Security alarm systems
Glass windows and entryways give businesses a bright and welcoming feel. But they can be vulnerable to criminals looking for an easy way to break in after hours. To stop them in their tracks, Digital Monitoring Products (DMP) is pleased to introduce the new 1128 Wireless Glassbreak Detector. 1128 Wireless Glassbreak Detector Designed to detect the shattering of framed glass mounted in an outside wall, the 1128 Wireless Glassbreak Detector is a fully supervised, low-current shock and glas...
Security integrators are often tasked with a multitude of responsibilities which could include a variety of installation, integration or design tasks made up of sprinkler systems, fire alarms, access control, HVAC, video surveillance systems and networks; and then pile on maintenance, training and analytics. Traditionally, most security integrators have installation backgrounds but are now expected to be IT savvy, too. Even the most proficient IT professionals may not fully grasp the complexity...
CHeKT announces a partnership with OPTEX, the supplier of outdoor sensors for intrusion security. CHeKT delivers a visual-monitoring platform for alarm monitoring centers. This partnership with Optex will significantly advance the protection capabilities of security integrators globally. The solution relies on ‘The CHeKT Bridge’, the first product brought to market by CHeKT. With years of development, the CHeKT Bridge premiered in April 2018 at the ISC West trade show. The vision of...
GJD has hit the ground running in 2019 with the appointment of Jason Hill as the company’s Commercial Director. Mark Tibbenham, Managing Director of GJD has big plans for the British manufacturer of external motion detectors and LED illuminators, and has recruited Jason Hill to help deliver on his aspirations. GJD Expands In The US Commenting on the new appointment, Mark said: “Even though we were 2017 recipients of the Queens Award for Enterprise, International Trade there are a s...
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality...
ADT Inc., global provider of monitored security and interactive home and business automation solutions in the United States and Canada, has announced the unveiling of its newly redesigned smart home security system – the ADT Command Panel & Control Platform (ADT Command) – as well as a suite of smart security and home automation products at the Consumer Electronic Show (CES). This year’s theme, “Real Protection,” will highlight the products ADT offers to ensure...
The newest addition to Viking’s line of VoIP paging speakers is a 2’ x 2’ drop-in ceiling tile IP speaker for SIP endpoint or multicast/paging. As an added benefit it can also make standard and/or emergency SIP calls. “Why pay extra installation expenses when you can simply drop in one of the most functional VoIP SIP paging speakers on the market today?” – Greg Yocom, Viking Electronics Engineering Manager PoE Powered Paging Speaker The 22TB-IP is a PoE powered paging speaker. It can operate as a SIP endpoint device for one-way and two-way voice paging. It can also operate as a multicast paging device with the ability to receive up to 10 multicast paging streams. A hard-wired button connected to the 22TB-IP can initiate a SIP phone call. The built-in microphone enables monitoring of an area in the event a silent alarm is activated. The 22TB-IP can be programmed to automatically adjust to ambient room noise. IP Programming Software Separate audio outputs from the 22TB-IP can connect to the line level input of an external amplifier or power up to 5 additional 8 Ohm speakers or horns. An on-board form-c relay contact can be programmed using the included IP Programming software to trigger a strobe light, door strike, doorbell and more.
Johnson Controls announces that it has partnered with Civic Technologies, the global digital identity leader. Johnson Controls will integrate the Civic Secure ID Platform (SIP) with C-CURE 9000 Security and Event Management Systems from Software House to provide visitor management with greater data privacy and protection, enabling building visitors to securely present their verifiable identity using the Civic App. This partnership will enable properties secured by C-CURE 9000 a more convenient and secure solution for processing visitors at point of reception and ensure Johnson Controls remains a leader in secure access technology with innovative digital identity solutions. Offering Solutions We’re looking forward to integrating Civic as a part of our access management technology" “Lack of user-controlled identity information and decentralized verification using current methods is an ongoing challenge in the identity access management industry,” said George Martinez, director of Cloud Services at Johnson Controls. He further added, “The ability to digitally verify the identity of people coming in and out of C-CURE 9000 secured buildings, without needing to collect and store excess personal information, offers incredible compliance and security benefits. We’re looking forward to integrating Civic as a part of our access management technology and to offering solutions that help our customers and the guests that use and visit their facilities.” The Johnson Controls and Civic partnership will simplify and streamline the proof of identity process for managing visitors in building lobbies. Visitor identity verification with the Civic App will initially be deployed in three New York locations, with an expected volume of over 20,000 visitors per month. Manage Sensitive Data The Civic integration provides data privacy with the benefits of blockchain-powered security Visitors typically have to sign in with the receptionist and provide information, usually a physical ID and contact information, to check in for their visit and receive temporary access to the building. By integrating Civic for authentication and Know Your Customer, when visitors walk into a building, they will be able to scan a QR code on the C-CURE 9000 check-in kiosk with their Civic App without needing to dig out a physical ID or enter personal information into a form. Integrating the Civic App provides benefits beyond a simplified visitor management process. For visitors, the Civic integration provides data privacy with the benefits of blockchain-powered security. Using the Civic Secure ID platform, user information is always stored locally on a user’s mobile device and is protected by biometrics. This also means that properties secured by C-CURE 9000 are able to securely verify the identity of users without any requirements to store or manage sensitive personal data that attracts hackers. Secure Access Management Civic enables guest and employees to prove who they are with a mobile device" “Today, we all carry various items to identify ourselves, from government-issued IDs to fobs that grant us building access. By integrating the Civic App, anyone who needs to visit a C-CURE 9000 secured building will have the opportunity to identify themselves with their Civic App,” said Vinny Lingham, Civic co-founder & CEO. “Civic enables guest and employees to prove who they are with a mobile device, rather than requiring them to show an ID document, sign a visitor logbook and stand in line to check in/out of a facility. We’re looking forward to working with Johnson Controls to bring blockchain-powered identity verification to enable secure access management for Johnson Controls customers’ sites and with their guests across the U.S.” The way we prove who we are is changing. The partnership between Johnson Control and Civic is the perfect example of how this transformation is taking place. In the future, it will not be necessary to carry and surrender a personal document to prove identity when this can all be seamlessly managed from a mobile app that offers the additional benefits of allowing users to control how their personal information is shared.
National Monitoring Center, NMC, a renowned brand in the alarm monitoring industry, and member of the Netwatch group, announced the appointment of industry veteran Norm Barton as Regional Sales Manager West, Proactive Video Monitoring services in NMC. The appointment supports the growing industry demand for Proactive Video Monitoring services. Proactive Video Monitoring Services Norm has extensive industry experience as well as a passion for the market and will be responsible for executing sales strategies in the western United States region" Barton will report to Nicola Oakie, Director of National Sales. Oakie commented on the appointment, “We are delighted to welcome Norm as we continue to expand our team to support this important growth segment. Norm has extensive industry experience as well as a passion for the market and will be responsible for executing sales strategies in the western region of the United States.” Barton comes to NMC with over 28 years of increasingly responsible Team Leadership experience in management and operations including having been President and CEO of FDS Integration, Inc. for several years. Video Monitoring Services Expert “Norm’s outstanding leadership skills, deep industry knowledge, and impressive record of building long-term customer partnerships make him a perfect fit for this pivotal role,” Oakie added. Barton is pleased to be joining the NMC team and has enthusiastically taken on this role. “It is a pleasure to be joining such a well-respected organization, and one that builds its reputation on truly serving its dealers with forward-thinking services and support. This is an incredibly dynamic, focused, and competitive industry in which dealers can thrive. I am excited to be working with our current customers to support their growth and equally excited to cultivate new relationships throughout the western region.”
Matrox Graphics Inc. is pleased to announce that the Matrox Mura IPX 4K DisplayPort capture and IP encode/decode cards are now shipping. These new dual DisplayPort 1.2 video wall cards feature 4Kp60 with full 4:4:4 color sampling support alongside a dedicated onboard network interface controller (NIC), offering the most advanced capture, encode, stream, record, and decode capabilities from a single card. The Mura IPX capture cards are ideal for OEMs and system integrators looking to build cutting-edge video wall controllers that deliver fast-moving video content and high-frequency desktop graphics and text to local and/or networked videos walls. Active Cooling Options Available in passive and active cooling options, the all-in-one Matrox Mura IPX cards feature two full-size DisplayPort 1.2 connectors for native capture of 4Kp60 physical sources, while the network connector enables the encoding and decoding of up to two 4Kp60, four 4Kp30, eight 1080p60, sixteen 1080p30, or exponentially more SD streams. System builders now have a building block to satisfy the increasing requirements of multi-4Kp60 content and can continue to mix and match System builders now have a building block to satisfy the increasing requirements of multi-4Kp60 content and can continue to mix and match from a wide selection of Matrox video wall cards to construct scalable, high-density, low-footprint video wall systems. Cost-Effective Integration “The new Mura IPX capture cards address two major pain points for the video wall industry,” says Fadhl Al-Bayaty, business development manager, Matrox Graphics Inc. “First, is the ability to capture and transfer multiple 4Kp60 channels over the bus without any color-quality degradation. Second, is the inclusion of IP technology directly on the board, a critical differentiator only available with Matrox capture cards.” “The ability to simultaneously stream, record, and decode while capturing physical signals from one board makes the new Mura IPX products the most powerful capture cards on the market. This industry-unique design translates into a smoother, more cost-effective integration process for OEMs and system builders looking to deploy high-density video walls.”
ADT Inc., global provider of monitored security and interactive home and business automation solutions in the United States and Canada, has announced that it has completed its acquisition of Red Hawk Fire & Security, provider of commercial fire, life safety and security services and portfolio company of Comvest Partners. Commercial Security And Fire Safety “We are pleased to complete this transaction, which strengthens ADT’s growth in the commercial security market and meaningfully expands the company’s product portfolio with the introduction of commercial fire safety related solutions,” said Jim DeVries, ADT’s President and Chief Executive Officer. He further added, “With the added robust portfolio of fire and life safety solutions, as well as additional scale through commercially-focused sales professionals and technicians, we enhanced our position as a leader in commercial security, just as we are today in the residential market. ADT has a strong track record of successfully integrating acquisitions and we look forward to welcoming the talented Red Hawk team to the company.” Moving forward, Red Hawk’s ability to showcase its products and services to a wider range of National Account and enterprise-level customers will be significantly accelerated with ADT, while also increasing ADT’s technician workforce dedicated to the commercial customer.
Integrated security manufacturer TDSi is pleased to announce the appointment of Greg Little as Technical Support Engineer. Greg will be providing First and Second Line support to TDSi’s customers, for both engineering and sales support – with a specialization in IP networking and CCTV. John Davies, Managing Director of TDSi commented, “We are delighted to welcome Greg back to the TDSi team, as he was previously our Sales Support & Estimator for five years. With a highly impressive track record of technical knowledge and expertise, Greg is the perfect professional to support TDSi’s customers with any technical or sales bid enquiries.” Modern Security Systems With the level of technical integration required by modern security systems, technical support is a key service provided by the TDSi team. Reflecting upon his new role, Greg stated, “Every installer needs to know they can pick up the phone and get competent, timely and professional support when installing or fault-finding on site.” Greg has a distinguished security career, including 21 years at Chubb Security and two years as Technical Supervisor at Network Security Greg has a distinguished security career, including 21 years at Chubb Security (14 as a Service Engineer, seven as Technical Support Engineer) and two years as Technical Supervisor at Network Security, where he trained to become Fire Industry Association (FIA) and Gent qualified, before returning to TDSi. Dispersed Security Projects John Davies added, “We were excited to invite Greg back to TDSi in his new role, which is a vital part of TDSi’s support team. We are proud to offer our partners and customers the highest levels of technical advice and support whenever required, and Greg is a key part of our ongoing commitment to deliver this.” TDSi is also pleased to announce the appointment of new Warehouse Operative Dominic Alexander at its Headquarters in Poole, Dorset, UK. Dominic is a key member of the team that processes and ships TDSi’s extensive range of products to its partners and customers around the world. Dominic commented, “We manage the logistics and movement of products from our UK manufacturing plant, to our warehouse in Poole and onwards to globally dispersed security projects. It’s great to be part of a team that helps people stay safe and secure all around the world.”
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security Industry Experts The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritize Safe School Environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organizations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organizations recognize their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilize, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack Of Consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings. A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right Protection Equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive Security Plan Quantifying and mitigating risk are the jobs of security professionals and school administratorsA risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay Adversarial Behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorized visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier Target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security. It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety And Security Components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms Layered Security While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Twitter has around 350 million active users a month, all eagerly posting 280-character “tweets” about the world around them. It’s a vast amount of data from all over the globe. Security professionals have begun to appreciate the value of mining all that data for insights to help them protect people, assets and operations. One company leveraging the Twitterverse to provide real-time situational awareness to corporate security end users is Dataminr.Dataminr assembles this information flow into a useful timeline that summarizes the ongoing sequence of events Algorithms For Actionable Security Signals The New York-based technology company has developed algorithms that comb through the full Twitter dataset to provide actionable signals to security professionals around the world about security-related events as they unfold. For corporate security, early information about an unfolding event enables them to take action faster in order to secure their people, locations and business operations. “OMG! Just heard a loud bang on the quad,” a tweet might declare. Combined with location information gleaned from a cell phone, such a tweet could be the first indicator of an unfolding security incident. As an event unfolds, hundreds of such tweets are likely to be posted from the surrounding areas, collectively offering a running narrative of developing events. Dataminr assembles this information flow into a useful timeline that summarises the ongoing sequence of events. Many times, tweets are the first information available from an incident even before the arrival of first responders.Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email “Early notification allows security professionals to be more proactive,” says Dillon Twombly, SVP, Corporate Sales at Dataminr. “We have a broad range of users across Fortune 1000 companies, and also including country security managers, security operations centers, and executive protection. "In retail, we provide information for security operations or loss prevention. Events sometimes have a potential to spin out of control, and we allow security professionals to react faster and get ahead of an event proactively.” Various Security Platforms Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email. The system can be integrated with a company’s workflow, and the software interfaces with various security platforms, such as physical security information management (PSIM) systems. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event Dataminr addresses all regulatory and legal concerns, and it is GDPR-compliant. However, privacy is generally not a big concern because Twitter data is posted publicly, and Dataminr gleans information related to a specific event, not a specific Twitter user’s individual data. “Over the past couple of years, we have grown the security vertical,” says Twombly. “The market is receptive to the value of social media as a tool for users tasked with responding in a comprehensive way to a range of issues.”The company’s services are useful across the full range of vertical markets in the security industry Public Safety And Security In addition to security and public safety applications, Dataminr also provides services to financial companies and even media outlets. In fact, the 9-year-old company started in finance, where stock or currency traders were able to leverage breaking news notifications to make decisions faster. In the media vertical, Dataminr provides information to 500 newsrooms globally. Public safety and security uses have evolved, and Twombly currently spearheads the company’s work in corporate security, calling on his experience in the security world. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event.Customers can customize the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter Tracking Twitter posts enables a company to get ahead of an evolving story and help to shape the narrative. Twombly says Dataminr has “deep and broad relationships” with corporate customers and delivers information that can possibly be used by multiple departments in an organization. The company’s services are useful across the full range of vertical markets in the security industry, from transportation to major industrials to financial services to energy. In the education vertical, major universities are customers, as are local school districts. Customers can customize the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter. Twombly says the company’s software is constantly evolving and being fine-tuned in response to changing needs. Dataminr is a “strategic partner” of the social media giant and works closely with them on product development, he adds.
Information can be a scarce commodity in the midst of terrorism or a mass shooting incident. Information can also save lives during the first critical moments of such events. The general public can now download a free smartphone app that provides instantaneous real-time information as a terrorism or mass shooting event is unfolding. TerrorMate Crawler Software Called TerrorMate, the app began development in 2013, in the wake of several terrorist attacks in France. People in the affected areas were relying on media sources, which sometimes do not provide information on a real-time basis as an event unfolds. To provide information faster, TerrorMate’s proprietary “crawler software” uses more than 200 key words to monitor Internet, social media and “dark web” sources. They also monitor Telegram channels, which are private encrypted messages that terrorists use to communicate. TerrorMate has access to four channels used by the Islamic State. Know Your Enemy Any leads are then confirmed using 1,100 human sources “on the ground” around the world, including contracted security consultants and law enforcement. TerrorMate employs 15 analysts and 10 software developers who work in a global control room in Belgium 24/7 to monitor any situations. Unlike media professionals, who are monitoring a range of news stories in a variety of fields, TerrorMate operators are focused solely on terrorism and mass shooting events. TerrorMate’s proprietary “crawler software” usesmore than 200 key wordsto monitor Internet, social media and dark web sources “We keep up with what the threat is doing,” says Barry Oberholzer, founder of TerrorTech, the developer of TerrorMate. “You need to know your enemy. We keep analyzing and researching so we know the enemy. Mass shootings are hard to predict, and terrorists keep changing their methods, from suicide bombings to vehicle attacks. The game keeps changing, and we see that and keep up to speed on what they’re doing.” Intelligence Communication TerrorMate also keeps up to date by communicating with authorities around the world, ranging from an intelligence agency in Spain to the customs and immigration services in Great Britain, from Belgium’s state security services to France’s national police. In addition, TerrorMate is an authorized alert distributor of the Integrated Alert and Warning (IPAW) system operated by the U.S. Department of Homeland Security and the Federal Emergency Management Agency (FEMA). Mission Goals TerrorMate has a two-pronged mission. One goal is to provide actionable intelligence to law enforcement to help prevent an imminent attack. If TerrorMate personnel identify a possible threat, whether on social media or the dark web, they confirm the information and then communicate it to local law enforcement. The second goal is to provide real-time information to the general public about terrorism and mass shooting events. The app can be downloaded from the iTunes app store or Google Play. TerrorMate employs 15 analysts and 10 software developers who work in a global control room 24/7 to monitor any situations In addition to providing timely reports, the TerrorMate app includes a “safety guide” during an attack, advising phone numbers that users can call or people they can contact for additional information; listing which areas they should avoid; which public transport systems are functioning, etc. The goal is to get people to safety as soon as possible. During an attack in Barcelona on August 17 this year, the app provided a discount code to enable users to get a free taxi ride home from the affected areas. Tailored Location Alerts Because the app uses the smartphone geolocation feature, TerrorMate can send tailored alerts based on where a user is located. Users can also choose whether they want only local (in-country) or international alerts. Users may upload media, including photos and video, to the app; all information is verified by the TerrorMate control room and then shared with authorities. Because the app uses the smartphone geolocation feature, TerrorMate cansend tailored alerts basedon where a user is located The app also allows users to share their location with a list of contacts, in effect enabling users to see where their loved ones are during an incident, and to send and receive messages. The feature was developed after the May 2017 bombing at an Ariana Grande concert in Manchester, United Kingdom, when parents needed information on whether their teenagers were safe as the tragedy unfolded. Vehicle Integration TerrorMate will integrate with vehicle systems such as OnStar and Uconnect within the next six months. Companies may also subscribe to the service. A benefit is early warning of a terrorist event that might impact a company’s operation. For example, one stock broker subscribes to the service to get early warning of any incident that might negatively impact stock prices. Corporate licensing fees are one source of potential revenue for the company, which currently is self-funded and has little revenue, according to Oberholzer. Identifying what constitutes a mass shooting is not always a clear-cut process, and often the determination happens in real-time. The basic criteria TerrorMate uses is multiple casualties in a highly populated area. Analysts make the call based on real-time information as it comes into the control center about an unfolding incident. Any early information that is reported is labelled as a “possible” mass shooting until it is confirmed. TerrorMate is currently available in English, French, German, Spanish, Italian, Russian, Korean, Japanese, Chinese, Dutch, Swedish and Portuguese. Infographic: How To Prepare For Active Shooter Incidents
An expanding outreach and programming targeted especially to international visitors are among the ways ASIS International is seeking to attract more global attendance than ever to its 63rd Annual Seminar and Exhibits, which will take place between 25-28 September in Dallas, Texas. In addition to returning, long-time international visitors, ASIS International is looking to expand global attendance. One initiative is the International Buyer Program (IBP), a joint government/industry effort, which brings thousands of international buyers to the United States for business-to-business matchmaking with U.S. firms exhibiting at major industry trade shows, including this year’s ASIS International annual seminar and exhibits. ASIS 2017’s participation in IBP provides attendees access to a global network of security professionals, qualified international buyers, representatives and distributors. When attendees join an IBP delegation through their local U.S. Consulate or Embassy, they can take advantage of special registration prices – 50 percent off the ASIS member rate – and other benefits only available to IBP participants. Strengths Of Annual ASIS Show “International” has long been an emphasis for ASIS, as well as part of the organization’s name. ASIS International is the largest global organization for security management professionals with 242 chapters and 35,000 members worldwide. Godfried Hendriks, ASIS secretary, will be among the long-time ASIS members welcoming new international visitors to the show. He has been involved in the ASIS organization for more than 25 years and is a member of the Benelux Chapter. Godfried Hendriks, ASIS secretary, will be among the long-time ASIS members welcoming new international visitors to the show The ASIS Annual Seminar and Exhibits in the United States is unique, says Hendriks. “If you look at the other events, they are either a good trade show or a good conference,” he says. “The strength of the annual ASIS show is that it combines an incredibly large trade show and a great conference program. That’s the unique thing I haven’t seen anywhere else.” This year, the show will be even better, given the ASIS organization’s efforts to maximize the benefits of both components. For example, there will be more time between conference sessions to attend the trade show and meet suppliers, and Monday will be a conference-only day. Local Knowledge, Global Network Educated as a mechanical engineer, Hendriks unexpectedly found himself in the security profession in 1986 and eventually made his way to the local Benelux Chapter of ASIS International, which helped him get a “flying start” in the security field. A decade or so later, he became a volunteer leader in the chapter and has been returning the favor ever since. Currently, Hendriks is a managing consultant of his own company, GOING Consultancy in Alkmaar, the Netherlands, advising both local and multinational companies, industry organizations, public services and county authorities on security and crime prevention. “The most important thing about being a member and a volunteer leader of ASIS International is the networking,” says Hendriks. “There is less need to spend hours and weeks investigating things and getting information when all the information you need is a phone call away from another member. I am passionate about the organization and what we can do to help each other. “ The Benelux chapter numbers more than 300 members. Other large European ASIS chapters include the “flagship” United Kingdom chapter with about 800 members, and also large and active chapters in Sweden, Germany and Spain, among others. “What you see globally, in the different countries, is that ASIS members are a sampling of the highest security professionals from those countries, including representatives of large multi-national companies,” says Hendriks. “The organization combines local knowledge with a global network of professionals.” The “flagship” European ASIS International Chapter in the United Kingdom will again be well represented at this year’s Annual Seminar and Exhibits Joining The ASIS International Family In addition to the ASIS International Annual Seminar and Exhibits each year, Hendriks says he also attends IFSEC and some of the national trade shows in various countries. Also, there is a yearly ASIS European conference; earlier in 2017, it was in Milan, Italy, and it is planned next year in The Hague, Netherlands. Hendriks has attended the ASIS annual gathering in the US every year since 2006. “Many people in other fields who work at various companies, even competitors, don’t often speak to each other,” says Hendriks. “In the security profession, people are so willing to speak to each other, to meet regularly and to share information on the most successful ways to prevent crime and reduce losses.” International visitors have participated in the ASIS annual seminar for years; there were 109 countries represented at last year’s event. A “Global Networking Lounge” serves as a gathering place for international visitors. Long-time international attendees are aware that first-time visitors may be overcome with the size of the show and become “lost.” Therefore, long-timers remain on the lookout for people who need guidance. “We want all our members and volunteer leaders to reach out and introduce new attendees to themselves and other people, so they can get the most out of the experience,” says Hendriks. “We want them to feel welcome and become part of the ‘family.’” Tailoring And Translating ASIS Sessions Some of the sessions are tailored to an international audience, such as the “Top Global Threats Affecting the Security Profession” session. Other sessions will cover international topics such as human trafficking, terrorism, and the security risks of the European migrant crisis. Language isn’t generally a problem for ASIS visitors, who mostly speak and understand English (the “international language of business.”) However, there are Spanish and Mandarin translators, and delegates from various countries may also provide their own translators. "Many international visitors become regular, if not yearly, visitors after their first visit to the show" “Come and see for yourself – it’s really worthwhile”: This is Hendriks’ message to security professionals all over the world. “Many international visitors become regular, if not yearly, visitors after their first visit to the show,” he adds. Hendriks notes that time zone differences make the afternoon and evening hours at ASIS especially conducive to a more relaxed atmosphere for security professionals to meet, network and exchange information. (Their offices are already closed because of time zones, so there are no distractions of trying to keep up with daily issues back at the office.) For anyone who cannot attend the annual meeting in person, ASIS International is providing “Global Access Live,” a streaming service featuring select sessions worldwide – three sessions on Monday, four on Tuesday and three on Wednesday. Enterprise Security Risk Management ASIS International has embraced Enterprise Security Risk Management (ESRM) as a driving global strategic priority that unifies its programmes and concepts. ESRM covers both traditional security issues such as loss prevention and terrorism, as well as topics such as brand protection, business continuity, corporate espionage, cybersecurity, information security, resilience and white collar crime. ESRM is both a philosophy and a management system, aimed at using globally established risk management principles to help security professionals – ASIS members – manage the variety of security risks facing their organizations. ASIS 2017 will include more than a dozen sessions focusing on ESRM. Also in Dallas, ASIS will launch an effort to expand the “globalisation” of its popular topic-specific councils, including the Retail Security Council, the Hospitality/Entertainment Council, and the Physical Security Council (there are 34 in all). The initial focus will be on expanding participation in Latin America.
One of the world’s most famous hotel-chains, DoubleTree by Hilton, part of Hilton Worldwide, has selected a high-performance fire system from Advanced Fire Systems Inc. at their eight-story, 366 room hotel in Boston, Massachusetts. The challenge was to replace an existing system, integrate speakers to all guest rooms and ensure that all audio messages and strobes were fully synchronized across the hotel, in the event of a fire situation, without the need for costly re-wiring. Advanced Audio System The Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync" An Advanced audio system was specified by the stylish, four-star, DoubleTree by Hilton Boston North Shore as it met regulatory requirements for the low frequency 520 Hz warning tones necessary for the sleeping areas of the hotel and its award-winning emergency communications system, PerfectSync, synchronized tones and digital messages to ensure compliance with local codes. Christopher Whitmarsh, President at Hayden Systems, Inc., commented: “I was confident that the Advanced equipment could meet the application requirements based on my knowledge and experience with the equipment. In this case, the Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync, ensuring the hotel adhered to strict guidelines. The system integrated seamlessly into the fabric of the building and provided the client with a solution that met their needs as well as satisfying the rigorous demands of the local fire authority.” PerfectSync Emergency Communications System PerfectSync automatically synchronises audio, voice and strobe signals across Advanced’s Axis AX fire alarm networks dynamically, as conditions change. Synchronization of audio and visual signals across multiple notification zones, floors & areas, prevents confusion in an emergency situation and aids in meeting intelligibility standards. Using high performance, distributed, digital amplifiers that come standard with an integral backup amplifier and power source, should a fire spread to an adjacent floor or area, audio and visual indicators come on immediately, and the audio messages will quickly synchronize with any identical audio message on the system. Advanced’s Axis AX Fire Alarm System Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format, offering a vast range of configurations, control and interface options all with simple set-up and operation. The Axis AX systems includes easily networked panels, audio panels and command centers, DynamixSmoke smoke control and a huge range of peripherals, devices and interfaces that make it ideal to suit almost any fire and life safety application. Advanced Fire Systems Mike Troiano, President and CEO of Advanced in the USA, said: “Advanced fire systems are specified in some of the most famous and prestigious hotels across the world and it was a pleasure to work with our customer Hayden Systems, Inc. to provide a system that will meet the rigorous standards required and ensure that the DoubleTree by Hilton’s staff and guests alike are safeguarded.” “PerfectSync insures synchronization of audio, paging and strobe signals without the need for special wiring or programming, it’s all done automatically by the Axis AX system. Since its introduction in 2014, Award Winning PerfectSync has built a solid reputation with engineering firms and fire authorities alike for its ability to deliver superior performance. The end result is a technologically advanced, easy to use audio and visual communications system that improves life safety for all of the occupants of a building in an emergency situation.”
With a mission to provide and maintain good quality homes for Blackpool Council’s tenants and leaseholders, BCH has won a number of awards and accreditations for housing, repairs, customer services and community projects. The safety and security of residents is a high priority for BCH, which is why it has used products from STANLEY Products & Solutions for many years. During this time the primary system was made up of a GDX5 door entry system, along with an Indigo 1000 access control system, which were fully integrated. “We have a policy of continual improvement in the service we provide,” explains Anthony Walker, Mechanical & Electrical Officer at BCH. “Although the previous configuration performed well, I was convinced that the business and operational benefits of remote monitoring and the cloud could be utilised by upgrading the Indigo 1000 with a PAC 512 access control system.” Innovative Remote Monitoring Platform The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each doorAn upgraded system was specified for a BCH site comprising 80 blocks. It utilizes the existing GDX5 front panels, which have been integrated with the PAC 512 controllers to create a highly innovative remote monitoring platform that can be accessed via a PC, tablet or smartphone. This is achieved using a general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network. It provides an enhanced service over traditional mobile/landline telephone connections and makes administration of the system more flexible. The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each door. Each door also has a programmable auxiliary input that may be used for alarm system integration, and an auxiliary output that enables a buzzer or strobe to activate when security is breached or a door is left open. Email Alerts During Equipment Failure In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restored, while the system features an auto-dial or email alert program that, in the event of an equipment failure at one of the locations, sends a notification so that the issue can be quickly rectified. In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restored Explaining the benefits of using PAC 512, Andrew Burton, area sales manager at STANLEY Products & Solutions, says, “The cloud revolution has had a dramatic effect on the physical security equipment industry. Its development into access control technology means that not only can a system be managed remotely, specific personnel can even be granted or denied access to certain areas at different times, making it not only good for security but also for health and safety. “Furthermore, in the event of a theft or antisocial behavior, it is possible to pinpoint exactly who was where and initiate appropriate action, using the live events and reporting.” Remote Diagnostics And Servicing BCH can also access information via the PAC Residential Cloud – helping to further enhance its remote monitoring operation. Remote diagnostics, technical issues and servicing can be carried out, and it’s also possible to remotely view status, set and unset a system and access an event log. For instance, if someone loses a key fob, BCH can access their information, carry out an authorization check, let them into their abode and, if necessary, deactivate the missing device. It also allows the incumbent installer to remotely access the system’s software to physically input any special information such as extended door release times for specific residents. Programming Key Fobs Remotely BCH worked with STANLEY to generate reports which show when a key fob hasn't been used for a specific period of timeWith a number of vulnerable residents, BCH worked with STANLEY Products & Solutions to generate reports which show when a key fob hasn't been used for a specific period of time. Anthony Walker comments, “If the report indicates non-use of a fob, we can take measures to deactivate it, and/or can send someone over to check on the person concerned and, if necessary, notify next of kin or the relevant authorities. “In extreme circumstances, we can also remotely open doors to allow access to the emergency services. Having the ability to immediately and remotely program fobs has been particularly beneficial to our customers who previously would have had to travel to our offices for this to be completed - saving both time and money and making best use of our resources.” Seamless Migration To Cloud With a large number of residents, each with their own key fobs, Anthony Walker was keen to avoid any disruption during the upgrade and wanted to ensure that the process was achieved as seamlessly as possible. Configuring the physical hardware was helped by the installation team’s existing knowledge of STANLEY Products & Solutions’ technology. On-site training was also provided by experts from STANLEY Products & Solutions and, on the very rare occasion when there was a problem, a full support and advice package was available. The use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforwardInstalling a new access control system can often result in replacing existing key fobs with new ones – not only is this costly and inconvenient but there is also an administrative burden associated with transferring all the information to the new devices. However, all these issues were circumvented, as the use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforward – so much so that tenants didn't even realize any change had taken place. In addition, having access control data in the cloud means that it is always backed up. Enhanced Safety And Security BCH’s Anthony Walker considers the installation a total success and concludes, “I initiated this upgrade project because I firmly believed that it would improve tenant satisfaction and make our overall operation more efficient.” He further added, “I’m delighted that both of these objectives have been achieved and that STANLEY Products & Solutions’ access control technology has improved security, safety and protection across our estate.”
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8,8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Detecting And Deterring Power Thefts Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometers distribution network and 4,386 kilometers of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. Bosch Video Security And Intrusion Detection Systems For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS) As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. All systems and cameras are monitored by security personnel at the company’s control center in Recife. IP Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
AxxonSoft technology speaks to product simplicity, ease-of-use and advanced functionality during the FIFA World Cup in Russia. Within the framework of preparation for the 2018 FIFA World Cup in Russia, AxxonSoft's tech support customized settings on more than 1,350 video channels at 3 stadiums and at a central monitoring station to meet the Ministry of Internal Affairs' needs through a centralized monitoring system. AxxonSoft, in collaboration with this global high caliber event, launched this state-of-the-art technology system within just 1 month, utilizing team members to rollout. Videos were streamed from stadiums and surrounding territories, fan zones, and other locations deemed critical from the point of security Situational Video Analytics AxxonSoft's Intellect software managed a total of 960 video surveillance channels at Samara Arena, Mordovia Arena, and RZD Arena — the latter of which was used as a training base for referees. 250 of those channels employed AxxonSoft's situational video analytics to monitor the stadiums, 41 license plate recognition channels to monitor vehicle traffic, and 9 facial recognition channels to monitor for individuals prohibited from accessing the stadiums. Video monitoring was also integrated with access control, fire and security alarm systems. The Ministry of Internal Affairs' central monitoring station, powered by AxxonSoft's Intellect PSIM platform, pooled over 390 video channels from all 11 World Cup host cities with video feeds displayed on an interactive map. Videos were streamed from stadiums and surrounding territories, fan zones, and other locations deemed critical from the point of security for participants and guests of the World Cup. Integrated Access Control Software The World Cup stadium security project included requests to integrate access control software, as well as develop a screen manager to adaptably manage camera layout and the video wall. These functions were successfully implemented at the World Cup stadiums and will be incorporated in Intellect 4.11.0. Over 9,000 Intellect-powered video surveillance cameras were used to monitor the security of over 2 million spectators The Intellect PSIM platform was employed in various areas of 10 out of the 12 stadiums where 49 World Cup matches were played. Over 9,000 Intellect-powered video surveillance cameras were used to monitor the security of over 2 million spectators who attended the games. AxxonSoft software was also widely used at training camps, fan zones, transportation infrastructure, and other sites where teams and fans arrived and moved around the country. Advanced Stadium Security Technology “The team at AxxonSoft were really excited to be part of a project of this caliber. We were able to demonstrate product simplicity, ease-of-use and advanced functionality through our stadium security technology. The FIFA World Cup was a great success in Russia and just proves how we can work together with top agencies and companies to provide a safe environment for all,” says Global Marketing Director for AxxonSoft, Colleen Glaeser. FIFA president Gianni Infantino called the 2018 World Cup the best in its history. In addition to commenting on match attendance and television viewership numbers, Infantino gave high praise to the quality of infrastructure and security.
Located in the Northern Italian town of La Spezia, the Biblioteca Civica Pietro Mario Beghi is a state-of-the-art public library with an extensive collection of books and media across three floors. The 1,560-square meter facility with its bright, modern interior architecture was completed in April 2017 in a historic building remodeled by the architect’s firm 5+1AA. It continues the region’s long literary tradition: The harbor town is situated on the “Golfo dei Poeti” (meaning “Poet’s Golf”), named for the many writers and poets who have lauded the coastal area throughout history. EN 54 Fire Detection And Alarm System Standard Aside from a self-service book lending station, a child reading room and a 72-seat auditorium, the Beghi library is also home to the La Spezia Institute for the History of the Resistance and the Contemporary Age. With so many valuable books and original documents under one roof, end-to-end fire protection according to the high demands of the European Union’s EN 54 fire detection and fire alarm system standard – plus demands by the local fire brigade – was a prime requisite from the start. Choosing a fire alarm and evacuation solution for the library in an open tender, the municipality of La Spezia had an open ear when local system integrator Bagnone SNC proposed a comprehensive solution: An interface between a high-end fire alarm system and evacuation system delivered by Bosch as the single provider. Convincing the officials, the Bosch system could be installed discretely without disturbing the library’s upscale interior design. Addressable Fire Panel 1200 Series The comprehensive solution enables automated alarm messages and public addresses over wall-mounted speakers After receiving the contract, Bagnone SNC installed the Addressable Fire Panel 1200 Series from Bosch interfaced via a serial connection with the Plena Voice Alarm System, supporting also multi-stage evacuation. The comprehensive solution enables automated alarm messages and public addresses over wall-mounted speakers from Bosch that match the library’s color palette. The system accurately detects fires via automatic optical fire detectors and three beam smoke detectors strategically placed across the building. Alarms can also be triggered via manual call points, while in the case of an emergency, pre-recorded messages, sounders and strobes direct building occupants to safety. As a result of the interfaced solution, the Biblioteca Civica Pietro Mario Beghi benefits from highly accurate fire detection and efficient evacuation in an aesthetically pleasing package from Bosch as the single provider. “Our expectations have been exceeded in a major way. Everything went as planned from both a technical and a management point of view,” said Claudio Canneti, Technical Public Works Manager, La Spezia Municipality.
As prime targets for criminals, banks have always faced major security challenges. But today, when banks are pressed to increase revenues, improve operational efficiency, and mitigate risk, defending against security threats is increasingly expensive. Two key drivers in the banking sector are customer trust and operational efficiency. Both are significantly strengthened by a quality integrated ‘smart’ banking security solution. Smart Banking Security Solution A robust security strategy is of the highest priority and is usually embedded within the bank’s Risk Management Plan. This enables banks to manage operational risk and compliance demands. The modern approach to bank security design incorporates IT, Channel Management and Identity and Access Management systems into one solution. At the heart of Vanderbilt, systems are compliance with some of the highest industry and regulatory standards. These systems impact all bank functions and help deliver greater trust, operational efficiencies, and excellent customer experience. Vanderbilt Video Surveillance Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated In the bank’s self-service area, Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated. Meanwhile, Vanderbilt’s Seismic detectors protect ATM's 24/7. These detectors give immediate and reliable alerts of attacks on the enclosure, but unlike other detectors, do not register false alarms triggered by passing traffic or the vibrations of the ATM itself. Seismic Detectors And Interlocking Electronic security measures are also used in other banking situations – for example, when a customer claims he tried to withdraw cash from an ATM and was issued a receipt, but no cash – the bank can check with a specialized data department to ascertain whether the money was deducted from the customer’s account. When a staff member unlocks the vault, the door to the secured area simultaneously locks Unique codes grant workers who fill ATMs access to secured areas and the ability to unlock ATM's. The worker's code over-rides any ‘delayed unlock function,' so he can immediately access the ATM and fill it. There are set time limits for the work to be done. The ATM buzzes for a pre-determined time before the machine is due to auto-lock. If the worker needs more time, he can delay this. Once the job is done – the ATM automatically locks. Another example of bank security involves interlocking. When a staff member unlocks the vault, the door to the secured area simultaneously locks. This prevents anyone else from gaining entry until the vault is once again locked. This ensures the safety of staff members and the security of vault contents. Electronic Security There are many layers of electronic security protecting the bank. If the manager arrives early, he uses his card to gain access to the branch office and a PIN to disarm the alarm. His code disables the office and secure area, but the ATM's, vaults and safe deposit boxes remain armed. A Central Monitoring Station is alerted to the early entry. They need to know whether the entry is routine or under duress. The monitoring station views the manager on live video as he executes a pre-determined security procedure and until he hits an ‘All is OK' button. If there is a problem – the manager can send a silent ‘Duress Alarm' rather than the ‘All is OK.' The Monitoring Station can listen in – and if necessary can call the police. Security in banking is an essential issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability – flagship traits of the Vanderbilt brand. Banks wish to operate in an open and friendly layout while ultimately safeguarding their customers, staff, and assets. Vanderbilt's solutions respond to these expectations and enable active safeguarding foundations to be laid.