VdS (VdS Schadenverhütung GmbH) has been testing these devices since they were first used in Europe VdS (VdS Schadenverhütung GmbH) has been testing these devices since they were first used in Europe and is bundling the experience gained over all this time into the product Guidelines VdS 2540. The compact publication (featuring 16 pages) has now been extensively revised. “New features include a separate test for degraded transmission paths”, explains Frank Schäfer, Product Manager at VdS Schadenverhütung GmbH (VdS), who is responsible for the update. Fire brigade indication panels Frank Schäfer adds, “And as a direct customer request, we have now also specified requirements for the switch-over valves for the triggering of alarm valve stations and added performance characteristics for fire brigade indication panels. This makes it easier for manufacturers to produce high-quality CIE, while installers, operators, insurers as well as authorities can fully rely on its safe application.” Reliable risk minimization and safeguarding The new VdS 2540 are provided free of charge by Europe's largest and oldest testing institute for fire protection technology. VdS compresses loss prevention experience from thousands of laboratories, as well as on-site tests in the product Guidelines 2540, ‘Control and Indicating Equipment’, with the aim to offer reliable risk minimization, as well as safeguarding for manufacturers, installers, operators, insurers, and authorities.
Euralarm, the globally renowned fire and security solutions organization, has announced support for a resolution of the European Parliament that asks for quick solutions from the European Commission to improve the standardization of construction products, while also pushing for a transition to a sustainable and more circular economy. Standardization of products MEPs (Members of the European Parliament) have recently called in the resolution, adopted with 686 votes in favor (4 votes against and 5 abstentions), on the European Commission to find a quick and viable way, in order to improve and speed up the standardization process for construction products. Of the 444 existing harmonized standards for construction products, only 12 new ones have been issued, since the Construction Products Regulation was adopted in 2011, hindering the free movement of products in the European Union. Construction Products Regulation With 686 votes in favor of the resolution, the European Parliament has taken a clear position on the upcoming revision of the regulation by the European Commission. “The Construction Products Regulation must be made fit for the future with a view to digitalization and sustainability,” said rapporteur Christian Doleschal. Prior to the decision-making process for the European Parliament, the chair of the Euralarm Fire Section presented a paper on the ‘Impact of the Construction Products Regulation on Standardization’ in the active fire safety industry. The presentation was held during an Informal meeting of the Working Party Technical Harmonization (Construction Products) of the German EU Council Presidency - Construction Products Regulation.
Hikvision launched newly updated HikCentral Professional 2.0 security software (“HCP 2.0”), which blends feeds from multiple systems onto a single platform. HCP 2.0 can be configured to link video security devices, alarm and access control systems, and more, including third-party systems through the OpenAPI – for easy centralized management of a variety of security and business applications. Frank Zhang, President of Hikvision’s International Product and Solution Center, said, “This is an important release for us, and a significant leap forward in our security management software offerings. HikCentral Professional 2.0 will help our customers manage a variety of activities seamlessly on one platform. We’re excited to see the value it delivers.” Nine key applications HikCentral Professional 2.0 integrates multiple business and security systems with nine key applications, making it valuable to a wide variety of common security and business scenarios seen in buildings, factories, stores, apartments, and the like. Among them, video cameras and security alarms are integrated into the platform to deliver fluid live viewing and timely alarm notifications. Streamline entrance management Furthermore, access control can be included to assign a variety of access permissions using multiple methods including facial recognition, ID cards, fingerprints, QR codes, and more. HCP 2.0 also allows various personnel such as HR managers to set flexible attendance rules, including schedules for shift work while delivering full reporting facilities. Additionally, site managers can also employ vehicle management and visitor management applications to streamline entrance management as well as on-site parking. Intelligent analysis and reporting Users can further rely on HCP 2.0 with intelligent analysis and reporting – an application that collects data and transforms it into easy-to-understand reports and dashboards. This includes flow status, people density, and more. HCP 2.0’s system application visualizes alarm and device notifications for targeted action in unusual events For systems management teams, HCP 2.0’s system maintenance application visualizes alarm and device notifications, as well as the full network and device topology for rapid, targeted action in unusual events. Digital signage systems Last but not least, HCP 2.0 lets users deploy digital signage systems to display advertisements and announcements. The software comes with eight pre-installed templates for users to present content optimally. This can be crowd numbers and temperature status in a supermarket scenario, for example. Greater operational efficiency With HCP 2.0, users will flexibly unite applications and build a tailored system to match their security and business needs. The unified approach not only creates greater situational awareness of their security environment but also reduces real day-to-day management resources previously required by disparate systems. For example, users can integrate visitor management with vehicle management to enhance daily operational efficiency for building facilities. Facility managers can register visitor information into the HCP 2.0 system, and – by linking to an ANPR system – can set visitors to be automatically permitted into on-site parking. Similarly, the system can also pre-authorize visitor access to specific areas of an organization’s premises. Personalized user experience HikCentral Professional 2.0 can be tailored to deliver specific information to assigned users HikCentral Professional 2.0 can be tailored to deliver specific information to assigned users. The system comes with three pre-configured roles: “system installation and management,” “security control and management,” and “attendance management.” In this way, HR staff can customize their feed to show employee attendance status, for example, while management staff can monitor the security of the facilities. There is also one custom role, which can be tailored to specific needs. Perhaps most importantly, HikCentral Professional 2.0 features an improved user interface. Users can customize the control panel to suit their viewing preferences, simply dragging and dropping key video and device feeds into the dashboard, adjusting where they sit and how they look. Dynamic and intuitive user interface HCP 2.0 also incorporates multiple visualized dashboards that display key security and business insights generated from various applications, facilitating decision-making processes with more accuracy and efficiency. What’s more, users apply 3D E-maps that vividly demonstrate device monitoring statuses in different locations, and manage instant alerts interactively by clicking and watching associated live videos and other integrated system information. Easy setup and maintenance HCP 2.0 is easy to deploy and quick to set up for a multitude of projects with single applications HikCentral Professional 2.0 is easy to deploy and quick to set up for a multitude of projects with single applications. Customers with minimum system requirements of Intel i3-CPU and 8 GB RAM can get up and running with a one-click installation procedure that makes HCP 2.0 setup a breeze. Operations guidance wizards are conspicuously displayed to support users in configuring key applications. In addition, the visualized health monitoring dashboards enable more focused and efficient IT maintenance.
For decades, cable theft has caused disruption to infrastructure across South Africa, and an issue that permeates the whole supply chain. Here, Ian Loudon, international sales and marketing manager at remote monitoring specialist Omniflex, explains how new cable-alarm technology is making life difficult for criminals and giving hope to businesses. In November 2020, Nasdaq reported that, “When South Africa shut large parts of its economy and transport network during its COVID-19 lockdown, organized, sometimes armed, gangs moved into its crumbling stations to steal the valuable copper from the lines. Now, more than two months after that lockdown ended, the commuter rail system, relied on by millions of commuters, is barely operational.” Private security firm Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa. In 2001, SABC TV broadcast a story following two members of a private security firm working for Telkom, a major telecoms provider. In the segment, the two guards, working in Amanzimtoti on the south coast of KwaZulu-Natal, head out to investigate a nearby alarm that has been triggered. They reach a telecoms cabinet and discover that it has been compromised, with the copper cable cut and telephone handsets strewn across the ground. In the dark, they continue to search the area when one of the guards discovers the problem: 500 metres of copper wire has been ripped out. In their haste, the thieves have dropped their loot and fled. Widespread cable theft Had they managed to get away, they would have melted the cable to remove the plastic insulation and sold the copper to a local scrap dealer for around 900 Rand, about $50 US dollars. For the company whose infrastructure has been compromised, it may cost ten times that amount to replace and repair the critical infrastructure. The disappointing takeaway from this story is that two decades on from this incident the country still faces widespread cable theft, whether it’s copper cables from mines, pipelines, railways, telecoms or electrical utilities. In fact, the South African Chamber of Commerce and Industry estimates that cable theft costs the economy between R5–7 billion a year. The answer to the problem must go further than the existing measures used by companies. Detect power failure Most businesses already invest in CCTV, fences, barriers and even patrol guards, but this is not enough. Take the mining sector, for example. These sites can be vast, spanning dozens of kilometres - it’s simply not cost effective to install enough fences or employ enough guards or camera operators. As monitoring technology gets better, the company has seen site managers increasingly use cable alarms in recent years that detect when a power failure occurs. The idea is that, if one can detect a power failure, they can detect whether the cable has been cut The idea is that, if one can detect a power failure, they can detect whether the cable has been cut. The problem is though: how does one distinguish the difference between a situation where a cable has been cut intentionally and a genuine power outage? Power outages in South Africa are an ongoing problem, with the country contending with an energy deficit since late 2005, leading to around 6,000 MW of power cuts in 2019. Remote terminal units Eskom Holdings SOC Ltd., the company that generates around 95 per cent of South Africa’s power has already warned of further blackouts as the company works to carry out repairs to its power plants. According to a statement on the company’s website, “Eskom spends in the region of R2 billion a year replacing stolen copper cables." The result is that criminals take advantage of the gaps in power to steal cable, timing their robberies to coincide with the published load shedding schedules. The basic alarms used to detect power outage won’t recognize the theft because they register a false-positive during a power cut. By the time the power comes back on, the deed has been done and the criminals have gotten away with the cable. The good news is that recent breakthroughs in cable monitoring technology are helping tackle just this problem. New alarms on the market now combine sophisticated GSM-based monitoring systems that use battery powered remote terminal units. Legitimate supply chain Unlike the basic alarms that look for the presence or absence of power, these new systems monitor whether the cable circuit is in an open or closed state. In the event of a power outage, the unit continues to run on battery power and can detect if a cable has been cut, sending a priority SMS alert to the site manager immediately, giving them a fighting chance to prevent a robbery in progress. Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem across the supply chain in South Africa. In recent years, the combination of unscrupulous scrap dealers, the alleged involvement of large scrap processing companies and lax penalties meant that much of the stolen copper ended up back in the legitimate supply chain. However, recent changes in the law have sought to take a tougher stance on copper theft. Alarm monitoring technology According to the Western Cape Government, “The Criminal Matters Amendment Act, regulates bail and imposes minimum offences for essential infrastructure-related offences." The act, which came into effect in 2018, recommends sentencing for cable theft, with the minimum sentence for first-time offenders being three years and for those who are involved in instigating or causing damage to infrastructure, the maximum sentence is thirty years. It seems to be working too. In January 2021, the South African reported that a Johannesburg man was sentenced to eight years behind bars for cable theft in Turffontein. While the longer-term outlook is a positive one for industry, the best advice for businesses seeking to alleviate the problem of cable theft in the immediate future is to invest in the latest cable-theft alarm monitoring technology to tackle the problem and make life difficult for criminals.
Many businesses will already have some form of security in place, but what is often overlooked is the need to assess whether the protection is suitable enough for the nature of their business, or efficient enough for the premises they are utilising. As the country continues to face unprecedented times, it is crucial than ever to protect your business, particularly outside working hours or if at present the majority of your workforce is working remotely for the foreseeable future. So, what can you do to ensure that you’re protected? Intruder prevention For many intruders, bypassing the security of a building will just be target practice and an opportunistic attempt to see what they can find, often without any real plan or knowledge of the building’s precautionary measures. With this in mind, it can be worth pre-empting any unwanted entries with a more sophisticated process: fogging. A fogging system is a fast-acting deterrent for intruders. When activated, a thermally generated white smoke-like substance instantly delivers a dense, impenetrable As the country continues to face unprecedented times, it is crucial than ever to protect your business, particularly outside working hoursfog that covers the surface area where valuable equipment and other contents are kept, obscuring them from sight, and protecting them from the possibility of theft or damage until authorities arrive on the scene. Fogging system provider, Bandit UK works with ADT Fire & Security to enhance security measures, providing additional safeguarding for business properties. Putting this in place can mean that considerable cost, time and effort can be saved in the event of an attempted break-in, whilst disruption to business is reduced to a minimum. For small business owners, the financial burden of enhancing your security may seem unfeasible at the moment. In order to make a more informed decision, here are some other useful steps you can adopt, whether you are open or temporarily closed for business. Secure your equipment Simple routine checks such as regular property and equipment audits can help keep track of equipment and help to allocate responsibility for particular items to individual employees. Tagging computers and recording details of serial numbers will also help track down stolen equipment but is also useful for contacting IT services in the event of theft to ensure confidential information doesn’t fall into the wrong hands. Consider securing expensive equipment to floors or walls, this will make it difficult for opportunistic thieves to dash around grabbing expensive computing equipment for example. The right locks There should be a robust locking system in place, with a minimum of two locking points on external doors that meet British Standards. While you’re not physically on the premises, all internal doors, including fire doors, should be closed. Ensure that you have recorded each member of staff that has keys and therefore access to the building; this should be kept to a minimum for monitoring purposes. Perhaps it’s been several years since the locks were changed, and personnel have changed or sets of keys have gone missing. A locksmith can quickly and cost-effectively change your locks if necessary. Window glazing It may be a good idea to consider additional glazing on your windows. Installing laminated glass provides an extra layer so that windows cannot be easily tampered with or broken. Boarding of windows is another option and will completely prohibit outsiders from having a direct view into the building – this could be a cost-effective measure if you are temporarily closed. Review your monitored intruder alarm system So, you already have CCTV installed on your premises. From a maintenance point of view, how long has it been since you tested your system? Although you can review simple things like whether the lens is still picking up clear visuals, it may be best to ask an engineer from your security provider for advice on how to service There should be a robust locking system in place, with a minimum of two locking points on external doorsyour technology. It may be some years since you first installed the system, so it is worth checking if there have been any app developments, as this is a fantastic way to monitor your premises without being there. Also be sure to check you have adequate storage so that you are able to browse through previous footage if needed. Some companies use a cloud-based service; do you know what yours uses? Don’t forget fire hazards Electrical items can also be the biggest culprit of fires. In the first instance, the mains integrity should be checked, gas and electricity lines (for frayed or faulty wires), as well as plumbing. All electrical appliances should be repaired or installed by a certified firm to reduce risk of electrical fires, and it’s advised that a routine PAT test should be implemented every twelve months. It is a legal requirement for UK businesses to carry out a Fire Risk Assessment (FRA) - this identifies a host of fire-related pitfalls, such as fire hazards, the people at risk if fire strikes, emergency exit plans and even covers staff training. Ensure you have this document regularly updated (and in an easily accessible place) to ensure that all bases are covered. Invest in external lighting If your building is in a poorly lit area, it’s a good idea to invest in external lighting. You won’t need planning permission for this but use your best judgment to decide on the area you want to light up, and what gradient you’d like to use. It is best to have a system installed that automatically switches on when visibility is reduced. This also goes beyond just security; entrances and exits, ramps, pavements, and car parks should be well lit for additional safety for staff and visitors. Property maintenance Your business may be operating at a reduced level or potentially even closed in line with the government’s lockdown recommendations. It may still be important to have a senior member of staff visit the site at regular intervals to ensure that everything is in order. There’s never an ideal time to review your security, but it’s important to do it regularly to help pre-empt any potential opportunistic burglars and give yourself complete peace of mind.
Security and surveillance applications require accurate, scalable, and cost-effective solutions. However, traditional security technologies pose many risks and challenges including frequent false alarms and high costs—both for system installation and ongoing maintenance. Because of the shortcomings of these technologies, many organizations have adopted 3D LiDAR-based security solutions to improve reliability, reduce false alarms, and streamline their operations. Integrated with cameras and video management systems (VMS), LiDAR enhances security by reducing false alarms, allowing for real time tracking of intruders, and enabling automated PTZ camera control for a more comprehensive security system. Choosing the right technology for security and surveillance The most critical element of any security solution is its ability to quickly, accurately, and reliably identify potential threats so that security personal can be promptly mobilised to respond to said threat. Advanced security capabilities and reduced incidence of false alarms are especially critical when protecting sensitive areas like critical infrastructure and other limited access locations However, many traditional security technologies often fail to deliver the low rate of false alarms necessary to reliably protect secure areas, at any time of the day or night and in any weather condition. For example, cameras can be blinded by bright lights and cannot operate in dark conditions. In addition, cameras and other sensing technologies area also affected by harsh environmental factors like high wind and heavy rain—both of which can lead to security failures. The risks posed by an ineffective security system are high The risks posed by an ineffective security system are high. False alarms are costly, wasting valuable time and resources to respond to nonexistent threats. In addition, security personnel may experience alarm fatigue due to frequent false alarms, which can lead to latency in their response to real threats. Because of the consequences of false alarms and other security failures, security solution providers are searching for technology alternatives which can enhance the accuracy of their current Perimeter Intrusion Detection (PID) system as well as interoperate with the existing VMS platform managing their security devices. How LiDAR works differently LiDAR, which stands for Light, Detection, and Ranging—is a time-of-flight sensing technology that pulses low-power, eye-safe lasers and measures the distance between the sensor and objects based on the light reflections off those objects. The resulting sensor data is used to generate a centimeter-level accurate 3D point cloud image, providing spatial location information to reliably detect and track moving targets, such as intruders. LiDAR sensors are operational in various weather conditions and perform reliably in both very bright and extremely dark conditions. The anatomy of a LiDAR-based security solution A LiDAR-based security solution starts with the LiDAR sensors, but it does not end there. In any security application, several LiDAR sensors will be mounted at various points throughout the area, gathering environmental data to provide a complete 360-degree view of the protected space. A 3D perception software platform using artificial intelligence algorithms will detect, track, and classify objects based on the rich point cloud data received from the LiDAR sensors. From there, the object information is routed in real-time to a VMS, which may also compile data from cameras (including CCTV, IP cameras, etc.). The LiDAR-based object information can be used to enable automated PTZ control based on the target’s position, keeping the target in view of security cameras at all times. This provides a complete and nuanced perspective of the area being surveilled. LiDAR technology can pinpoint the exact location of a threat on a map, enabling quick and effective responses when and where they are needed. The fully integrated solution also empowers security personnel with the tools and information they need to respond to threats confidently, thanks to an extremely low risk of false alarms. LiDAR enhances security, reduces false alarms, and enables timely, effective responses LiDAR-based systems are becoming increasingly popular choice for security and surveillance applications due to the technology’s accuracy, reliability, and cost-effective operation. Overall, LiDAR enhances security, reduces false alarms, and enables timely, effective responses to security threats compared to security cameras alone. 4 key advantages of LiDAR for security LiDAR provides many benefits over competing technologies, including high accuracy, real-time tracking and analysis, seamless integration with existing infrastructure, and simple system management. High accuracy and low rate of false alarms In security applications, false alarms are extremely costly. Whenever an alarm sounds, staff must be mobilised to quickly respond to the threat of an intruder. A security system with a high rate of false alarms not only requires more staff members to respond to these false alerts, but it can also require additional devices to enhance the system’s detection accuracy. In addition, frequent false alarms can desensitise operators, lowering their efficiency in responding to alerts. 3D LiDAR sensors can provide greater than 95 percent detection accuracy and 24/7 reliability in all lighting and atmospheric conditions. The accuracy and reliability of a LiDAR-based solution significantly reduces false alarms, ultimately saving time and costs. A lower rate of false alarms provides personnel with confidence in the reliability of the alerts, improving the quality and promptness of their responses. Real-time tracking and analysis With LiDAR, security data is available in real time. The solution automatically tracks individual people and provides real-time location information, enabling security personnel to quickly locate and respond to potential threats. Seamless integration with cameras and existing infrastructure LiDAR sensors can be integrated with PTZ cameras and Video Management Systems (VMS). The positional data from sensors can be used to automate PTZ camera control and accurately identify and track moving objects in areas of interest. PTZ control is programmable, and the location data is used to intelligently select which camera to follow the intrusion based on pre-programmed rules. Some LiDAR manufacturers provide Automatic ID handover™ technology, which works by assigning a unique identification to each object detection enabling the system to track any object across all sensors within an environment and providing tracking continuity regardless of the target’s location within the secured area. This ensures seamless tracking of an individual’s movement across the entire LiDAR coverage area. Finally, when paired with a VMS platform, all sensors and video footage can be managed under one platform with a single visualization pane. The ability to clearly visualise moving targets on dynamic maps allows security personnel to take corrective action quickly and effectively. Easy-to-manage, fully automated solution Some LiDAR-based surveillance solutions use machine learning and 3D perception algorithms to scan the sensor’s field of view, analyze point cloud data, and provide anonymised information on detected individuals. This enables a fully automated security solution that is easy to manage. Overall, LiDAR-based security and surveillance technology reduces the risk of false alarms and enables security personnel to accurately identify and respond to threats—all at a cost-effective price point.
Trends in the alarm industry point to a need for a software system that accommodates business patterns such as recurring monthly revenue (RMR). Workhorse Service Company provides a software that combines customer relationship management (CRM), enterprise resource planning (ERP) and field service management (FSM) into a “cradle-to-grave” system designed specifically for the alarm industry. “Making an alarm sale is different than making a CCTV sale, and the processes for the salesperson, technician and customer service rep are different,” says Steven Hayes, founder of Workhorse Service Company. He says WorkHorse is built on modern programming languages, is responsive, and provides a pleasant user experience regardless of the device being used. Client experience “Before coming on WorkHorse, our clients have needed to use multiple softwares such as bookkeeping, quoting, central station software, email, spreadsheets, and more,” says Hayes. “This would cause issues with continuity between softwares. Mistakes are made, appointments are missed, and customers leave.” When building WorkHorse, Hayes and his team interviewed dozens of companies to find out what they were missing and what their pain points were. “There are other CRM and FSM softwares on the market, but the ones that are made for our industry are generally designed for dealer programs and selling contracts,” he says. “Others are designed to bill your RMR and have basic service call functionality.” Alarm companies know that they need RMR to survive, and WorkHorse seeks to make it easy. WorkHorse allows companies to have multiple subscriptions inside a single deal. Single point of data entry WorkHorse ensures a single point of data entry for alarm companies Merchant services come with Auto Updater. If a credit card expires or even if it is canceled, the service will reach out to the issuing bank and get the new number or token necessary to bill customers. This means less time with past due bills and calling on customers to get an updated form of payment. With two-way sync integration into central stations, WorkHorse ensures a single point of data entry for alarm companies. Information used at the time of the sale to create accounts is then pushed right from the tech portal to the central station. Employees can Create, Place Online/Offline, on test, and terminate accounts through the use of WorkHorse. The Workhorse call center, ProConnect.io, will answer phone calls and provide a Tier 1 Tech Support line for clients as a well as a concierge service. Operators will trouble-shoot alarm issues or create a service ticket if they cannot help them (subscriptions to both ProConnect and WorkHorse are needed). Operators will also try and collect money that is past due while assisting clients. Misconceptions in the industry Over the next year the prevailing trends will likely be a large swing from dealer programs to the traditional alarm company, says Hayes. This will make software like WorkHorse incredibly important as companies move from a funding program to managing their in-house sales, RMR, service, and customer retention, he adds. There is a misconception is that an owner/operator can purchase a bookkeeping software and run their alarm company efficiently and effectively. Another misconception is that someone can just turn on a software and know how to use it without any help or guidance, that “playing around” with it at night will be enough to make them proficient users. The software used to run a business should be a top priority. The software used to run a business should be a top priority The WorkHorse team is looking to expand verticals into other environments in the future. WorkHorse is built in a way that could easily expand verticals by making changes to the deal and service call modules. “In mid-2020 we plan on starting Pool Cleaning and Pest Control followed by HVAC, Plumbing, Electricians, and more,” says Hayes. WorkHorse has all in-house developers located in South West Florida. The team is continuously working to create additional features and integrations in order to bring the best user experience to clients and their customers.
The Private Security Industry Act of 2001 gives the Security Industry Authority (SIA) the function of setting standards of conduct in the United Kingdom’s private security industry. Time is winding down to provide input during the SIA’s six-week consultation on a new draft code of conduct for SIA licence holders and applicants for SIA licences. The authority is inviting the industry, licence holders, and anyone with an interest in private security to have their say on the draft code of conduct by taking part in a survey. The consultation will end on 23 February. “The ethos of the code of conduct is that it will improve standards and public safety by setting out the standards of conduct and behavior we expect people to uphold if they are entrusted with protecting the public, premises and property,” says Ian Todd, Chief Executive, Security Industry Authority (SIA). Security's Code of Conduct A code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession In security as in many professions, a code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession. SIA is suggesting Six Commitments of behavior that will apply to all licensed security operatives and to applicants. If the code of conduct is sanctioned by the U.K. Home Office, it would become mandatory and incorporated into SIA’s licensing criteria Get Licensed. A commitment to certain standards of behavior is fundamental to what it means to be fit and proper, and to being part of a profession. The six commitments are: Act with honesty and integrity Be trustworthy Protect the people and property you are entrusted to protect Be professional at work Act with fairness and impartiality at work Be accountable for your decisions and actions “We will review the comments from the consultation once it concludes on 23 February, analyze the results and publish a report on our findings,” says Todd. “The SIA will then use the comments it has received to write a final version of the code of conduct. The introduction of a code of conduct will be subject to final approval by Home Office Ministers.” SIA’s current Standards of Behavior provide guidance on professional behavior but are not mandatory. The draft code of conduct builds on the Standards of Behavior. Upholding SIA's Standards The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act “The majority of licence holders uphold the standards of behavior that the SIA, their employers and the public expect of them,” says Todd. “Their professionalism and dedication keep the public safe and tackle crime. However, there are incidents in which some licence holders do not behave in this way. This minority lower the standard of service the public receives, harm public safety, and bring themselves and the rest of the private security industry into disrepute.” The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act. It is likely that they will be required to enforce the code of conduct should it become mandatory. The draft code of conduct is currently out for consultation and the proposal has been shared widely to licence holders, private security businesses, and enforcement partners encouraging them all to take part. “Once the consultation has concluded, we will analyze the findings from the feedback, produce a report and publish it on our website and share this widely via social media,” says Todd.
The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry on issues involving municipal alarm management for the approximately 18,000 public safety agencies in the U.S. and Canada. Specifically, SIAC works to minimize the number of false alarms, which are a costly waste of resources for law enforcement jurisdictions. SIAC works directly with leaders in law enforcement at the national level, such as the International Association of Chiefs of Police (IACP) and the National Sheriffs’ Association (NSA); and at the state and local levels to provide expertise and proven strategies to reduce unnecessary dispatches to alarm sites while maintaining the police response taxpayers endorse and deserve. The primary tools for alarm management are education on causes of false alarms and implementation of the Model Ordinance for Alarm Management and False Alarm Reduction. SIAC's Model Ordinance SIAC works to minimize the number of false alarmsRecently both the International Association of Chiefs of Police and National Sheriffs’ Association passed resolutions supporting SIAC’s Model Ordinance. This has resulted in dispatch reductions between 40-50% in jurisdictions where all of the model’s recommendations have been followed. Adoption of some version of the Model Ordinance grows each year. It has been adopted nationwide by over a thousand large cities and small towns. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee through state associations of chiefs of police. “This enables the industry to work with law enforcement leadership on a regular basis and in a formalized structure to discuss and address issues,” says Stan Martin, SIAC Executive Director. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee SIAC worked with the industry on new alarm panel standards that made it less likely an end user would trigger a false alarm. The overall dependability and sophistication of alarm systems have also helped make them less vulnerable to outside forces that can trigger the system. Video and audio technology are playing an ever-increasing role with helping monitoring centers evaluate whether a crime is in progress before dispatching the police. Dramatic changes in the industry Kirk MacDowell was recently selected as SIAC’s new Chairman of the Board. He is a dynamic industry leader with more than 39 years of experience in the industry. SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes in the structure of the electronic security industry. The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes Some cities require a "verified response" before police officers are dispatched to an alarm. This requirement is problematic for the end-user as it requires a third-party confirmation that a crime is being or has been committed. This creates a significant delay in response to crime victims needing immediate help. Fortunately for citizens, the vast majority of cities have rejected ordinances that require confirmation that a crime has taken place prior to police dispatch – verified response. Over the past 15 years only about 34 of 18,000 public service agencies in the U.S. have adopted some form of verified response and 10 of those cities ended the policy. It is important to note that despite the rejection of verified response in favor of the Model Ordinance, there are still individuals who lobby aggressively to curtail police response without verification. This requires a continued and aggressive education program to get in front of these lobbying efforts which are based on false premises and misleading statistics, says Martin. Despite SIAC’s success, there are a number of important issues that need to be addressed, says Martin. First is the high turnover among law enforcement leaders and elected officials. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders who are currently rising through the ranks of their departments. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders Coordinating challenges Another challenge has been the attempt by at least one city (Sandy Springs, Ga.) to fine alarm companies for customer-generated false alarms. SIAC is currently coordinating a challenge of that ordinance in federal court with the state alarm association in Georgia. SIAC is also working on plans for more secure funding and on succession planning so the organization can continue to move forward aggressively in the future. SIAC, Inc. is a 501(c)(6) not-for-profit Delaware corporation. The Board of Directors has two members from each of the major North American trade associations: Canadian Security Association (CANASA), The Monitoring Association (TMA, formerly CSAA), Electronic Security Association (ESA), and the Security Industry Association (SIA), and an elected official. SIAC is funded by donations from individual companies. There are no memberships dues, and the organization sells no products or services.
An intelligent network of 20 Axis EN fire panels from fire and life safety systems manufacturer, Advanced, have been installed at HaDo Centrosa Garden in the heart of Ho Chi Minh City, Vietnam. HaDo Centrosa Garden is a 70,000 sq. m development of eight 30-story luxury residential towers and 115 townhouses, located in the heart of Vietnam’s Ho Chi Minh City. The upscale condominium complex’s facilities will include a swimming pool, tennis and basketball courts, fitness center, rooftop gardens, a park, school, library and commercial center. System with high-speed networking capabilities Vietsafe and KP Technology were confident in Axis EN’s ability to deliver the seamless networking needed A key requirement for this large-scale complex was a system with high-speed networking capabilities, to enable instantaneous sharing of communications between panels. To meet this need, fire protection companies Vietsafe and KP Technology chose 20 Advanced Axis EN fire alarm control panels, alongside 3,000 addressable devices, for installation in the eight residential towers. With many successful installations of Advanced products undertaken by both companies, Vietsafe and KP Technology were confident in Axis EN’s ability to deliver the seamless networking needed, while its ease of installation, testing, commissioning and operation would ensure minimal issues once the panels were on site. Axis EN fire alarm control panels installed Le Manh Dung, Director of Vietsafe, said “An Axis EN fire system was the clear choice for a project of this nature. Advanced is well respected in the fire industry, and its solutions are straightforward in terms of installation and operation, thanks to features such as built-in isolators for sequence addressing, which considerably reduces installation time.” Axis EN is EN54 parts 2, 4 and 13 approved and its panels can be used in single-loop, single-panel format or easily configured into high-speed, multi-loop networks of up to 200 nodes covering huge areas. Advanced’s reputation for ease of installation and configuration, as well as its wide peripheral range make its products customizable to almost any application. False alarm management and reduction Pham Thanh Phong, Director of KP Technology, said “As a key partner to KP Technology, Advanced is a fire system supplier we can trust, to deliver high-performing, high-quality solutions that are easy to install and to use. Features such as Axis EN’s false alarm management and reduction capabilities are extremely useful in high-rise residential sites, such as HaDo Centrosa Garden.” Pham Thanh Phong adds, “Repeated false alarms are not only intrusive, they can also lead to complacency and delayed reactions to real fire alarms. Having the ability to refine and configure protection so specifically, and according to the requirements of specific areas within a building, helps to keep unwanted alarms to a minimum and reduces disruption and risk for residents.” AlarmCalm software and MxPro 5 fire system AlarmCalm software comes as standard with any Axis EN and MxPro 5 fire system AlarmCalm software comes as standard with any Axis EN and MxPro 5 fire system, taking advantage of Advanced’s high-speed robust panels and networks to offer a best-in-class solution for managing verification and investigation delays to outputs. It allows the false alarm management strategy for a site to be refined precisely and to take account of occupants’ needs and area usage. It also includes the optional AlarmCalm button, a loop device that allows residents or trained staff to indicate whether they believe a signal in their area is due to a false alarm. Axis EN fire system Tin Le Than, Advanced’s Sales and Business Development Manager for South East Asia, said “As a modern, vibrant complex for thousands of people living and working in the center of Ho Chi Minh, the fire protection for the HaDo Centrosa Garden development is a key priority.” Tin Le Than adds, “As an industry-renowned solution, the Axis EN fire system will deliver complete peace of mind to the building owners and residents of the complex. I am pleased to have been able to support our fantastic partners at Vietsafe and KP Technology with the equipment needed to fulfill their requirements.” Global projects Advanced, owned by FTSE 100 Company, Halma PLC, protects a wide range of sites across South East Asia including the Hong Kong-Zhuhai-Macau Bridge, University of Macau and Hong Kong Central Library. Halma is a global group of life-saving technology companies with a clear purpose to grow a safer, cleaner, healthier future for everyone, every day.
Merrion Vaults, an Ireland-based provider of safe deposit boxes, has selected biometric identity verification technology from Iris ID. Merrion Vaults rents safe deposit boxes, like those found at banks, but with a significant difference, customer identities are authenticated through highly accurate iris readers, in order to enhance security. Private safe deposit boxes Merrion Vaults operates private safe deposit boxes in Glasgow and Edinburgh, in Scotland, Nottingham, Liverpool and Newcastle, in England and Dublin, in Ireland. Seamus Fahy, Director, Merrion Vaults, said the iris readers are replacing fingerprint recognition systems for authenticating customer identity. Fahy believes the choice of contactless iris readers was well timed, with the ongoing COVID-19 pandemic. Seamus Fahy stated, “The initial customer reaction to the Iris ID readers has been excellent. The customers love it.” Fingerprint readers It’s a simple, easy process for them to swipe an access card and then look into the reader with nothing to touch" He adds, “It’s a simple, easy process for them to swipe an access card and then look into the reader with nothing to touch. The entire process takes a few seconds to complete. Using the fingerprint reader, customers would forget which finger they registered with or would press too hard or too lightly on the reader. If they couldn’t get access, we’d have to check their names and passwords, and then re-register them. It was a hassle.” According to Fahy, the Iris ID readers are part of a tight security plan that includes video surveillance, access control, turnstiles, intrusion alarms and panic buttons, as well as seismic and water sensors. Employees monitor cameras at each facility and in a system-wide control room in Dublin, Ireland. Iris recognition system Mohammed Murad, Vice President of Iris ID feels the iris recognition system allows rapid and highly accurate authentication of Merrion Vaults customers, due to each person’s unique iris patterns. Mohammed Murad said, “The accuracy, speed and convenience of the Iris ID system are critical for a business that identifies its customers using biometrics. Our system also provides another critical layer of security, ensuring only Merrion customers gain access to the vault. No two people, including identical twins, have the same iris patterns.” Iris iCAM7S system readers The Iris iCAM7S system readers provide a mirror interface with color-alignment indicators guiding customers through the authentication process while capturing iris images at distances of up to 15 inches. Fahy adds that many banks in the United Kingdom are discontinuing safe deposit box service, creating an opportunity for private vendors to fill the gap. Merrion Vaults plans to open new facilities in Belfast, Northern Ireland, Reading and Bristol, England and Barcelona, Spain in 2021. Longer-term plans include locations in cities across the U.S. Merrion Vaults partners with Aditech, which uses dial-in capabilities to remotely configure and set up the system and test it with Merrion Vault’s IT department.
BIRD Aerosystems, the globally renowned developer of Airborne Missile Protection Systems (AMPS) and Airborne Surveillance, Information, and Observation (ASIO) solutions, has been awarded a new contract by the Czech Republic Air Force. Under the contract, BIRD Aerosystems will provide additional AMPS-MV systems with the patented MACS (Missile Approach Confirmation Sensor) for the Czech Air Force’s Mi-17 fleet. This project is a part of the overall modernization plan of the Czech Mi-17 transport helicopter fleet. AMPS-MV systems with patented MACS BIRD’s AMPS are already operational on the Czech Air Force Mi-17 helicopters and have been successfully deployed in different conflict zones, including Afghanistan. This contract comes after BIRD Aerosystems having conducted an overall upgrade to the Czech’s existing AMPS systems earlier this year, which provided enhanced functionality to the MILDS UV detection sensors and the MCDU Mission computers. As part of the current contract BIRD Aerosystems will provide the Czech Air Force its AMPS systems with the MACS sensor, which ensures that no false alarms will be detected and the system will react only to validated real threats. Ronen Factor, the Co-Chief Executive Officer and Founder of BIRD Aerosystems, said “We appreciate the confidence placed in our AMPS solution by the Czech Air Force, who decided to purchase additional systems for its Mi-17 fleet. Equipped with BIRD’s AMPS-MV solution with the MACS sensor, they can rest assured knowing that their aircraft and crew are safe, even when flying in automatic mode in the most complicated conflict zones.” Airborne Missile Protection System The AMPS system is known to automatically detect, verify, and foil missile attacks BIRD Aerosystems’ Airborne Missile Protection System (AMPS) provides the most enhanced protection for military and civilian aircraft against all known Surface to Air Missiles (SAM), including MANPADS, laser beam rider threats, and radar-guided missiles. The AMPS system is known to automatically detect, verify, and foil missile attacks through the effective use of counter-measure decoys (flares and chaff) that jam the missile’s IR (Infrared) seeker and protect the aircraft. MACS (Missile Approach Confirmation Sensor) MACS (Missile Approach Confirmation Sensor) is an advanced semi-active confirmation radar, which significantly reduces the false alarm rate of the overall missile warning system. Queued by a suspected threat, MACS points towards it and performs a doppler-based interrogation to confirm the existence of a valid threat. By doing so, MACS provides the most effective filtering of all known natural and human-made types of false alarms that are typically detected by electro-optical sensors, and ensures that only real missiles will be declared by the system and reacted upon. Fully operational, BIRD’s AMPS-MV with the MACS sensor is provided as a turn-key solution that includes design, installation, integration, certification and support, and is certified by major aircraft manufacturers.
AMAG Technology, a world pioneer in unified security solutions that help organizations mitigate risk, announces that State Center Community College District (SCCCD) has selected its Symmetry Security Management System to install throughout all campuses. SCCCD will install AMAG’s Symmetry Access Control, Symmetry Intrusion, and Symmetry Blue Bluetooth readers. SCCCD chose DCL Technology as its integrator to deploy the system. Built-in intrusion system SCCCD encompasses four community colleges and two educational centers: Fresno City College, Reedley College, Clovis Community College, Madera Community College, Madera Community College at Oakhurst, and the Career and Technology Center. The project will begin with installing Symmetry in buildings on two campuses, with the intent to deploy Symmetry throughout all SCCCD campuses. AMAG’s Symmetry Blue readers will help SCCCD to transition to smart cards while still allowing to use of current access cards “We chose the Symmetry platform because of its dynamic ability to meet our growing needs. Symmetry’s built-in intrusion system provided an added convenience for us as we did not have to look for a third-party intrusion system,” said SCCCD, Security System Specialist, Vincent Fries. “AMAG’s Symmetry Blue readers will also help SCCCD to transition to smart cards while allowing us to still use our current access cards.” Partnership with SSSCD and AMAG “We are thrilled to be working with SCCCD and AMAG Technology and look forward to a long partnership as SCCCD expands and upgrades to an enterprise-level system over the next several years,” said DCL Technology President, Keven Smith. The expected completion time for the upgrade is three years. DCL Technology is a low voltage systems integrator servicing the Fresno/Madera and surrounding areas whose services include CCTV systems, alarm and fire systems, network cabling and fiber optics, and home automation systems.
Vimpex's Hydrosense Water Leak Detection System has been installed in Dublin Airport’s new Visual Control Tower (VCT) to protect the new state of the art facility from water ingress, which could seriously damage electrical, communication and computer networks. Visual Control Tower (VCT) The 87-metres high tower is Ireland’s tallest occupied structure and a commanding new addition to the city’s skyline. It comprises three separate but integrated building elements, the control cab and associated elements, the cab supporting shaft and a base building. The base building will accommodate staff facilities, electronic systems and mechanical plant space to provide control of the building environment. Hydrosense Water Leak Detection systems Vimpex’s Hydrosense Water Leak Detection systems are delivering the new standard in water leak detection Vimpex’s Hydrosense Water Leak Detection systems are delivering the new standard in water leak detection, applying the integrity, control and reliability of life safety and building infrastructure systems to protect against water ingress that could seriously damage critical IT and communication infrastructure. It continuously monitors for water leaks around the clock, year in year out and has the facility for 72-hour battery standby in the event of power failure. Should a leak be detected the control panel sounds an alarm which can be extended to a remote location. When an alarm is raised, Vimpex Hydro-Cryer voice sounders can be used to broadcast an unambiguous message, avoiding confusion with other sounders on site. Integrated with life safety technology Utilizing life safety technology in the design of Hydrosense provides the reliability and integrity of EN approved fire detection systems, meaning there is virtually no risk of failure, downtime and significantly fewer false alarms. Established in 1994, Vimpex is the UK's renowned independent manufacturer and distributor of fire and building infrastructure, alarm and evacuation products and accessories. The company produces and distributes a range of high quality evacuation, signaling and fire system products, both Vimpex manufactured and supplied by the company's manufacturing partners.
Bosch Building Technologies has installed an intrusion alarm system at the UNESCO World Heritage Site: the Mausoleum of Qin Shihuangdi in the city of Xi'an, China. Several hundred TriTech motion detectors are deployed to protect the 16,300-square-foot museum against theft and damage. These detectors prevent costly and time-consuming false alarms under challenging environmental conditions while providing detection reliability of real alarms. Because of the highly efficient intrusion detection system, the museum can dispense entirely with physical protective barriers such as glass walls, allowing visitors to directly experience their clay heroes. “The cooperation with Bosch is an excellent showcase of modern high-tech protection of historic buildings. Bosch intrusion alarm systems help to upgrade the security level of these unique historic sites,” says Ren Xuxin, Project Manager of Xi’an Terracotta Warriors and Horses Pit Security Upgrade Project. Intelligent alarms protect millennia-old warriors As wall detectors, the TriTech motion detectors protect the pits where the terracotta warriors are located. Because these pits collect large amounts of dust that could cause false alarms, the intelligent sensor data fusion algorithm in each of the rugged detectors checks potential alarms with a PIR sensor and microwave Doppler radar for a consistent result. The area to be protected is thereby also secured from above by ceiling-mounted TriTech motion detectors. These detectors are located 4.8 meters above the museum floor, yet operate accurately and reliably. They thus exceed the range of standard ceiling detectors by more than two meters. The TriTech motion detectors provide round-the-clock protection for the museum In the event of a security breach, the Bosch G-Series system controller sends an alert, including the location of the triggered detector, in less than two seconds to the security team in the control room, which uses live images from a video system to verify the alarm. Round-the-clock protection In most cases, tourists trigger an alarm when they cross a threshold to retrieve their cameras or smartphones that have accidentally fallen into the pit. In doing so, there is a risk of damage to the terracotta warriors, but even if real criminals should ever get into the act, the system is ready. The TriTech motion detectors provide round-the-clock protection for the museum. Due to their discreet design, the detectors are unobtrusive and thus do not interfere with the museum experience. In accordance with the museum operator's list of requirements, the intrusion detection system protects not only the museum, including the perimeter, as well as the visitor areas of the mausoleum but additionally the cultural treasures currently stored in the unmanned warehouse.
Round table discussion
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which security technologies are becoming outdated or obsolete?
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Security alarm systems: Manufacturers & Suppliers
- DSC Security alarm systems
- Vanderbilt Security alarm systems
- LifeSafety Power Security alarm systems
- TruPortal Security alarm systems
- RISCO Group Security alarm systems
- Bosch Security alarm systems
- Climax Technology Security alarm systems
- OPTEX Security alarm systems
- Visonic Security alarm systems
- Alpro Security alarm systems
- Nedap AEOS Security alarm systems
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload