Health organizations around the world have created the common awareness that maintaining a safe distance between people is one of the best practices to avoid being exposed to COVID-19 and in slowing its spread. Effective social distancing As various countries and regions push to reopen businesses and relax stay-at-home orders, social distancing remains an ongoing requirement. More than that, crowd density information is also considered a significant reference in managing the ‘social dist...
Climax will once again be exhibiting at 2020 International Security Conference & Exposition, ISC West, in Las Vegas on October 5th-8th, 2020. The company sincerely invites all their customers to visit the company’s booth #10117 at the show. They will be demonstrating X1, the Alexa built-in voice-controlled smart home solution, for the delightful experiences and possibilities it brings on home automation. In addition, the company’s brand-new Mobile Mates Series realizes complete...
With 73% of all domestic burglaries occurring through a door, it is now more important than ever that maximum-security locks are in place to offer protection from potential break-ins. Mul-T-Lock’s coveted Break Secure 3DS anti-snap cylinder has been specially designed to help locksmiths meet consumer demand for high security locks, and now it has excelled in recent tests – surpassing the British Standard Kitemark BS EN 1303:2015 test 10 times over. To achieve the highest Grade 6 in...
Life has just become much easier for control room operators and security personnel with the launch of 5 new Wisenet P ultra-high definition 4K AI cameras. In addition to capturing superb quality images, the new feature rich cameras from the Hanwha Techwin Premium range are equipped with deep learning video analytics which offer a high level of detection accuracy, while minimizing false alarms. The license-free deep learning video analytics simultaneously detects and classifies various obje...
DITEK, the provider of surge protection solutions, announces the launch of a new Line Conditioning Surge Protective Device model, DTK-LC2, that combines 120V power filtering with reliable protection from unnecessary damage caused by electrical surge events. This unique and compact new combination simplifies implementation of indoor point-of-use surge protection for sensitive electronic systems while ensuring that protection is operating correctly. The convenient plug-in design does not require...
Marks USA, a division of NAPCO Security Technologies, and sister division of Alarm Lock, is excited to announce the debut of new virtual online and field training classes including new pro courses on architectural-grade hardware, locking and access lock lines, by technology or vertical market. Real-World applications Taught by CRL-locking pros for locking pros, the virtual online classes can be a great tech refresher or new introduction, ideal while quarantined or working from home. Field clas...
ADT, globally renowned security and automation provider that serves residential and business customers, has announced that it is providing US $1 million, through its ADT Always Cares program, to support over 100 non-profit organizations in 44 states and Puerto Rico affected by COVID-19. ADT Always Cares program The funds are being allocated in US $5,000 and US $10,000 increments to nonprofits in communities where ADT employees live and work. Local ADT teams are determining which charities to support with choices ranging from soup kitchens and homeless shelters to first responder organizations or any other nonprofit which serves those in need. “All of us at ADT are immensely grateful to our hometown heroes on the front lines who are selflessly continuing to serve their communities while facing the unique challenges of a COVID-19 environment,” said Jim DeVries, President and CEO of ADT. Jim adds, “Through our giving, we are supporting local organizations who share our passion and commitment to create safer neighborhoods, improve lives and help make the world a better place.” COVID-19 relief fund One of the first US$ 10,000 recipients will be Gleaners, an Indianapolis food bank The check presentations will start May 18 and continue through June, 2020. One of the first US$ 10,000 recipients will be Gleaners, an Indianapolis food bank that has distributed over a half a billion pounds of food since 1980. “Gleaners is navigating the hunger relief crisis associated with COVID-19. We are grateful for the ADT contribution which will help us provide emergency food boxes throughout our service area to hungry Hoosiers, many of whom find themselves struggling to put food on the table for the first time,” said John Elliott, President and CEO of Gleaners. LifeSaver celebrations to support police, fire departments As part of ADT’s award-winning Always Cares program, employees volunteer more than 20,000 hours each year benefiting hundreds of non-profit organizations and touching the lives of thousands in need. Examples of support include providing meals through local food banks, building homes with Habitat for Humanity, beautifying Ronald McDonald Houses and much more. ADT also supports police and fire departments through its LifeSaver celebrations, a signature program that recognizes ADT employees and first responders who help save the lives of ADT customers.
With Hub 2, a user will no longer need to live under round-the-clock camera surveillance to know why an alarm has gone off. Like the first generation of hubs, Hub 2 protects the user’s property against burglars, fire, and flood. But unlike its predecessors, it sends not only alarm notifications but also animated series of images from MotionCam motion detectors. Thanks to the optional Wings radio protocol, a built-in battery, and two SIM card slots, Hub 2 is independent of the guarded facility infrastructure. It will continue protecting the user’s family and property, even if the building has lost power and Internet connection. Hub 2 is a control tool for safe homes, offices, shops, or even industrial facilities. The control panel can manage up to a 100 of Ajax detectors and devices on a distance of up to 2000 meters. Protection of any scale And this is not the limit - the ReX radio signal range extender boosts the hub’s coverage area to up to 16 km². The new hub has three channels to communicate with the users and security companies: Ethernet and two slots for SIM cards. The second slot allows users to improve stability by choosing two different GSM operators. And thanks to the instantaneous switching between communication channels, Hub 2 is guaranteed to transmit photos and alarms even with an unstable Internet connection. The list of features of the Ajax hubs expands every year with the regular updates of the OS Malevich operating system. To ensure the future development of the Hub 2, Ajax Systems has increased the amount of ROM and RAM and equipped it with a fast processor.
Even the most reliable security equipment is never fully protected from false alarms. Most of the time, they occur due to simple oversights, hyperactive pets, or incorrect installation. But when the security companies react to false alarms, they risk getting late in case of a real emergency. Some send security patrols to check the unverified alarms right away. The others count the detector triggerings before responding and lose precious minutes in the result. In any case, false alarms bring stress for the consumers and the risk of suffering losses. Prime security companies found the solution in photo and video alarm verification. Both options came with serious compromises. On the one hand, motion detectors equipped with cameras provided a technical possibility to see what triggered the alarm. But the systems that support such devices required frequent maintenance (due to low battery life), delivered low-quality pictures, and were significantly overpriced. Wireless security system On the other hand, video surveillance allowed for a 24/7 monitoring but came with the new difficulties: complicated installation and configuration, total dependence on the building’s infrastructure, high risks of malfunctioning and exploits, as well as the privacy issues. Both solutions didn’t have a chance to become the new security standard. The market required the new cost-efficient solution that would unite the reliability and informing efficiency of the best security systems with the visual capabilities of the cameras. Ajax Systems was one of the first ones to develop the security system with visual alarm verification. Just like they were not the ones to invent wireless security system when launching Jeweller. Parallel transmission of alarms With Wings, the user can view the first snapshot of the situation in under 9 seconds But that fact gave them company an opportunity to rethink the experience of using the equipment from the consumer’s and the service provider’s points of view. They tested and analyzed the weak spots and best practices in the industry and eventually created a breakthrough product in terms of informing speed, communication distance, and battery life. To ensure fast and reliable transmission of the photo confirmations, the company developed a new Wings radio protocol based on Jeweller. The technologies that MotionCam and Hub 2 use to communicate, nullify the interference between channels during the parallel transmission of alarms and pictures. With Wings, the user can view the first snapshot of the situation in under 9 seconds while the alarm signals sent via Jeweller are still delivered in a split second. Camera-equipped detector Photo transmission does not shorten the MotionCam communication range. Just like the rest of the Ajax detectors, the new gadget operates at a distance of 1700 meters from the hub. This number is one of the top performance results for a camera-equipped detector. The Ajax security system still covers an area of up to 12 km², which is enough to protect the multi-story buildings but now with visual alarm verification. MotionCam features an extraordinary - for a camera-equipped detector - autonomy with up to 4 years of battery life. This is not an optimistic forecast with ideal use conditions. Instead, it is an estimate for the typical operating conditions, which includes the regular activations and changes in weather conditions. And they have considered the privacy issue. The MotionCam detectors activate their cameras only if triggered by motion when the system is armed. Indoor motion detector Without a doubt, the Wings technology sets the new standards in the security industry" The users and the security company have no way to access the camera and request to take pictures. All photos are encrypted during transmission, and as they are stored at the Ajax Cloud (just like all the events in the security system’s log). No one analyses and processes the photographs from the detectors. MotionCam and Hub 2 raise the informing quality of the Ajax security system to the next level while preserving its fundamental characteristics. MotionCam can easily replace any indoor motion detector, which makes upgrading the security system as painless as possible. It will forever change the user’s attitude to alarms, yet they still won’t be bothered with the system maintenance for years to come. Phenomenal energy efficiency “I am proud that we can make such inventions. Without a doubt, the Wings technology sets the new standards in the security industry. Fast photo transmission at a distance of 1700 meters with phenomenal energy efficiency, it’s magic that was previously unavailable on the market. We’ve managed to boost the informing quality of the system to the next level and preserve the familiar user experience at the same time”, says Aleksandr Konotopskyi, CEO Ajax Systems.
The COVID-19 crisis causes a burden for companies that have to finish their testing and certification programs because of standards that will be superseded. Examples are the EN 60950-1:2006 and EN 60065 that are used for conformity testing of fire and security products for the Low Voltage Directive 2014/35/EU. Euralarm, therefore, urges to postpone the end date of the co-existence period of the EN 60950-1:2006 and EN 60065 with nine months. Test houses and notified bodies affected by COVID-19 Like others, the fire safety and security industry has to deal with the exceptional circumstances that are caused by the COVID-19 pandemic. The pandemic not only affects the members of Euralarm but also the external resources that work for them such as test houses and notified bodies. As a result of the crisis the available (internal and external) resources are reduced significantly, causing delay and increasing project timescales. Postponing LVD standards testing and certification By the end of this year, the EN 62368-1 certification for the safety of electrical and electronic equipment will come into force By the end of this year, the EN 62368-1 certification for the safety of electrical and electronic equipment within the field of audio, video, information and communication technology, will come into force. To make sure the existing products will comply with EN 62368-1 certification standards, many manufacturers have to convert and/or adapt the products. Because of the COVID-19 crisis manufacturers have already postponed these conversion/adaption projects or are experiencing disruption of the internal testing programs. Others have been informed that outsourced testing would not be performed according to the planned schedule. Meeting requirements of the Low Voltage Directive 2014/35/EU It is, therefore, quite impossible for manufacturers of fire safety and security products to have all their product portfolios compliant to the EN 62368-1:2014 certification standard, before the deadline of December 20th, 2020. This date was fixed by the European Commission long before the pandemic started. In order to allow these companies to finish their testing and certification programs and therefore, guarantee that the products will fulfill the essential requirements of the Low Voltage Directive 2014/35/EU (Commission Communication 2018/C 326/02 of 14.09.2018), Euralarm has urged the European Commission to consider postponing the end date of the co-existence period from December 20, 2020 to September 20, 2021.
Hikvision, an IoT solution provider with video as its core competency, announces the launch of Hikvision Optimus – a system-level middleware product, for integration of events, alarms and data synchronization between HikCentral and other systems like access control, building management systems, and IoT devices. For example, integrating HikCentral with access control systems via Optimus software helps customers operate more efficiently. This integration enables users to quickly and easily receive door alarms, grant or deny access, and synchronize user credentials in both systems. Continuous integrated operations Optimus middleware features connectors that bridge third party systems with HikCentral, regardless of their coding standards. This ensures a long-term, uninterrupted, continuous integrated operations. Optimus offers a wide range of advantages: The majority of use cases can be completed using only one connector as Optimus integrates multiple products and systems. The easy-to-use graphical interface enables integrators with no programming skills to build custom ‘if-this-then-that’ scenarios to match exact customer needs. Third parties can develop their own connectors with Optimus based on their own API/SDK and thus achieve rapid integration times. A built-in health monitoring function provides the operator with a real-time insight into the integration status. Truly scalable approach The Optimus product comes with a flexible and distribution-friendly licensing structure for the connectors. This structure allows connector developers to stay in control of usage, yet determine pricing at their own discretion. “We are very excited to launch an offering that represents a completely new and truly scalable approach to integration with HikCentral. Optimus will enable Hikvision installers and technology partners to easily integrate their systems with HikCentral,” says James Iacuessa, Senior Product Manager from Hikvision. Based on its third-party software development kit (SDK), Hikvision has created a number of connectors with Optimus software: Paxton NET2 AMAG Symmetry
The BR1-WTRSB Bluetooth Emergency Pendant is a small wireless panic button that partners with a smartphone application allowing the user to summon help with one simple button press when an emergency arises, inside and outside the home. When the BR1-WTRSB button is press, BR1-WTRSB utilizes its Bluetooth connection with the smartphone app to immediately report an alarm and relay user’s GPS location directly. During sudden, life-threatening situations, users may not have the opportunity to unlock and make a call on their smartphones for help, BR1-WTRSB can send an alarm and GPS location to caregivers and authorities immediately. Increasing response and rescue time This extra level of protection can also significantly increase response and rescue time. The BR1-WTRSB is IP57 waterproof, lightweight, and has a long-lasting battery life. With the BR1-WTRSB, help will always be a button touch away, whether at home, or when user is out for a walk. Feature of BR1-WTRSB Bluetooth Emergency Pendant are as follows: Bluetooth Emergency Pendant reports an alarm and GPS location via smartphone app when pressed Can be worn as a neck pendant or a wrist transmitter IP57 Waterproof standard Reliable signal transmission Low battery detection Periodic supervisory signals check system integrity Comfortable and Stylish design
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyze the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognizing and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognizing and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behavior analytics Behavior analytics is another field of analytics based on artificial neural networks. Even if recognizing suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and license plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specializing in VMS and modular AI analytics at ISC West 2020. Even if recognizing suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and licence plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyze employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works VMS analyzes the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognized the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognize all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specializing in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specializing in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.
Being in the physical security industry for almost two decades has been an exciting journey, with significant changes that have impacted the world of security. Companies today must be proactive when it comes to securing their facility and are lucky to have so many choices when it comes to security technology. From the beginning, the ISC West show was always at the forefront of new technology and brought together the very best technology and industry professionals in the “City of Lights”. Back in 2001 when I first entered the security world, video surveillance was the key driver, and transitioning from analog cameras to IP video cameras was the talk of the town. In the early 2000s, the ISC West show was filled with video manufacturers showcasing their new IP cameras and the IT folks were just starting to get involved with the security decisions. Back then the ISC West show consisted of a myriad of video manufacturers exhibiting their camera lines. Where now in 2020 the high-profile enterprise-level camera manufacturers dominate the show floor. Over the last two decades, keeping up with the technology advancements of IP cameras was a difficult feat for most camera manufacturers and the high-profile manufacturers who had the funds to invest in R & D were the only ones that survived. Changing the game in video surveillance and access control In the early 2000s, the ISC West show was filled with video manufacturers showcasing their new IP cameras Another huge change that our industry has seen over the years was the increase in the number of acquisitions. Smaller security manufacturers started being acquired by the larger ones, which changed the game in video surveillance and access control. In addition to manufacturers, large security integrators like Convergint Technologies & Anixter were also buying smaller commercial integrators and dominating the market. At ISC West today, you will see predominately high profile – big name manufacturers and integrators where the smaller companies were either acquired or went out of business. Revolutions in the industry The security industry also faced a huge revolution with three major technologies driving growth in the security market – Network-based technologies (IoT enabled solutions), Access Control as a Service (ACaaS) and Mobile Credentials. ISC West saw this evolution coming and created specific educational seminars dedicated to these topics. Another big push that came into play in the last few years was being able to integrate a host of technologies like video and access control by using an open architecture platform. Many partnerships were formed in the security industry due to this massive push for integration. At ISC West, we now see many companies having their partners sharing booth space. This helps reduce costs for exhibitors in addition to giving smaller companies credibility by being recognized with the bigger players in the industry. In addition, ISC West makes it easy for attendees to plan out their show schedule in advance with the mobile app; creating a convenient way to access show information from mobile devices. From the beginning, the ISC West show was always at the forefront of new technology Emerging excitement Today, ISC West continues to be an exciting show that is jammed packed with educational sessions, networking events, and new pavilions that help segment the security industry into different sectors. An example of some new technology pavilions includes drones & robotics, loss prevention & supply chains, and emerging tech. All new start-up companies that are 5 years old or less can be part of the emerging tech section of the show. Here entrepreneurs can unveil new and upcoming security technologies; creating a win win situation for any size business looking to make its name known in the industry. New technology, innovations and rising trends Another huge focus at the ISC West show is public safety. A full range of solutions are offered at the Public Safety Pavilion including barriers/bollards/gates/perimeter security, surveillance, access control, and alarms - along with innovative technologies for gunshot and drug detection, license plate recognition, acoustics, facial recognition and AI, connected vehicles, communication systems and devices, alerts and monitoring, and active shooter solutions Today, ISC West continues to be an exciting show that is jammed packed with educational sessions, networking events, and new pavilions and training. Virtual reality demonstrations have also been available at the show to help attendees with preventative measures when it comes to school and public safety. Some new vape and metal detection technology built on the IoT concept will be featured at ISC West 2020 to help combat the vaping epidemic in our country. With active shooter incidents on the rise, metal detection and perimeter protection at schools will be an important part of the show. Awards and showcases When it comes to show press, we have also seen an influx of awards for security manufacturers that are exhibiting at the show. The major security publications have been offering manufacturers the opportunity to submit a product in distinct categories and win a prestigious award at the show. This creates “buzz” about your product and great for social media postings. Live video interviews at an exhibitors’ booth has also become a very popular tool to increase brand awareness and thought leadership for exhibitors. The ISC West show offers numerous ways to drive traffic to your booth and promote new product launches seamlessly. Over the years, the show has created a conduit The ISC West show offers numerous ways to drive traffic to your booth and promote new product launches seamlesslyfor manufactures and integrators to showcase new products and technologies to end users across multiple vertical markets. At the top of the game While the security industry continues to evolve, the one thing that stays constant is the wealth of information that ISC West offers to its attendees. The show always brings together the latest technologies and thought leaders that will continue to change the game in security for years to come.
Security managers, installers and integrators look into a wide variety of factors when selecting a remote video monitoring receiving center to provide continued real-time surveillance of their sites. But there’s one factor which isn’t often taken into consideration, when it really should be. That’s the welfare of the video surveillance operators who are tasked with responding to alarms and ensuring on-site incidents are dealt with appropriately. The fact is, in most UK monitoring center those operators are working extremely long hours: typically 12-hour shifts, often four days in a row. The cumulative effect of that regular extreme shift pattern can be a level of fatigue which is detrimental to the performance of the operators, as well as to their own physical health and mental wellbeing. The result is a reduction in effectiveness of client video security systems. If the operators are compromised when it comes to clear decision-making, the entire monitoring operation suffers. The central aspects of concentration and alertness I’ve worked in monitoring centers for most of my adult life, starting just out of school. When I had the opportunity to begin my own video surveillance and security alarm most In UK monitoring centers, those operators are working extremely long hours: typically 12-hour shifts, often four days in a rowmonitoring center with my business partner Andy Saile, we were clear that operator welfare was a priority. After all, the operator’s job is literally to be alert and responsive, so why would we want to do anything to detract from that? That’s certainly not the case at all remote monitoring centers, though. The vast majority follow the 12-hour shift template, usually in four days on, four off patterns. Anyone who has done any job knows that at the end of a 12-hour shift, fatigue kicks in, and the ability to focus diminishes. That’s particularly the case in roles where concentration and alertness are central to the job. For a video surveillance operator in a monitoring center, fatigue starts to affect the ability to work effectively during the stretch between 9 and 12 hours. That’s the danger period. If an operator misses a criminal incident because of fatigue, that means the security system the client is relying on is not working. The operator is the link between the technology and the police. They are a key component of the whole system. If an operator misses a criminal incident because of fatigue, that means the security system the client is relying on is not working Government guidance After working in remote video monitoring centers and experiencing what we considered both good and bad practice, when Andy and I established our business, we were clear that our operators would work in shifts that were no longer than nine hours at most. This delivers the best results for our customers and our staff. Our feeling was backed up by UK government guidance on designing video surveillance control rooms. The Centre for the Protection of National Infrastructure has produced a detailed publication called 'Human factors in video surveillance control rooms: A best practice guide'. This publication says: “12-hour shifts, although common in many settings, rIf the operators are compromised when it comes to clear decision-making, the entire monitoring operation suffersepresent a greater risk to health and performance than 8 hour shifts in terms of higher perceptions of workload, fatigue and stress, risk of more errors and accidents, and higher health risks.” Negative impacts on health and wellbeing It further says: “Research confirms that the interruption of circadian rhythms (the 24 hour natural bodily cycle) by shift work can have a negative impact on both general wellbeing and physical health (short and long term), as well as on performance due to general fatigue (i.e. an increased likelihood of errors). Shift-patterns are often designed to meet commercial and operational requirements, but serious consideration should be given to minimizing negative effects on health and well-being by the use of appropriate shift patterns.” The majority of our shifts cover seven or eight hours, and our operators never work more than four in a row. That allows for an average of three or four days between each batch of shifts. The idea is to avoid running staff into the ground, and that in turn makes our company more efficient and effective in the service of our clients. We’ve seen the results in practice: our operators only took four sick days in the past year. That’s four sick days in total, not per operator. It’s a Video surveillance operators have intense jobs, responsible for monitoring and responding to video surveillance and intruder alarm events from commercial and domestic propertiesremarkably low figure in the remote video monitoring industry. Full readiness Video surveillance operators have intense jobs, responsible for monitoring and responding to video surveillance and intruder alarm events from commercial and domestic properties. They liaise with the police, the customer keyholder, end users and any relevant authorities as required. Our customers are equipped with both cameras and motion sensors, which generate alarms on movement. When a movement in a specified zone occurs, the alarm is raised directly with the operator responsible for that site. The response differs from customer to customer depending on their own protocols. If there are dome cameras in place, for instance, they can be utilised to provide additional situational awareness. Escalating risks Traditional intruder alarm monitoring centers required the operator to react to an alarm by calling a keyholder, who would then respond to the incident. But remote monitoring requires concentration, focus, and deductive skills. The information required to make an informed decision isn’t immediately obvious – the The operator must be able to snap to full focus at any point over the course of their shift, and it’s tiringoperator must work out what has moved and establish its cause. There’s no one to provide extra detail. The operator’s art is in working out for themselves what is relevant information in a scene and what isn’t. That requires their full attention. When operators work four days of 12-hour shifts in a row, risks escalate as a result. The risk that the wrong decision can be made. The risk that customers or police are not notified when they should be. There is a real-world cost associated with those decisions. The operator must be able to snap to full focus at any point over the course of their shift, and it’s tiring, whether there’s an incident to respond to or whether the operator is simply prepared to act. Operator skills are diluted if their shift patterns are not considered. Why would you hire someone based on their skillset, and then work them into the ground until they’re too tired to execute those skills? Choosing a monitoring center Security systems and modern technology are crucial ingredients in protecting people and property, but they also require interpretation. A video surveillance operator is an Security systems and modern technology are crucial ingredients in protecting people and property, but they also require interpretationinvestigator and a conduit, bridging the divide between images, alarms and authorities, be they police, security guarding operations or keyholders. To run them into the ground is to diminish their ability to make intelligent decisions. It makes sense, then, to opt to work with a monitoring center which puts the welfare of its operators at the forefront of its business. Start by asking your prospective RVRC about their shift patterns. A monitoring center with respected and happy staff is a monitoring center best able to provide a fully effective service, optimising your security systems and maximizing your investment.
The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry on issues involving municipal alarm management for the approximately 18,000 public safety agencies in the U.S. and Canada. Specifically, SIAC works to minimize the number of false alarms, which are a costly waste of resources for law enforcement jurisdictions. SIAC works directly with leaders in law enforcement at the national level, such as the International Association of Chiefs of Police (IACP) and the National Sheriffs’ Association (NSA); and at the state and local levels to provide expertise and proven strategies to reduce unnecessary dispatches to alarm sites while maintaining the police response taxpayers endorse and deserve. The primary tools for alarm management are education on causes of false alarms and implementation of the Model Ordinance for Alarm Management and False Alarm Reduction. SIAC's Model Ordinance SIAC works to minimize the number of false alarmsRecently both the International Association of Chiefs of Police and National Sheriffs’ Association passed resolutions supporting SIAC’s Model Ordinance. This has resulted in dispatch reductions between 40-50% in jurisdictions where all of the model’s recommendations have been followed. Adoption of some version of the Model Ordinance grows each year. It has been adopted nationwide by over a thousand large cities and small towns. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee through state associations of chiefs of police. “This enables the industry to work with law enforcement leadership on a regular basis and in a formalized structure to discuss and address issues,” says Stan Martin, SIAC Executive Director. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee SIAC worked with the industry on new alarm panel standards that made it less likely an end user would trigger a false alarm. The overall dependability and sophistication of alarm systems have also helped make them less vulnerable to outside forces that can trigger the system. Video and audio technology are playing an ever-increasing role with helping monitoring centers evaluate whether a crime is in progress before dispatching the police. Dramatic changes in the industry Kirk MacDowell was recently selected as SIAC’s new Chairman of the Board. He is a dynamic industry leader with more than 39 years of experience in the industry. SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes in the structure of the electronic security industry. The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes Some cities require a "verified response" before police officers are dispatched to an alarm. This requirement is problematic for the end-user as it requires a third-party confirmation that a crime is being or has been committed. This creates a significant delay in response to crime victims needing immediate help. Fortunately for citizens, the vast majority of cities have rejected ordinances that require confirmation that a crime has taken place prior to police dispatch – verified response. Over the past 15 years only about 34 of 18,000 public service agencies in the U.S. have adopted some form of verified response and 10 of those cities ended the policy. It is important to note that despite the rejection of verified response in favor of the Model Ordinance, there are still individuals who lobby aggressively to curtail police response without verification. This requires a continued and aggressive education program to get in front of these lobbying efforts which are based on false premises and misleading statistics, says Martin. Despite SIAC’s success, there are a number of important issues that need to be addressed, says Martin. First is the high turnover among law enforcement leaders and elected officials. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders who are currently rising through the ranks of their departments. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders Coordinating challenges Another challenge has been the attempt by at least one city (Sandy Springs, Ga.) to fine alarm companies for customer-generated false alarms. SIAC is currently coordinating a challenge of that ordinance in federal court with the state alarm association in Georgia. SIAC is also working on plans for more secure funding and on succession planning so the organization can continue to move forward aggressively in the future. SIAC, Inc. is a 501(c)(6) not-for-profit Delaware corporation. The Board of Directors has two members from each of the major North American trade associations: Canadian Security Association (CANASA), The Monitoring Association (TMA, formerly CSAA), Electronic Security Association (ESA), and the Security Industry Association (SIA), and an elected official. SIAC is funded by donations from individual companies. There are no memberships dues, and the organization sells no products or services.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
When violence or a life-threatening incident occurs, hospitals and other healthcare institutions are often in the crosshairs. Hospitals increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. And even if violence happens outside a hospital – such as an active shooter at a public place – the local hospital must be prepared to respond to an influx of injured victims. When conflicts arise inside a hospital, there is an urgent need to lock the facility down quickly. Security professionals and their teams need access control options that allow lockdowns to occur at the touch of a button. Lockdown capabilities are an important aspect of safety and security for hospitals, doctor’s offices and medical facilities The need for mass notification is also growing in the healthcare environment Fire alarm public address system The need for mass notification – another aspect of responding in an emergency – is also growing in the healthcare environment. Various systems can communicate through the fire alarm public address (PA) system to notify people in an emergency, or, alternately, to use email notification, text messaging, pagers, smart phones and/or personal computers (PCs). In lockdown situations, access control systems provide an emergency button with various triggers in the system – a hospital can lockdown specific units or the entire facility. Data capture form to appear here! Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products, points out that the safety of hospital staff, particularly nurses, cannot be overlooked. In the emergency room, 55 percent of nurses are assaulted in some way each year, which is a high percentage. The safety of nurses and all hospital staff deserves more attention. Duress/emergency notification technology Stankevich says one solution is to use duress/emergency notification technology: staff can carry and wear a ‘panic button” or have a two-key combination on their computer as an alarm trigger. When the staff member hits the panic button, a direct message can be sent to security, alerting security staff about the event and requiring a response. There has been an increase in demand for the safety and security of patients, staff and visitors at healthcare institutions, as evidenced by the recent CMS (Centers for Medicare and Medicaid Services) Emergency Preparedness Rule. As of Nov. 17, 2017, healthcare institutions that participate in Medicare or Medicaid must demonstrate compliance with the rule. Emergency preparedness systems A major challenge in compliance to this rule is balancing patient safety with comfort At its core, the rule seeks to establish national emergency preparedness requirements to ensure adequate planning for both natural and man-made disasters, and coordination with federal, state, tribal, regional and local emergency preparedness systems. A major challenge in compliance to this rule is balancing patient safety with comfort. Institutions should consider two-way communication that enables leadership to disseminate targeted messages quickly and efficiently, while arming all employees with a tool that can alert the appropriate staff should an incident occur. Solutions like this enable swift communication of issues without disturbing patients and visitors unless necessary. Effective response to emergencies “Fortunately, hospitals and their security departments are generally well equipped to respond to most emergency situations”, said John M. White, president/CEO of Protection Management, a consultant who works with hospitals to address their security needs. During the Ebola scare in 2014, however, hospitals had to re-examine their plans to ensure they were prepared to meet the challenges specific to rare and deadly disease. “Hospitals are prepared for most things, but Ebola seemed to have caught the whole world off guard, so people responded in different ways,” says White, who previously was security director of two multi-campus medical facilities before becoming a consultant. Hospital security Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients" He adds, “Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients and to protect other patients and staff. It was a new threat that healthcare organizations had not specifically addressed.” A particular concern was the possibility of an infected person walking into an emergency room and infecting other people and/or requiring facility decontamination. One role the hospital security department plays in such an emergency is to control access to the facility and to control visitors’ movements once they are inside the facility, says White. If the Ebola scare had progressed to the point that a hospital would need to screen patients, security would be positioned at the front entrance to help with that screening and, if necessary, to direct patients to a specific area for quarantine. Protective equipment Security might also need to wear protective equipment to handle a patient who is resistant to treatment, for example. There are often interactions between security personnel and the general public, a scenario that becomes more complicated if Ebola or a similar infection is likely. In general, security would be tasked with maintaining order and keeping people where they need to be, freeing up the medical professionals to do their jobs more efficiently, says White. To prepare for the impact of the Ebola scare, hospitals addressed various training and equipment needs and adjusted their disaster/emergency response plans. Read parts two and three of our heathcare mini series here and here.
A landmark building located on the north side of the River Thames, has seen its security upgraded with Smart R Distribution and systems integrator, Isecurity Systems Limited, working in partnership to ensure tenants are protected by the latest advances in Access Control technology. The Northern & Shell Building at 10 Lower Thames Street, London EC3 which offers dramatic panoramic river views, has an on-site restaurant, a 10 storey glazed atrium and glass wall climber lifts. Among its tenants, Northern & Shell Group occupies approximately 110,000 sq. ft. spread over the ground, 4th, 9th and 10th floors. Single software platform As part of a phased office refurbishment program, the owners of the building reviewed the tools available to the security personnel to enable them to maintain a safe and secure environment for approximately 5,000 people who work in the building, as well as contractors and visitors. “The existing Geoffrey Access Control system had been in use for over 20 years and although it was still operating effectively, its functionality was limited compared to more modern solutions,” said Russell Morgan, Project Manager for Elsenham, Essex based Isecurity Systems, who have had a long term association with Northern & Shell Group. “A decision was made to invest in the latest generation Vanderbilt Security Management System (SMS) which enables users to efficiently manage alarms, lifts, visitors and the photo ID badging process, from a single software platform.” Magnetic stripe readers The Comelit video entry system integrates seamlessly with the SMS control system Russell and his colleagues at Isecurity Systems worked with the Smart R Distribution team to supply a Vanderbilt SMS access control system and they also in the process of replacing the 140 aging magnetic stripe readers with new CIDRON access control readers which support securely encrypted DESfire EV2 contactless Smart Cards from Cambridge UK based Authenticard. Smart R Distribution also supplied a new Comelit ViP video entry system, comprising 8 door stations and 2 control desk positions, which has been installed by Isecurity Systems to allow operators within the building’s 24/7 control room, to communicate and remotely open doors for contractors and couriers who need to gain entry via, for example, to a basement entrance. The Comelit video entry system integrates seamlessly with the SMS control system. Efficient access control solution “We now have a highly efficient Access Control solution which helps us to manage the smooth movement of large numbers of people through turnstile controlled speed lanes located in our reception area and it also enables us to control who can gain access to other restricted areas within the building,” said Dave Wratten, Facilities Manager for Northern & Shell Group. “Isecurity Systems and Smart R should be applauded for working in partnership to ensure that all the equipment was delivered to site exactly when it was needed and then installed to our complete satisfaction.”
Intelligent LiDAR sensor technology from OPTEX, a globally renowned sensor manufacturer, is helping to protect the Belfast Call Centre premises and employees of a Fortune 500 company. Redscan laser sensor The Redscan laser sensor, which was installed by ZEST Fire & Security, a fire and security systems specialist, was required by the company to increase security in private areas of the facility only accessible to authorized personnel. This area, however, is only separated from the rest of the office space by partition walls which leave a gap between the wall and ceiling. OPTEX LiDAR creates a ‘virtual’ detection area that cannot be seen by the naked eye and that can be easily adjusted to the site requirement using the configuration software. In this instance, the REDSCAN RLS-2020S creates a virtual wall between the top of the partition wall and the ceiling of the building, and monitors movement or objects being thrown from one side to the other. OPTEX LiDAR technology OPTEX LiDARs work by analyzing the speed, size and distance of the objects detected OPTEX LiDARs work by analyzing the speed, size and distance of the objects detected, meaning they track the objects within the detection area and understand the ratio size/distance of the object. This provides the ability to accurately detect a specific size of object either at a distance or close up. In the event of any movement being detected, a security alarm is raised, and alerts are immediately sent to the 24-hour on-site security team. Masaya Kida, Managing Director of OPTEX EMEA, says “OPTEX’s LiDAR technology delivers the greatest accuracy of detection. We are constantly working to improve our technology to provide the highest quality sensing solutions.” REDSCAN RLS-2020 series Masaya adds, “Thanks to the high sensitivity and high-speed detection of the Redscan LiDAR sensor, it is able to detect a thrown object as small as a USB stick. The exact point of detection can also be mapped and associated with the cameras monitoring this area.” Justin Doherty, Director at Zest Fire & Security, said, “OPTEX provided us with great support and service throughout. The client was very pleased with the speed and simplicity of the installation, and is very happy with the performance of this new solution.” REDSCAN RLS-2020 series provides 95° detection and either 20x20m or 30m radius detection range and PoE connectivity.
A grocery chain was experiencing a shoplifting problem at several of its locations. The shrinkage loss was significant and was impacting store profitability. Having worked with Alvarado in the past, the chain reached out to Garda Construction and Dale Staton at Alvarado to help craft a solution. The store had an open layout, and while visually appealing, shoppers could easily walk out without passing through a checkstand. EAS equipment would periodically alarm when a patron or thief walked out the door, but because alarms were common, they were generally ignored. Monitored checkstand area Dale explained that the optimum solution would be a barrier that allows patrons to easily enter the shopping floor For purposes of theft control, Dale explained that the optimum solution would be a barrier that allows patrons to easily enter the shopping floor, while providing a physical deterrent from exiting the store without first passing through a monitored checkstand area. Acting on Dale’s suggestion, the store installed Alvarado’s SW500 motorized gate with camera-based detection and presence technology, along with Alvarado’s modular post and railing. After patrons pass through the exterior bi-parting doors, they approach the gate to enter the merchandise area. The gate opens automatically, allowing access. When the gate is closed, if a patron (or thief) walks up to the gate to exit, a pulsing alarm sound warns the patron and alerts store personnel. If the patron backs out of the detection area, the alarm stops. If the patron continues and attempts to push or pull the gate open, a sustained alarm provides additional notification. Fewer false openings and unwanted alarms The use of camera-based detection provides significant benefits. Traditional detection technologies, such as microwave or PIR, make it very difficult (and sometimes impossible) to accurately define motion and presence sensing detection areas, resulting in unwanted openings and false alarms caused simply by normal store traffic patterns. After installation of Alvarado’s products, the traffic pattern into and out of the stores changed dramatically Alvarado’s camera-based detection technology, which is installed in the top cap of the gate, allows both the entry and exit sensing areas of the SW500 to be accurately defined using an included software application. An accurate detection pattern results in substantially greater application flexibility and far fewer false openings and unwanted alarms. After installation of Alvarado’s products, the traffic pattern into and out of the stores changed dramatically. Camera-Based motion detection Store personnel also commented that numerous patrons suspected of being shoplifters stopped coming to the stores. The overall result was a significant decrease in theft and improved profitability that more than justified the equipment purchase and installation expense. From traditional retail turnstiles and gates, to the innovative SW500 motorized pedestrian gate with camera-based motion detection, Alvarado provides an array of entry control solutions to retail customers – as it has done since 1956. Our full product portfolio offers inexpensive and effective methods of controlling pedestrian traffic and shopping cart flow patterns and reducing shoplifting and shrinkage in retail and grocery stores.
Recently, Planet Fitness, with the help of their preferred system integrator Adirondack Direct, incorporated a video surveillance solution from Hanwha Techwin and Genetec that not only enhances security, but also improves operations. When leadership evaluated security at their 70-plus corporate run locations a few years ago, they chose to incorporate a video surveillance solution that would address security needs and would be advanced enough to help with management and operations. Each of Planet Fitness’ corporate-owned clubs throughout North America is outfitted with approximately eight to 15 video cameras that provide around the clock coverage of the parking lot, lobby, break room, the fitness area where members workout and other key areas – without invading private areas, such as locker rooms and other intimate spaces. After issuing a Request for Proposal, Planet Fitness Senior Vice President of Corporate Club Operations Jim Esposito said they tested several of the leading camera and video management software (VMS) solutions, but ultimately decided on Hanwha video surveillance cameras managed by the Genetec Security Center platform. Esposito said they wanted to use Hanwha’s 360-degree cameras in particular because they provide more coverage, yet they save in hardware expenses because fewer cameras are needed. 360-degree fisheye camera Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video at a higher framerate with true day and night function. Built-in on-camera de-warping allows instant access to PTZ, quad view, and panorama views. Alarm triggers for the Hanwha SNF-8010 include intelligent motion detection, audio detection, tampering detection, alarm input and network disconnection.Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed A typical system setup at Planet Fitness includes placing cameras 25 feet from the wall and 50 feet apart which provides almost 2,000 square feet of coverage per camera. Club managers, regional managers and corporate employees manage the system via the Genetec Security Center which provides convenient bookmarks of recorded incidents so that – instead of time spent searching through video – events are already tagged. Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed. “We knew that Planet Fitness would need thousands of video surveillance cameras for this project and it’s very important to consider reliability and functionality as well as durability,” said Adirondack Direct Director of Security and Technology, Tim Collins. “Hanwha has the lowest customer return number and that means that they manufacture products that aren’t sidelined by constant replacement and repairs.” Collins said Adirondack Direct has long recommended Genetec’s Security Center for video surveillance management because it provides the best open-architecture platform, robust features and is easy to use. Security Center blends IP security systems within a single intuitive interface to simplify operations and empowers organizations through enhanced situational awareness, unified command and control and connectivity to the cloud. When a Lunk Alarm is pressed, Genetec’s Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed Business intelligence While the Hanwha-Genetec solution has provided an excellent security system – as well as protection against liability for slip and fall incidents – it’s also improved operations in multiple ways by providing invaluable business intelligence, said Esposito. Planet Fitness has a judgement-free environment for individuals who want to work out, but don’t want to have to endure the negatives so often found in gyms: loud grunts, the clanging of dropped weights and aggressive behavior. Anyone engaging in obnoxious behavior will likely be the recipient of a Lunk Alarm and the flashing lights, sirens and unwanted attention that accompanies it.Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating. In order to monitor and evaluate use of the Lunk Alarms, Adirondack Direct has integrated the Lunk Alarm into the Hanwha-Gentec video solution. When a Lunk Alarm is pressed, Genetec’s Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed. Potential medical emergencies Gyms typically have automated external defibrillators (AEDs) in the event a member suffers a medical emergency. At Planet Fitness facilities outfitted with the Hanwha-Genetec solution, once an AED is removed from its cabinet, a sensor is activated to shut off the music in the club to provide a calmer atmosphere. The system also creates a bookmark in the VMS and notifies managers and regional managers that an AED has been deployed. The Hanwha-Genetec Planet Fitness solution also provides key employee analysis that can help managers identify areas of improvement. Each facility has rubber floors that must be cleaned daily and Adirondack Direct has placed a sensor on a floor scrubber that creates a bookmark and recording in Security Center when the device is moved. Video evidence verifies whether the floor was actually cleaned or if the scrubber was just relocated. Break room sensors Each break room is outfitted with a sensor that creates a video bookmark every time the door is opened. If an employee visits too often, Planet Fitness management can reorient that employee on the proper policies and procedures. For day to day efficiencies, video analytics can be a valuable tool. If an employee is constantly leaving the front desk to go to a storage closet for a particular item, they can make changes including moving the item closer to the front desk. “If during an overnight shift the camera indicates that there was no motion at the front desk for a prolonged period of time, then that’s a problem,” said Esposito. “We expect someone to be in that position greeting and welcoming members so if someone isn’t there, the video can help us understand why.”If an employee visits the break room too often, Planet Fitness management can reorient that employee on the proper policies and procedures A big question for Planet Fitness – that can be answered via video analytics – is have they been losing sales opportunities without realizing it? “What we’re exploring now is a virtual line that counts the number of people that come and go in the club,” said Esposito. “We know how many people check in. So, if a club checks in 500 people in a day, but there are 600 people that enter the door, that can be lost revenue.” Esposito said they chose Hanwha cameras and the Genetec platform because they knew that they needed a solution that was at the forefront of technology, with the flexibility to grow with them and meet their future needs. He added the solution delivers a safe environment that is appreciate by everyone. “It’s somewhat of a security blanket for our members and employees,” he said. “They appreciate our no intimidation mantra and the fact that we have created this safe and secure environment that offers a judgement free zone where people can do their own thing.”
PACOM Systems, which designs, develops, and manufactures state-of-the-art security platforms for enterprise multi-site and campus environments, has announced that Delta Community Credit Union has deployed PACOM’s GMS security platform to its growing network of 29 branches. The value-added reseller (VAR) for this on-going project is Southern Bank Equipment & ATMs of Duluth, Georgia. The $6 billion Delta Community is Georgia’s largest credit union with more than 400,000 members, 26 metro Atlanta branches and three out-of-state branch locations. Approximately five years ago, its access management system was moved in-house. Now, Southern Bank Equipment & ATMs handles hardware needs; system alarm monitoring is performed by a third-party; and PACOM provides the GMS security platform to Delta Community branches nationwide. GMS security platform GMS is a multi-site security management platform, providing integration between access control, intrusion, video GMS is a robust multi-site security management platform, providing integration between access control, intrusion, video, intercom, and virtually any building management or security solution. It is designed to manage thousands of locations simultaneously through a single interface, while providing efficient availability and redundancy. GMS meets end-user demands for a multi-site security system with multiple integrations. System alarms PACOM staff oversaw the transition of Delta Community branches from the old system, and provided training for Delta Community employees to administer the new GMS system. “It was important for us to be able to make changes on the fly and change access privileges quickly,” said Kim Hodgkin, Corporate Security Manager for Delta Community. “With PACOM, our team can complete system updates in-house and manage the system from our corporate headquarters, so we are covered 24/7/365.” False motion detection alarms System alarms are a big part of Hodgkin’s management of the system. He estimates receiving 12 to 36 alarms per week, and he reviews each incident to determine the cause and resolve the problem. The platform is set up for ease of use and less IT involvement" “Sometimes we have false motion detection alarms,” he explained. “The PACOM system sends an immediate alert which enables us to easily access video surveillance so we can understand the problem and resolve it quickly.” Efficient access management Hodgkin says Delta Community, which has more than 1,100 employees and vendors under access management, requires a robust, multi-capability system, as well as dependable vendor support from PACOM. “The platform is set up for ease of use and less IT involvement,” added Hodgkin. “We appreciate being able to control functionality when needed, and look forward to continuing to optimize system management and results.”
PACOM Systems, which designs, develops, and manufactures security platforms for enterprise multi-site and campus environments, announces that Hancock Whitney Corporation continues to roll out the PACOM GMS security management platform to their growing number of bank financial centers and ATMs. Hancock Whitney Corporation operates bank offices and financial centers in Mississippi, Alabama, Florida, Louisiana, and Texas, offering comprehensive financial products and services, including traditional and online banking; commercial and small business banking; private banking; trust and investment services; healthcare banking; certain insurance services; and mortgage services. Multi-Site security management platform GMS meets end-user demands for a multi-site security system with multiple integrations PACOM’s relationship began with Hancock Bank in Mississippi and, after Hancock’s acquisition of Louisiana-based Whitney Bank in 2011, blossomed further still. Currently, the PACOM GMS software platform manages card access and intrusion monitoring at 258 locations and growing. Hancock Whitney does all its own 24/7/365 alarm monitoring from a central location in Gulfport, Mississippi. There are also two company data centers monitored and protected by PACOM GMS. GMS is a robust multi-site security management platform, providing integration between access control, intrusion, video, intercom and virtually any building management or security solution. Designed to manage thousands of locations simultaneously through a single interface, while providing industry-leading availability and redundancy. GMS meets end-user demands for a multi-site security system with multiple integrations. Third-Party monitoring companies “One of the biggest advantages of the PACOM system,” commented Al Tapper, CPP, Manager, Bank Protective Services for Hancock Whitney Corporation, “is it’s all-inclusive with integrated card access and alarms. We have our entire company on a single, integrated platform. We do our own alarm monitoring, which is a big plus because we can immediately verify what is going on in any of our financial centers.” One of our banking acquisitions had two third-party monitoring companies" Tapper continued, “One of our banking acquisitions had two third-party monitoring companies. It was one false alarm after another. That’s dangerous, and it can be quite expensive. With PACOM and self-monitoring, we avoid that. The PACOM system also helps with disaster recovery. We can see what’s going on in our financial centers and know if our alarms are working.” Central monitoring station Hancock Whitney has launched another phase to their company-wide security platform: video integration. When an alarm goes off in any branch, the central monitoring station will automatically be able to see events associated with that alarm. Eventually, all branches and ATMs will have video monitoring with a number of integrated cameras at each location. The system currently provides access to more than 5,000 card holders with varying levels of access privileges. Alarm protocols are in place for each location, with Tapper and his team managing and monitoring the system. “PACOM helps us adapt the system to our changing needs; and when we provide feedback, PACOM listens and will consistently respond directly to that feedback, said Tapper.”
Round table discussion
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?
Security alarm: Manufacturers & Suppliers
- RISCO Group Security alarm
- Vanderbilt Security alarm
- Optex Security alarm
- Bosch Security alarm
- ADPRO Security alarm
- Texecom Security alarm
- DSC Security alarm
- ITI Security alarm
- Klaxon Security alarm
- Climax Technology Security alarm
- Visonic Security alarm
- CQR Security alarm
- Esser Security alarm
- Scantronic Security alarm
- Guardall Security alarm
- Senstar Security alarm
- Elmdene Security alarm
- IR-TEC Security alarm
- Hanwha Techwin Security alarm
- Concept Engineering Ltd Security alarm
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload