Security alarm systems
After the successful study and publication of its book ‘False Alarm Study’, the Fire Division of Euralarm recently decided to continue the study and ask its Technical Group False Alarms (TG False Alarms) as to how the reduction of false alarms can be further progressed. A new European standard might be one of the proposals. Studying False Alarms In Fire Detection False alarms from fire detection and fire alarm systems is a topic that Euralarm’s Technical Group False Ala...
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valu...
Hikvision, a supplier of innovative security products and solutions, has introduced new AcuSense network camera series to its EasyIP 4.0 security solutions. Featuring a strobe light and an audio alarm, the new cameras can immediately deter intruders from entering a prohibited site, further enhancing the safety of premises and property. Faster And Accurate Intrusion Detection Hikvision AcuSense network cameras build on the same cutting-edge intrusion detection functionality found within the exi...
DICE Corporation is pleased to announce and welcome Carl Galsterer as the company’s new chief network architect. Galsterer will be responsible for overseeing all aspects of the company’s information technology infrastructure, including the design and implementation of customer networks and process standardization. More About Carl With over 16 years of experience in network engineering as a senior engineer, Galsterer was pivotal in building the Charter Spectrum network throughout Mi...
India’s foremost shop window and business hub for the security industry, Secutech India, is set to return from 25 – 27 April 2019 against a backdrop of rising government investment in smart city projects. Jointly organized by Asian Business Exhibition and Conferences Ltd (ABEC) and Messe Frankfurt Trade Fairs India Pvt. Ltd, the 2019 edition of the fair will introduce a new smart home zone to accommodate India’s growing home automation sector. Indian Security Indu...
FIREX International, alongside the co-located IFSEC International, Safety & Health Expo and Facilities Show, has announced that the Protection & Management series of events will be moving to a new dateline of 19-21 May for the 2020 edition at ExCeL, London. FIREX International 2019 Dates Unchanged Gerry Dunphy, Exhibition Director, FIREX, explains: “Major business decisions are made at FIREX every year, and the event has been in huge growth in its home in London, as we anti...
The Security Event - powered by Security Essen arrives at the National Exhibition Centre (NEC) in Birmingham, UK from 9 to 11 April 2019. This major new security exhibition features around 100’s of security brands. Visitors can now register online for the event, organized by Western Business Exhibitions (WBE). Cooperation partner is Messe Essen (Germany), organiser of the trade fair for civil security Security Essen. The British market is one of the most important markets for the security industry worldwide. The Security Event, powered by Security Essen aims to deliver a world-class exhibition dedicated to UK security professionals, installers and integrators. Unrivalled Networking Opportunities The Security Event has been developed with support from ten of the industry’s major players and tailored to precisely meet the needs of the security industry. Numerous key companies from the international security industry will be on site – including Anixter, ASSA ABLOY, Avigilon, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco, Videcon and many more. Visitors can obtain their free event ticket now from the website. Challenges and opportunities within the sector will be discussed by security experts as well as showcasing the latest innovations on the market Under the motto ‘Designed by the industry, for the industry’ - The Security Event will offer a tailor-made education program, alongside unrivalled networking opportunities for security professionals. Challenges and opportunities within the sector will be discussed by security experts as well as showcasing the latest innovations on the market. Accessible Exhibition Venue The Security Event will take place parallel to three already well-established successful WBE exhibitions. These are The Health & Safety Event, The Fire Safety Event, also powered by Security Essen and The Facilities Event. This setup will create synergy, offering visitors relevant added value during their visit to the NEC, Birmingham. The NEC, Birmingham is considered the home of the UK commercial security industry. Thanks to easy, direct links to the British motorway network, mainline train stations and a local international airport – the NEC is the most accessible exhibition venue in the UK. On site 16,500 parking spaces are also available for visitors.
Glass windows and entryways give businesses a bright and welcoming feel. But they can be vulnerable to criminals looking for an easy way to break in after hours. To stop them in their tracks, Digital Monitoring Products (DMP) is pleased to introduce the new 1128 Wireless Glassbreak Detector. 1128 Wireless Glassbreak Detector Designed to detect the shattering of framed glass mounted in an outside wall, the 1128 Wireless Glassbreak Detector is a fully supervised, low-current shock and glassbreak sensor that provides added detection coverage up to 20 feet. By detecting both high and low frequencies, the 1128 reduces the chance of false alarms. It’s also suitable for armor-coated glass. For maximum flexibility and coverage, the 1128 Wireless Glassbreak Detector can be mounted on the ceiling or on an opposing wall. It’s compatible with all DMP 1100 Series wireless receivers and existing wireless transmitters running Version 106 and higher. It uses the supplied 3 V lithium battery.
CHeKT announces a partnership with OPTEX, the supplier of outdoor sensors for intrusion security. CHeKT delivers a visual-monitoring platform for alarm monitoring centers. This partnership with Optex will significantly advance the protection capabilities of security integrators globally. The solution relies on ‘The CHeKT Bridge’, the first product brought to market by CHeKT. With years of development, the CHeKT Bridge premiered in April 2018 at the ISC West trade show. The vision of CHeKT is to allow an integrator to provide visual monitoring services at prices that compete with a traditional intrusion alarm. CHeKT’s President, Wes Usie says, “In today’s culture, when an integrator installs an alarm system and a video surveillance system at a location, there’s no reason why we shouldn’t provide that client with visual monitoring services.” Amplifying The Value Of Sensors With CHeKT’s innovation, OPTEX has found technology that instantly amplifies the value of our sensors and creates truly proactive security systems"“There’s a recognized need in our industry for this exact technology,” said Mac Kokobo, president, and CEO of OPTEX Americas. “With CHeKT’s innovation, OPTEX has found technology that instantly amplifies the value of our sensors and creates truly proactive security systems.” OPTEX will co-sell their existing and new products with the CHeKT Bridge in North America through its current distribution channels. Pricing of the device was not disclosed, but the companies expect to offer the CHeKT Bridge at a cost that allows integrators to remain competitive with existing alarm systems and provide a much higher level of service to the end user. Both companies recognize that a visual monitoring solution must be affordable, scalable and adaptable. Integration Of Alarms And ONVIF Video System “We’re thrilled to partner with OPTEX,” said John Milliron, CHeKT’s Vice President of Sales. “For OPTEX to invest in CHeKT is a tremendous validation of our innovation. The industry is changing rapidly and Integrators must decide if they will adopt innovative technologies to meet escalating consumer demands, police response requirements and false alarm ordinances. “Ring, Nest and others have started a disruption that integrators may not yet have a strategy to address. The CHeKT Visual Verification solution provides an adoptable smart integration of any alarm system and ONVIF video system, existing or new, providing a CS Operator a view of what caused an alarm to occur in just seconds. Together, we intend to reset the Alarm Industry’s best practices.” Quick Access To The Visual Verification Video The platform agnostic Bridge manages cameras locally allowing an operator to access video instantly, unencumbered by firewalls and login credentialsThe CHeKT Bridge pairs on-site cameras with sensors, on new or existing security panels. The platform agnostic Bridge manages cameras locally allowing an operator to access video instantly, unencumbered by firewalls and login credentials. When a sensor of any kind goes into an alarm state, the alarm panel communicates the signal to the monitoring center. Simultaneously, the bridge sends the applicable video to the cloud for viewing by the operator processing the alarm, enabling visual verification of the situation and premises within 5 seconds. This powerful simplistic approach allows central stations to provide a much higher level of service without increasing signal traffic or increasing the time an operator spends processing an alarm signal. The operator can forward the clip, via SMS text, to the emergency contacts when additional verification is necessary, and to the police responding to the alarm. Formidable And Affordable Security Solution “We’re impressed that CHeKT understands the needs of every stakeholder in the security space – end users, integrators and installers, the operators who processes alarms and the emergency responders. This product is an exceptional response to those needs and, paired with our sensors, makes a formidable yet affordable security solution,” said Rob Blair, president of OPTEX’s Security Division. CHeKT has overcome these barriers and dealers can freely design a true security solution that detects a crime before a break-in happensOPTEX’s outdoor rated sensors create reliable detection across a premises’ exterior, detecting motion within inches of a building. With the Bridge connecting sensors and cameras and sending video immediately, “an operator can see troublesome behavior before a person breaks in through the door or window,” Blair said. “When you can communicate to the police that you are watching apparent criminal behavior, instead of reporting an alarm with no other context, the response is much quicker.” Detecting Crime Before A Break-In Barriers into the visual monitoring space were over complicated setups that did not scale into the existing security system and monitoring centers. CHeKT has overcome these barriers and dealers can freely design a true security solution that detects a crime before a break-in happens. “The sensors and alarm systems were doing their jobs, and the camera systems were recording. However, those systems have worked in parallel, not in unison,” Usie said. “Past efforts to create visual monitoring have been cumbersome, slow and expensive. We couldn’t find what was needed…that’s how CHeKT was born, a technology that enables operators to immediately visualize what tripped an alarm.”
GJD has hit the ground running in 2019 with the appointment of Jason Hill as the company’s Commercial Director. Mark Tibbenham, Managing Director of GJD has big plans for the British manufacturer of external motion detectors and LED illuminators, and has recruited Jason Hill to help deliver on his aspirations. GJD Expands In The US Commenting on the new appointment, Mark said: “Even though we were 2017 recipients of the Queens Award for Enterprise, International Trade there are a significant number of markets where we have no representation and Jason can help us identify suitable distributors and partners globally. We are also expanding in the US after opening an office in Los Angeles last year and focusing on the Home Automation market there, Jason is extremely well connected with that sector in North America.” Most importantly GJD has ambitious new product development plans and we need to communicate those effectively to a large potential market" Mark continued to say: “Most importantly GJD has ambitious new product development plans and we need to communicate those effectively to a large potential market. Having worked with Jason over the last few years on a number of projects and partnerships, I felt he was the man we needed to take our business to the next phase.” Home Automation Platforms Jason Hill commented: “It is very satisfying to be working for a British security manufacturer after all these years in the industry. GJD is growing fast and is already recognized as a UK export success story, but there is still so much more potential. I will be busy traveling the world to meet new partners and supporting the US operation as it expands. Mark has already done the hard work of enabling support of GJD products into home automation platforms, so I need to work on market awareness. Reliable human detection in external applications is in huge demand from end users and we have the technology to deliver that, I have also seen the product roadmap for the next two years and there are some great projects on the horizon.” Jason joins GJD from Taiwanese surveillance manufacturer LILIN, where he was UK MD for 20 years and latterly Group Vice President. He has worked in the Security industry since 1990 predominantly with Manufacturers. Founded in 1983, GJD is the UK’s renowned manufacturer, designer and supplier of professional external detector equipment, as well as Infra-Red and White-Light LED illuminators. GJD’s Head Office is based in Heywood, Greater Manchester, UK.
ADT Inc., global provider of monitored security and interactive home and business automation solutions in the United States and Canada, has announced the unveiling of its newly redesigned smart home security system – the ADT Command Panel & Control Platform (ADT Command) – as well as a suite of smart security and home automation products at the Consumer Electronic Show (CES). This year’s theme, “Real Protection,” will highlight the products ADT offers to ensure customer safety from any location. ADT Command ADT Command is a dynamic and innovative wireless panel with numerous smart home capabilities, including seamless set up and control with the ADT Control app, that allows customers to protect and automate their homes from anywhere at any time. “As home automation continues to evolve and become more accessible, we know our growing community of 3 million smart home customers want and expect a security solution that is fully integrated with the latest technology innovations,” said Don Young, ADT Chief Information Officer & Executive Vice President, Field Operations. “With ADT Command & Control, consumers get best-in-class monitoring service from the largest security network, combined with the most cutting-edge technology. The Control platform supports over 250 devices, ranging from carbon monoxide detectors to smart light bulbs, providing custom-fit solutions that provide customers with real protection.” ADT Monitoring And Emergency Response ADT Command customers receive ADT’s monitoring and emergency response, backed by 4,000 monitoring professionals across 10 monitoring centers ADT Command customers receive ADT’s monitoring and emergency response, backed by 4,000 monitoring professionals across 10 monitoring centers, providing 24/7 protection, 365 days a year. Key features include: Smart Security: Know who is arriving home and when, with the 7-inch wireless, touchscreen Command panel that snaps a photo when the system is disarmed using its built-in camera. By creating dynamic scenes and rules, your smart home devices work in harmony to keep your family safe. For example, in case of a fire, the system can be connected to the thermostat, lights and doors, making it easier and safer for everyone to get outside. Connected And Secure Home: Keep your home connected 24/7 with the panel’s battery backup with dual path Broadband and LTE cellular communications. ADT Command features two-way encryption RF sensor technology to help reduce the potential for hacking. For increased control of your home, unique user codes and permission settings can grant access to users only on the days and times you specify. Geofencing And Voice Control Technology: The app’s geofencing technology generates helpful automations and alerts to trigger events, with reminders such as arming the security system when you leave the house. With voice control technology, you can easily control your system simply with your voice. Remote Arming And Disarming Of System: Use the Control app to carry out preset automations when you leave or arrive home, allowing you to remotely arm or disarm your system. No matter where you are, you can rest easy knowing your doors are locked, your lights are on or off and your home is secured. You can even watch live video and images from your mobile phone, tablet or smartwatch, so you can stay connected to your home no matter where your travels take you. ADT Solutions On Display At CES 2019 Located at Veronese 2504 at the Sands Expo Convention Center, ADT will be showcasing several additional products and services that bring users peace of mind and real protection irrespective of where they are. Highlights include: ADT Go: This all-in-one mobile safety app provides a companion with you wherever you go—whether you’re in the car or in a new city. Created in partnership with trusted locator and communication tool Life360, the app offers family check-in and location geo-fencing capabilities, local crime data, driving activity alerts, crash detection and response, roadside assistance, and 24/7 SOS emergency response from ADT’s trusted live monitoring agents. Available in Apple and Android app stores, ADT offers two service options to give you peace of mind that fits your family’s needs. ADT Video Doorbell: The weatherproof, high-definition video doorbell provides front door security, allowing users to receive alerts, photos and videos, when the doorbell is engaged. The doorbell can also reduce false motion events by using object detection, pairing it with other motion data to determine true events and provides superior video quality and crisp wide-angle views with de-warping features. Voice Control Integrations: ADT’s integrations with Amazon Alexa and Google Voice Assistant provides users a hands-free solution for dynamic scenes that deliver a personalized service. Customers can utilize voice commands to arm or disarm their systems, lock and unlock doors, and manage other smart devices like lights and thermostats—making the home not just smarter, but safer. Interactive Crime Map: ADT’s free, interactive crime maps provide up-to-date information on crime statistics, including assault vehicle theft, robbery, and more. This tool assists future homebuyers when considering a neighborhood and helps travelers choose the best places to stay when visiting a new city.
The newest addition to Viking’s line of VoIP paging speakers is a 2’ x 2’ drop-in ceiling tile IP speaker for SIP endpoint or multicast/paging. As an added benefit it can also make standard and/or emergency SIP calls. “Why pay extra installation expenses when you can simply drop in one of the most functional VoIP SIP paging speakers on the market today?” – Greg Yocom, Viking Electronics Engineering Manager PoE Powered Paging Speaker The 22TB-IP is a PoE powered paging speaker. It can operate as a SIP endpoint device for one-way and two-way voice paging. It can also operate as a multicast paging device with the ability to receive up to 10 multicast paging streams. A hard-wired button connected to the 22TB-IP can initiate a SIP phone call. The built-in microphone enables monitoring of an area in the event a silent alarm is activated. The 22TB-IP can be programmed to automatically adjust to ambient room noise. IP Programming Software Separate audio outputs from the 22TB-IP can connect to the line level input of an external amplifier or power up to 5 additional 8 Ohm speakers or horns. An on-board form-c relay contact can be programmed using the included IP Programming software to trigger a strobe light, door strike, doorbell and more.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security Industry Experts The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritize Safe School Environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organizations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organizations recognize their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilize, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack Of Consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings. A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right Protection Equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive Security Plan Quantifying and mitigating risk are the jobs of security professionals and school administratorsA risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay Adversarial Behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorized visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier Target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security. It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety And Security Components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms Layered Security While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting Existing Hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect Anomalous Data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make Critical Decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyze more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple Camera Streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing color. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion Detection Scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyze video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
Security integrators are often tasked with a multitude of responsibilities which could include a variety of installation, integration or design tasks made up of sprinkler systems, fire alarms, access control, HVAC, video surveillance systems and networks; and then pile on maintenance, training and analytics. Traditionally, most security integrators have installation backgrounds but are now expected to be IT savvy, too. Even the most proficient IT professionals may not fully grasp the complexity of adapting computer servers for use with video systems. It’s not the area of expertise of security integrators as the complexities between IT data and video data are significant. Therefore, security integrators depend on system builders to provide solutions to meet the needs of video systems expertly and with few hassles. It’s a simple enough ask, but not so easy to deliver. Tom Larson, Chief Technology Officer, BCDVideo, lists some of the challenges: Data capture form to appear here! The Gap Between Reality And Customer Expectations End users should expect a security integrator to provide services and a wide product line to ensure the right equipment for any size job Sometimes there is a gap between what a security integrator expects from a video surveillance solution (in terms of validation testing, dependability, technical support) and the performance of available choices, especially in the case of low-cost or generic equipment. Extra service and support are needed to bridge the gap. Unfortunately, some manufacturers entering the market have failed to deliver, and integrators (and their end user customers) have paid a price. The Network Is Often Overlooked Security integrators should pay special attention to engineering the network and calculating the bandwidth and storage needed for video projects, especially given how technology evolves so quickly. Security is an appliance-driven business, and integrators who just want to add another server to expand storage or functionality without configuring the network run the risk of i/o bottlenecks and other system failures. End users should expect a security integrator to provide services and a wide product line to ensure the right equipment for any size job. Unfortunately, traditional IT resellers are often married to a singular solution limiting their knowledge of a good fit for the job. Buying a video server based on a low price aggravates the problem, as “Frankensteined” or generic servers tend to generate additional costs over time Servers Are Mistakenly Considered A One-Time Expense One mistake purchasing agents make and security integrators have a hard time quantifying is viewing video storage as a capital expense (as one more component of a security system) rather than considering ongoing operating expenses. Buying a video server based on a low price aggravates the problem. “Frankensteined” or generic servers tend to generate additional costs over time, such as firmware or supply chain issues, and some systems builders have failed to provide support to offset those costs. In fact, the high costs over time of supporting inexpensive servers have been unsustainable for some system builders, who have left integrators and end users holding the bag, and in some cases, the liability. Adapting To Sustainable Strategies “Systems builders to the video surveillance market must adapt and invest to meet the demands of security integrators’ expectations, and they need a business model that enables them to provide a substantial level of support and commitment,” says Larson. “Working with high-quality manufacturers and providing tried-and-tested, certified equipment upfront ensures manageable costs over the life of the system. Products that are fully tested and contain no firmware bugs ensure smoother installations. By providing adequate technical support to the security integrator and managing IT variables over the life of the system, the systems builder makes it possible for a security integrator to specify and install a video server as easily as any other system component.” Keeping IT professionals on staff to deal with server issues is cost-prohibitive for security integrators Taking a longer-term view and considering total cost of ownership is a more sustainable strategy for integrators, says Larson. Investing upfront in a higher-quality server is rewarded by dependability and lower service costs over the life of the system. And the lower costs of supporting a higher-quality server create a more sustainable business model for the integrator, thus ensuring the integrator and end user will have ongoing support. Adapting Server Technology To Video Applications Security integrators deliver a different skill set than IT integrators, who tend to be more hands-on in terms of updating firmware and providing maintenance. Keeping IT professionals on staff to deal with server issues is cost-prohibitive for security integrators, who therefore depend on systems builders to provide that expertise. They develop a long-term relationship with a systems builder they can depend on to meet their needs for each job. Larson says the best scenario for a security integrator is a combination of a high-quality server systems builder that understands the specific needs of the security integrator market. Adapting server technology to video applications requires knowledge of both disciplines. Dependable technology adapted to the needs of the video channel ensures successful installations and happy, long-term customers.
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-Device Artificial Intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent Automotive Solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualization. Based on 10nm ultra-low power processing technology, the CV25 chip is optimized for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual Security Guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-Integrated Devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber Security Standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
Kunsthalle Mannheim is a museum in Germany which contains a major collection of important art. Reliable technology, integrated in a networked solution from Bosch, ensures all-round protection on a total of 3,600 square meters of exhibition and storage space. A special focus of this is optimally safeguarding people and property without interfering with visitors’ encounters with priceless works of art. Customized Security Solution And Integration Since its inauguration in 1909 over a century ago, Kunsthalle Mannheim has acquired a global reputation as a very special place to experience modern art. The complex comprises a building in Art Nouveau style dating from 1907, underground storage rooms, a main building, and the newer Hector Building, completed in 2018. Coinciding with the opening of the Hector Building, a customized security solution installed and integrated by Bosch experts also debuted. The system’s components are almost invisibly connected with the various exhibition areas. The modular alarm system UGM 2040 and around 260 state-of-the-art video cameras monitor the interiors of Kunsthalle Mannheim as well as the open areas around. Fire Protection All of the security equipment is controlled by the Building Integration System from Bosch Comprehensive fire protection is provided by a fire alarm system spanning 700 detection points. There are 330 speakers in case it should ever be necessary to evacuate visitors and employees. All of the security equipment is controlled by the Building Integration System from Bosch. Modular Alarm System Thanks to this new solution, Kunsthalle Mannheim is facing the future with confidence. The modularity of the alarm system UGM 2040 allows fast, cost-effective implementation of modifications and extensions. Professional service technicians from Bosch regularly maintain it and perform any required repairs to ensure highly reliable operation and low overhead.
Tottenham based Lancasterian Primary School is focused on the delivery of a safe and welcoming learning environment, ‘where everyone is included and creativity is valued.’ The school is persistently seeking new ways to enhance and improve its offer to the children and the local community. The school had an established high-profile intruder alarm system on site and consulted with Amthal to create a maintenance program that could operate with no disruption to learning timetables. Safe Learning And Working Environment Proactively worked with us to create a maintenance schedule for our intruder alarm" Says Sam Judge, Lancasterian Primary School’s Assistant Site Manager: “The security of our school is naturally a top priority, to ensure staff and pupils can work and learn in a safe environment. We see a careful balance to ensure our focus on creation of a welcoming and nurturing school for pupils and the local community is not overwhelmed.” “It’s something we are consistently reviewing and when we approached Amthal, we were instantly impressed with their understanding of our objectives. They proactively worked with us to create a maintenance schedule for our intruder alarms, to ensure they continue to operate to maximum capacity for the ultimate protection of all who learn with us, and provide total peace of mind and assurance to the site management team.” Well-Maintained Security System An effective school building security alarm system for which users are fully trained" Mark Golding, Amthal Account Manager added: “Ensuring that pupils, buildings and equipment are protected requires an effective school building security alarm system for which users are fully trained, alarm systems that are regularly maintained and service inspections that are logged and documented.” A well-maintained system will ensure compliance with building safety regulations and also help to ensure the school passes OFSTED with flying colours. Amthal is thrilled to be working with schools such as Lancasterian Primary to ensure its security for the benefit of staff, pupils and visitors.” Satisfying User Needs Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire & security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.)
Your Homes Newcastle (YHN), which manages more than 26,000 properties on behalf of Newcastle City Council, is taking an innovative approach to fire safety with a pilot project utilizing thermal imaging cameras in tower blocks. The ALMO has installed the thermal imaging cameras in three of its 45 multi-story blocks across the city in a trial partnership with OpenView Security Solutions, with the project attracting praise from Tyne and Wear Fire and Rescue Service. Mobotix M16 Thermal Cameras The trial of the Mobotix M16 Thermal Camera sees the cameras installed in bin chute rooms The trial of the Mobotix M16 Thermal Camera sees the cameras installed in bin chute rooms. The cameras detect minute increases in temperature, triggering an alarm in YHN’s central enquiry center before any fire has had a chance to take hold, meaning within seconds of a possible fire starting the alarm is raised with the fire service. The camera continually monitors the temperature in the room, with information relayed back to the fire service, enabling them to better prepare for responding to the fire. David Langhorne, YHN’s Assets and Development Director, said: “The tragic events at Grenfell Tower have undoubtedly put fire safety in multi-story blocks under a microscope, but we have been trialing new measures in our multi-story properties for some time. Faster Fire Detection “We pride ourselves on being innovative, so it was an easy decision for us to test something that had not yet been adopted elsewhere. The early detection system provided by the camera has many benefits, but, most importantly, the faster response time from the fire service means the potential impact on residents and their properties is minimized and they and their homes are far safer as a result.” “This trial system is one of many fire safety measures currently in place in the blocks we manage across the city, where we also have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers, and bin room sprinklers.” Reducing False Fire Alarms Alan Robson, Assistant Chief Officer at Tyne and Wear Fire and Rescue Service said “It’s great that YHN is innovating in this way. Using technology to support the monitoring of storage areas such as this helps improve the information we receive about incidents. This technology can reduce false alarm calls and improve our response to confirmed fires.” The standard CCTV lens provides a live feed for further verification of events OpenView Security Solutions is the UK’S largest privately-owned independent security company and a leading national supplier of fire, electrical and mechanical services to the public and private housing sectors. Thermal Imaging The Mobotix M16 Thermal camera’s lens is triggered when an unexpected heat pattern occurs and automatically sends an alert to the central control room. Images from the thermal lens are automatically presented to operators enabling the exact location of hotspots, such as smouldering fires, to be pinpointed. The standard CCTV lens provides a live feed for further verification of events. YHN’s existing infrastructure, which uses Openview installed equipment in the blocks to link alarms through to its enquiry center via Jontek, meant the new approach could be easily implemented without any disruption to residents. Innovative Fire Protection Solutions Andy Ward, Sales Director of OpenView Security Solutions, added “This innovative fire protection solution enables housing providers to ensure a safer environment for residents and minimize the incidence of false alarms. It now forms part of our expanding portfolio of fire and life safety solutions, one of the fastest growing areas of our business, and consolidates our leading position in the public and private housing sector.” Commenting on the partnership with YHN and OpenView, Frank Graham, Mobotix Regional Sales Manager, said: “We are very happy to be working so closely with both YHN and Openview in the development and provision of an innovative solution for such a serious issue. Mobotix cameras have inbuilt intelligence to meet all the requirements of integrator and end users alike and we look forward to a longstanding and fruitful partnership with both organizations moving forward.”
One of the world’s most famous hotel-chains, DoubleTree by Hilton, part of Hilton Worldwide, has selected a high-performance fire system from Advanced Fire Systems Inc. at their eight-story, 366 room hotel in Boston, Massachusetts. The challenge was to replace an existing system, integrate speakers to all guest rooms and ensure that all audio messages and strobes were fully synchronized across the hotel, in the event of a fire situation, without the need for costly re-wiring. Advanced Audio System The Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync" An Advanced audio system was specified by the stylish, four-star, DoubleTree by Hilton Boston North Shore as it met regulatory requirements for the low frequency 520 Hz warning tones necessary for the sleeping areas of the hotel and its award-winning emergency communications system, PerfectSync, synchronized tones and digital messages to ensure compliance with local codes. Christopher Whitmarsh, President at Hayden Systems, Inc., commented: “I was confident that the Advanced equipment could meet the application requirements based on my knowledge and experience with the equipment. In this case, the Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync, ensuring the hotel adhered to strict guidelines. The system integrated seamlessly into the fabric of the building and provided the client with a solution that met their needs as well as satisfying the rigorous demands of the local fire authority.” PerfectSync Emergency Communications System PerfectSync automatically synchronises audio, voice and strobe signals across Advanced’s Axis AX fire alarm networks dynamically, as conditions change. Synchronization of audio and visual signals across multiple notification zones, floors & areas, prevents confusion in an emergency situation and aids in meeting intelligibility standards. Using high performance, distributed, digital amplifiers that come standard with an integral backup amplifier and power source, should a fire spread to an adjacent floor or area, audio and visual indicators come on immediately, and the audio messages will quickly synchronize with any identical audio message on the system. Advanced’s Axis AX Fire Alarm System Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format, offering a vast range of configurations, control and interface options all with simple set-up and operation. The Axis AX systems includes easily networked panels, audio panels and command centers, DynamixSmoke smoke control and a huge range of peripherals, devices and interfaces that make it ideal to suit almost any fire and life safety application. Advanced Fire Systems Mike Troiano, President and CEO of Advanced in the USA, said: “Advanced fire systems are specified in some of the most famous and prestigious hotels across the world and it was a pleasure to work with our customer Hayden Systems, Inc. to provide a system that will meet the rigorous standards required and ensure that the DoubleTree by Hilton’s staff and guests alike are safeguarded.” “PerfectSync insures synchronization of audio, paging and strobe signals without the need for special wiring or programming, it’s all done automatically by the Axis AX system. Since its introduction in 2014, Award Winning PerfectSync has built a solid reputation with engineering firms and fire authorities alike for its ability to deliver superior performance. The end result is a technologically advanced, easy to use audio and visual communications system that improves life safety for all of the occupants of a building in an emergency situation.”
With a mission to provide and maintain good quality homes for Blackpool Council’s tenants and leaseholders, BCH has won a number of awards and accreditations for housing, repairs, customer services and community projects. The safety and security of residents is a high priority for BCH, which is why it has used products from STANLEY Products & Solutions for many years. During this time the primary system was made up of a GDX5 door entry system, along with an Indigo 1000 access control system, which were fully integrated. “We have a policy of continual improvement in the service we provide,” explains Anthony Walker, Mechanical & Electrical Officer at BCH. “Although the previous configuration performed well, I was convinced that the business and operational benefits of remote monitoring and the cloud could be utilised by upgrading the Indigo 1000 with a PAC 512 access control system.” Innovative Remote Monitoring Platform The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each doorAn upgraded system was specified for a BCH site comprising 80 blocks. It utilizes the existing GDX5 front panels, which have been integrated with the PAC 512 controllers to create a highly innovative remote monitoring platform that can be accessed via a PC, tablet or smartphone. This is achieved using a general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network. It provides an enhanced service over traditional mobile/landline telephone connections and makes administration of the system more flexible. The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each door. Each door also has a programmable auxiliary input that may be used for alarm system integration, and an auxiliary output that enables a buzzer or strobe to activate when security is breached or a door is left open. Email Alerts During Equipment Failure In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restored, while the system features an auto-dial or email alert program that, in the event of an equipment failure at one of the locations, sends a notification so that the issue can be quickly rectified. In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restored Explaining the benefits of using PAC 512, Andrew Burton, area sales manager at STANLEY Products & Solutions, says, “The cloud revolution has had a dramatic effect on the physical security equipment industry. Its development into access control technology means that not only can a system be managed remotely, specific personnel can even be granted or denied access to certain areas at different times, making it not only good for security but also for health and safety. “Furthermore, in the event of a theft or antisocial behavior, it is possible to pinpoint exactly who was where and initiate appropriate action, using the live events and reporting.” Remote Diagnostics And Servicing BCH can also access information via the PAC Residential Cloud – helping to further enhance its remote monitoring operation. Remote diagnostics, technical issues and servicing can be carried out, and it’s also possible to remotely view status, set and unset a system and access an event log. For instance, if someone loses a key fob, BCH can access their information, carry out an authorization check, let them into their abode and, if necessary, deactivate the missing device. It also allows the incumbent installer to remotely access the system’s software to physically input any special information such as extended door release times for specific residents. Programming Key Fobs Remotely BCH worked with STANLEY to generate reports which show when a key fob hasn't been used for a specific period of timeWith a number of vulnerable residents, BCH worked with STANLEY Products & Solutions to generate reports which show when a key fob hasn't been used for a specific period of time. Anthony Walker comments, “If the report indicates non-use of a fob, we can take measures to deactivate it, and/or can send someone over to check on the person concerned and, if necessary, notify next of kin or the relevant authorities. “In extreme circumstances, we can also remotely open doors to allow access to the emergency services. Having the ability to immediately and remotely program fobs has been particularly beneficial to our customers who previously would have had to travel to our offices for this to be completed - saving both time and money and making best use of our resources.” Seamless Migration To Cloud With a large number of residents, each with their own key fobs, Anthony Walker was keen to avoid any disruption during the upgrade and wanted to ensure that the process was achieved as seamlessly as possible. Configuring the physical hardware was helped by the installation team’s existing knowledge of STANLEY Products & Solutions’ technology. On-site training was also provided by experts from STANLEY Products & Solutions and, on the very rare occasion when there was a problem, a full support and advice package was available. The use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforwardInstalling a new access control system can often result in replacing existing key fobs with new ones – not only is this costly and inconvenient but there is also an administrative burden associated with transferring all the information to the new devices. However, all these issues were circumvented, as the use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforward – so much so that tenants didn't even realize any change had taken place. In addition, having access control data in the cloud means that it is always backed up. Enhanced Safety And Security BCH’s Anthony Walker considers the installation a total success and concludes, “I initiated this upgrade project because I firmly believed that it would improve tenant satisfaction and make our overall operation more efficient.” He further added, “I’m delighted that both of these objectives have been achieved and that STANLEY Products & Solutions’ access control technology has improved security, safety and protection across our estate.”
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8,8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Detecting And Deterring Power Thefts Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometers distribution network and 4,386 kilometers of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. Bosch Video Security And Intrusion Detection Systems For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS) As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. All systems and cameras are monitored by security personnel at the company’s control center in Recife. IP Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Consolidation – a decrease in the number of companies in a market achieved through mergers and acquisitions (M&A) – has been an important trend among manufacturers in the physical security market for many years. More recently, the trend has also appeared to extend to the integrator market. Larger integrators have been buying up other large integrators; in some cases, they have also been buying up smaller, regional integrators to expand their geographic coverage area. We wondered if this week’s Expert Panel Roundtable has noticed the trend. We asked: Has consolidation among security companies shifted to the integrator/installer market? What is the impact?