After the successful study and publication of its book ‘False Alarm Study’, the Fire Division of Euralarm recently decided to continue the study and ask its Technical Group False Alarms (TG False Alarms) as to how the reduction of false alarms can be further progressed. A new European standard might be one of the proposals. Studying False Alarms In Fire Detection False alarms from fire detection and fire alarm systems is a topic that Euralarm’s Technical Group False Ala...
Genetec Inc, a technology provider of unified security, public safety, operations, and business intelligence solutions has become the fastest growing providers of Automatic Number Plate Recognition (ANPR) technology, according to a recently-released report by IHS Markit. According to the report ‘ANPR and Detector Sensors Report – 2018’, Genetec has now become a top 5 global provider of ANPR technology for surveillance applications (which includes ANPR for access control, trave...
Booth number: 20060 FLIR Systems is a provider of advanced thermal, video and sensor technologies designed to meet complex border, critical infrastructure, safe city and commercial enterprise needs. FLIR’s signature products include thermal cameras, visible light cameras, radars, video management systems, and physical security information management solutions. Saros DH-390 enables integrators to offer remote video monitoring services and increase their recurring monthly revenue At ISC We...
Hikvision, a supplier of innovative security products and solutions, has introduced new AcuSense network camera series to its EasyIP 4.0 security solutions. Featuring a strobe light and an audio alarm, the new cameras can immediately deter intruders from entering a prohibited site, further enhancing the safety of premises and property. Faster And Accurate Intrusion Detection Hikvision AcuSense network cameras build on the same cutting-edge intrusion detection functionality found within the exi...
DICE Corporation is pleased to announce and welcome Carl Galsterer as the company’s new chief network architect. Galsterer will be responsible for overseeing all aspects of the company’s information technology infrastructure, including the design and implementation of customer networks and process standardization. More About Carl With over 16 years of experience in network engineering as a senior engineer, Galsterer was pivotal in building the Charter Spectrum network throughout Mi...
Connected Technologies LLC has released GeoView, a new feature that adds the power of Google Maps to the award-winning Connect ONE cloud-hosted security management platform. GeoView allows users to see status for all locations instantly in a wide-area satellite map and drill down into each location for real-time alarm, health and system monitoring and control. With GeoView, dealers can offer different levels of managed services while the end-user easily interacts with the solution, making for a...
Senstar, a global provider of video management and perimeter intrusion detection solutions (PIDS), is pleased to announce the release of Symphony 7.2, the latest version of its intelligent video management software (VMS). The award winning Senstar Symphony delivers an all-in-one solution for video management, video analytics, PIDS integration, and alarm management for deployments of all sizes. Key Highlights: Securely share video clips with 3rd parties with integrated cloud video upload feature Revamped Alarm Console allows for better event management with simplified workflow Seamlessly navigate from camera to camera with Visual Tracking Links PostgreSQL database support Streamlining User Experience “The latest version of Symphony further streamlines the user experience by reducing task effort in common scenarios such as video export and alarm management," said Justin Schorn, Vice President of Product Management at Senstar. "With Symphony 7.2, we continue to build on our success as one of the industry’s most trusted and reliable video management software providers." Senstar Symphony 7.2 is available worldwide in Arabic, Chinese (Simplified), English, French, German, Portuguese, Spanish and Turkish. Senstar hardware appliances such as the R-Series can be upgraded to the latest version with a valid maintenance agreement.
At ISC West, in booth # 26061, Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence will unveil a new version of Security Center, the company’s open-architecture platform that unifies video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics. With customisable live dashboards, enhanced privacy protection features, a brand-new map-driven mobile app, and new functionalities that help users actively monitor the health of their system and ensure compliance with cybersecurity best practices, version 5.8 will ensure that users can optimize their physical security environment while benefiting from greater visibility into their operations. Valuable Contributing Sensor Security Center 5.8 will introduce a brand-new collaborative mobile app to provide operators complete access to their Security Center system Security Center 5.8 will enable users to create custom dashboards that will display real-time data, such as video feeds, alarms, reports and charts in a way that is meaningful to them and their specific job function (security, operations, IT etc.). Users can set up their dashboards using simple point-and-click tools, and instantly combine data from the entire Genetec portfolio (video, access control, ALPR, etc.) in one screen to gain a new perspective on the evolution of events and key metrics across their operations. Security Center 5.8 will introduce a brand-new collaborative mobile app to provide operators complete access to their Security Center system when they are on the move and allow them to turn their smartphone into a valuable contributing sensor to their security system. Map-Oriented Interface In addition to recording incidents, accessing nearby video, access control, and ALPR devices as well as sharing video from their phones to Security Center, the new mobile app will let operators share their location with colleagues in the operations center, send in-app messages and share live and recorded video through an intuitive map-oriented interface. Key features will include: Video (live and recorded playback, PTZ controls, bookmarking, time- and event-based reports) Access control (check door status, lock/unlock doors, override schedule, set maintenance mode etc.); ALPR (live reads/hits, plate reports, and access hotlists); Interactive maps that increase local awareness and put critical information much closer to the operators, enabling them to easily visualise their environment and respond quickly. Built-in messaging allows for instantaneous sharing of information between operators and personnel in the field. This extends to sharing live or recorded video clips, text messages and other security information. Physical Security Devices With the new KiwiVision Camera Integrity Monitor feature, the system will also automatically detect potential camera position changes System administrators are acutely aware of the critical nature of security systems, but often lack the tools to assess the potential exposure of their software, operating systems and physical security devices. Security Center 5.8 will introduce a new Security Score feature to track each system’s compliance with hardening guidelines, firmware availability and updates, password strength, as well as several other dimensions of cybersecurity. Available through the built-in System Health dashboard, the Security Score will measure individual cybersecurity processes and verify that they are followed by the system. This will enable users to get a better understanding of the cyber security risks they face and enable them to take the necessary steps to harden their system. With the new KiwiVision Camera Integrity Monitor feature, the system will also automatically detect potential camera position changes, loss of image quality or tampering, and alert administrators immediately. This allows them to get ahead of problems and take the necessary corrective action immediately, rather than wait to find out there is a problem when they need footage and it is not available.
FIREX International, alongside the co-located IFSEC International, Safety & Health Expo and Facilities Show, has announced that the Protection & Management series of events will be moving to a new dateline of 19-21 May for the 2020 edition at ExCeL, London. FIREX International 2019 Dates Unchanged Gerry Dunphy, Exhibition Director, FIREX, explains: “Major business decisions are made at FIREX every year, and the event has been in huge growth in its home in London, as we anticipate seeing for the June 2019 event. Expanding on this, we’re thrilled now to have worked even more closely with the fire safety community and with our venue, ExCeL, to organize the 2020 edition on a May timescale. The customer is at the heart of the much-loved FIREX exhibition, and this will allow exhibitors and visitors alike to maximize this essential time in the buying cycle.” FIREX sees organisations across a host of industries, from construction to government and legislative bodies FIREX welcomes an international audience of installers, integrators, specifiers, distributors and end-users from over 70 countries. In the wake of the number of fire tragedies the community has witnessed on a global scale, the conversation around fire safety has never been more important; FIREX sees organizations across a host of industries, from construction to government and legislative bodies, mark the three days as a key date on their calendars. Fire Protection And Prevention In moving to May 2020, ExCeL also welcomes the Security & Counter Terror, Ambition and Forensics Europe Expos to run alongside FIREX and its neighboring IFSEC, Safety & Health Expo and Facilities Show. With fire prevention and protection playing a major role in developments in the security and safety industry, the move further strengthens FIREX’s position as the industry leader in the life safety conversation. This strategic co-location of events will see 38,000 professionals working across fire and security come together at ExCeL London. Exhibiting companies will have access to the entire end-to-end fire protection supply chain under one roof, with visitors able to source products and technology from an unrivalled showcase of solutions. This year’s FIREX International will keep its June dateline from 18–20 June 2019.
Maxxess Systems continues to drive the virtualization of the physical security industry with the development and implementation of the industry’s most advanced enterprise level situational awareness and response coordination solutions. Enhancing Maxxess Systems’ momentum is the recent introduction of Maxxess InSite Awareness and Response Coordination System which meshes ‘system intelligence’ and ‘human intelligence’ to deliver an entirely new category of physical security and communications solution on a unified, easy to operate platform. Maxxess InSite joins the company’s highly touted eFusion Security Management Software and Ambit Communications Software, which are presently installed in thousands of facilities around the globe by many of the world’s leading brands. Developing Sophisticated Software Solutions The solutions aren’t just evolutionary in nature, they’re revolutionary with new benchmarks in situational awareness, communications and personnel coordination"“Over the last decade, our focus has been on developing highly intuitive, integrated solutions for high-profile clients,” said Nancy Islas, President of Maxxess Systems, Inc. “This has allowed us to develop highly sophisticated software solutions based on the needs of high-profile users around the world. The resulting solutions we’ve developed aren’t just evolutionary in nature, they’re revolutionary with new benchmarks in situational awareness, communications and personnel coordination.” High-profile users of Maxxess Systems’ solutions include: the Alshaya Group, an international franchise operator with over 90 globally recognized brands; CAE, the pioneer in training for the aviation, defense, security and healthcare industries; Meraas, a developer of residential and commercial space in Dubai; Banco Central de Reserva del Peru, which mints and issues metal and paper money in Peru. Coppel, one of the largest retailers of clothing and household goods across Mexico; Regus, one of the world’s largest providers of flexible workspace; UDR, a real estate investment trust company in the US; the highly prestigious London School of Economics, and more than 50 companies in the renowned Emirates Group, among many others. Core Software Platforms Maxxess InSite combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-timeThe Maxxess Systems portfolio is built on the following core software platforms: Maxxess InSite Awareness and Response Coordination System combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-time – all of which is queued, organized and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organizations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality. Over 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly-customized solution and unparalleled efficiency. eFusion provides video and access system management and control capabilities along with alarm monitoringeFusion Security Management Software is a ‘system intelligence’ solution that integrates and correlates data from surveillance, access control and various other physical security related inputs onto a comprehensive monitoring and reporting dashboard. eFusion provides video and access system management and control capabilities along with alarm monitoring, access credentials tracking/authorization/de-authorization remotely, door status and more. eFusion can be deployed as a stand-alone control platform, or as a core component of Maxxess InSite. Ambit Communications Software is a ‘human intelligence’ solution that provides security managers communication and location knowledge for remote personnel through their personal devices for alerts, notifications, status assessment and access management. Ambit can be deployed as a stand-alone communications platform, or as a core component of Maxxess InSite. “The recent release of Maxxess InSite is the result of many years of software development and is based on the proven performance of our security and communications solutions,” continued Ms. Islas. “With the introduction of InSite, Maxxess Systems is bringing a completely new and unparalleled security and communications enterprise solution to the security marketplace.”
Glass windows and entryways give businesses a bright and welcoming feel. But they can be vulnerable to criminals looking for an easy way to break in after hours. To stop them in their tracks, Digital Monitoring Products (DMP) is pleased to introduce the new 1128 Wireless Glassbreak Detector. 1128 Wireless Glassbreak Detector Designed to detect the shattering of framed glass mounted in an outside wall, the 1128 Wireless Glassbreak Detector is a fully supervised, low-current shock and glassbreak sensor that provides added detection coverage up to 20 feet. By detecting both high and low frequencies, the 1128 reduces the chance of false alarms. It’s also suitable for armor-coated glass. For maximum flexibility and coverage, the 1128 Wireless Glassbreak Detector can be mounted on the ceiling or on an opposing wall. It’s compatible with all DMP 1100 Series wireless receivers and existing wireless transmitters running Version 106 and higher. It uses the supplied 3 V lithium battery.
GJD has hit the ground running in 2019 with the appointment of Jason Hill as the company’s Commercial Director. Mark Tibbenham, Managing Director of GJD has big plans for the British manufacturer of external motion detectors and LED illuminators, and has recruited Jason Hill to help deliver on his aspirations. GJD Expands In The US Commenting on the new appointment, Mark said: “Even though we were 2017 recipients of the Queens Award for Enterprise, International Trade there are a significant number of markets where we have no representation and Jason can help us identify suitable distributors and partners globally. We are also expanding in the US after opening an office in Los Angeles last year and focusing on the Home Automation market there, Jason is extremely well connected with that sector in North America.” Most importantly GJD has ambitious new product development plans and we need to communicate those effectively to a large potential market" Mark continued to say: “Most importantly GJD has ambitious new product development plans and we need to communicate those effectively to a large potential market. Having worked with Jason over the last few years on a number of projects and partnerships, I felt he was the man we needed to take our business to the next phase.” Home Automation Platforms Jason Hill commented: “It is very satisfying to be working for a British security manufacturer after all these years in the industry. GJD is growing fast and is already recognized as a UK export success story, but there is still so much more potential. I will be busy traveling the world to meet new partners and supporting the US operation as it expands. Mark has already done the hard work of enabling support of GJD products into home automation platforms, so I need to work on market awareness. Reliable human detection in external applications is in huge demand from end users and we have the technology to deliver that, I have also seen the product roadmap for the next two years and there are some great projects on the horizon.” Jason joins GJD from Taiwanese surveillance manufacturer LILIN, where he was UK MD for 20 years and latterly Group Vice President. He has worked in the Security industry since 1990 predominantly with Manufacturers. Founded in 1983, GJD is the UK’s renowned manufacturer, designer and supplier of professional external detector equipment, as well as Infra-Red and White-Light LED illuminators. GJD’s Head Office is based in Heywood, Greater Manchester, UK.
ISC West continues to innovate and adapt to the changing needs of the security marketplace. In 2019, there will be 200 new exhibitors, 100 new speakers and an expanding mix of attendees that includes more end users and international attendees. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Among the more than 200 new exhibitors on the show floor will be Dell Technologies, Resideo, SAST (a Bosch IoT startup), Belkin International, NetApp, Lenovo, Kingston Technology and many others. The event continues to see more and more solutions in the area of IoT/connected security, a surge in barrier/bollards exhibitors, an increased number of start-up companies, and an emphasis this year on stadium/major events security. Plus, the new exhibit area of ISC West, Venetian Ballroom, will include a mix of solutions from mid-sized domestic and international companies, and is the home of the Emerging Technology Zone – back for its second year with 50-plus start-up companies expected. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas “ISC West is no longer just about video cameras, access control systems and alarms,” says Will Wise, Group Vice President, Security Portfolio for Reed Exhibitions, which produces and manages ISC West. Embracing and stimulating the market dynamic of comprehensive security for a safer, connected world, solutions on display at the show reflect convergence across physical security, IT (information technology) and OT (operational technology). The ISC West expo floor includes specialized featured areas such Connected Home, Public Safety & Security, Connected Security, Unmanned Security Expo and the Emerging Technology Zone. Plus, complimentary education sessions in the Unmanned Security Expo theatre will include topics such as drones, counter-drone solutions, ground robotics and regulations/policies that support autonomous technology. This year’s event will feature more than 1,000 products and brands covering everything from video surveillance, access control and alarms/alerts, to IoT, IT/cybersecurity convergence, AI, embedded systems, drones and robotics, smart homes, smart cities, public safety and more. The ISC West expo floor includes specialized featured areas such Connected Home and the Emerging Technology Zone Elevating the Keynote Series Over the past few years, ISC West has elevated its Keynote Series (open to all attendee types) to include more speakers and dynamic content covering relevant topics. Attendees should be sure to head to the Keynote room Wednesday and Thursday mornings at 8:30 a.m. before the expo floor opens at 10 a.m. Relating to attendance, ISC West continues to diversify and grow the attendee universe by attracting additional enterprise government end-users across physical and IT/OT responsibilities. The show also continues to attract and grow the channel audience, and there will be an increasing number of International attendees. “Years ago, ISC West was known exclusively as a dealer/integrator/installer show, but not anymore,” says Wise. “Today, the demographic mix continues to evolve as the event diversifies its product and educational offerings, embracing the current market reality of collaboration among integrators/dealers/installers, end-user decision-makers, and public safety and security professionals.” When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities Within the SIA Education@ISC West conference program, there are over 100 new speakers. Through ISC West’s strong partnership with the Security Industry Association (SIA, the Premier Sponsor of ISC), the SIA Education@ISC West program has expanded and become increasingly dynamic and diverse over the last three years. In addition, ISC West and SIA are hosting a Women in Security breakfast on Friday morning April 12th. Women in Security is a new track for the education program. “Our attendance data reflects the demand for a mix of physical security integrator and end-user content, a balance of technical and management/strategic topics, and diverse topics incorporating IoT and cybersecurity/physical security convergence, and analytics expertise,” says Wise. “Last year was a record year for conference program attendance, and 2019 will yet again set new benchmarks.” Mobile apps, information desks and ease of registration ISC West is also focusing on the attendee experience. Need advice on what exhibitors are a fit for your business needs and interests? The Information Desk adjacent to the main expo entrance will provide customized recommendations based on the information attendees provided during the registration process. Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website to research exhibitors and product categories, receive exhibitor recommendations that best fit business needs, review complimentary educational opportunities as well as 85-plus sessions from the paid SIA Education@ISC program. There are many networking opportunities being offered at the show this year. When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities. Whether attendees want to network with peers or customers at an awards ceremony (Sammy Awards, Fast 50, New Product Showcase Awards), Charity event (AIREF Golf Classic, Mission 500 Security 5K-2K Run/Walk), or an industry party (SIA Market Leaders Reception, ISC West Customer Appreciation Party at Tao), there are a variety of special events offered, all designed to help you make new connections. Make sure to check out the ISC West website for all the Special Events taking place at ISC West.
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-Based Products We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile Credentials Applications We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customized action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future Of Biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video Management Platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access Control World An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting Existing Hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect Anomalous Data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make Critical Decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyze more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple Camera Streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing color. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion Detection Scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyze video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
A few friends from the security industry will gather this April to see, hear and touch the latest technologies to make the world a safer place. Actually, more than a few: there will be more than 30,000 security professionals gathering at the Sands Expo in Las Vegas April 11-13 for the International Security Conference and Exposition, usually known as ISC West. Many of the attendees will be returning to what has become a yearly ritual. The site, the players, the pace and even atmosphere of ISC West are as familiar to many as a family reunion. But the industry is changing, and those changes will be reflected in big ways at ISC West. Let’s consider a few themes we will be hearing about at the show. The Cybersecurity Of Physical Security Systems Cybersecurity has gone from being the “elephant in the room” to an existential crisis for the physical security industry: How can an industry promote security unless its own products and systems can operate securely? For a long time, no one talked about cybersecurity. Some attending ISC West may wonder if now we are talking about it too much, at the risk of too much talk and not enough action. Almost every contribution to our “review and forecast” articles for 2018 mentioned cybersecurity. Every industry event I have attended so far this year has put cybersecurity front and center. It will certainly be a major topic at ISC West.Cybersecurity has gone from being the “elephant in the room” to an existential crisis for the physical security industry Here’s the challenge for attendees to ISC West: If every manufacturer talks earnestly about cybersecurity, how can potential customers tell who is really serious about the topic, and who is merely paying lip service to the latest industry buzzword? If we all agree that cybersecurity is “everyone’s problem” – not just manufacturers, but also integrators and users – does no one really take responsibility? As the industry becomes more educated about cybersecurity, we can expect more detailed and challenging questions on the subject to permeate the ISC West show floor. Some manufacturers have likened cybersecurity more broadly to the issue of trust. Do you trust a manufacturer to address cybersecurity issues? Or do you trust them in general? The cybersecurity discussions will begin even before the show floor opens, on Tuesday, April 10, in a session titled “Cybersecurity Tier Zero: A Guide to the First Steps of Cyber Hardening.” – just one of the many other education sessions on Tuesday. The Emergence Of Video Analytics 2.0 Deep learning and artificial intelligence (AI) have become more familiar to the physical security market, and some AI applications are driving new industry trends such as robotics and analyzing Big Data. But the biggest potential impact of deep learning is in the field of video analytics, a decades-old technology that has perpetually overpromised and underdelivered. The video analytics systems are not programmed, they “learn,” using massive data sets and neural networks and GPU processors and all the rest The new wave of video analytics products claims to provide a higher level of accuracy because they operate more like the human brain. These new systems are not programmed, they “learn,” using massive data sets and neural networks and GPU processors and all the rest. But consider the bottom line: Do the new video analytics products really perform and eliminate excessive false alarms? Can they effectively search large amounts of stored video and find the few frames that can make the difference in an investigation? Months have lapsed since the first deep learning products were announced, or at least, “teased”. It’s been sufficient time for manufacturers to develop products that are ready for market, but are they? ISC West attendees will be scouring the booths for the latest developments and asking tough questions about how well these newfangled systems will actually perform.It’s all happening in the smart home market – but how fast and what will be the impact on the traditional burglar alarm business The Changing Smart Home Market We all want Siri to set our thermostat or Cortana to arm the alarm system. We want to view video from our nanny-cams on our smart phones, and to turn on the lights from anywhere around the world. It’s all happening in the smart home market – but how fast and what will be the impact on the traditional burglar alarm business that is the bread-and-butter of many security companies? Bluetooth and Wi-Fi can make a lot of things happen in the smart home environment, but what about other networking standards such as ZigBee and Z-Wave? The stakes are huge, which is why the big tech companies – from Apple to Amazon to Google – are staking their claims in the home automation market. Just this year, Amazon has purchased Ring, a video doorbell and security camera company – which will also be exhibiting at ISC West. But it’s unclear what such moves in Silicon Valley will mean for traditional security companies. The growth of do-it-yourself (DIY) systems introduces even more variables, as do alarm companies with new business models and even cloud-based approaches. Many exhibitors at ISC West – from ADT to Z-Wave – are addressing the new smart home environment and can help those attending the show do the same. About 40 companies are exhibiting in the “Connected Home” arena. The Unmanned Security and Safety Expo will return, including a dedicated complimentary education theatre for attendees Drones, Robotics and Education From robots to drones to counter-drone solutions, there other new technologies being displayed at ISC West. The Unmanned Security and Safety Expo will return, including a dedicated complimentary education theater for attendees offering sessions on topics such as “Drones – Friends or Foes to the Security Industry?” There is a level of novelty to these technologies, and attendees might be lured by the entertainment value of a subject that may fall outside their job description. But one education session addresses the nuts and bolts in the real world: “Selling the Value of Security Robots by Setting Realistic Expectations.” Could these new gadgets play a bigger role than we think in the future of the security market? For all its familiarity, there is always something new for attendees at ISC West. It may be a startup company with an intriguing value proposition tucked into a tiny booth at the back of the hall. Or it could be a big surprise news announcement from a major player. For attendees, the best surprise of all is that valuable piece of information they can take home to make their business better. Here’s hoping you find it!
Open architecture in physical access control is built around Mercury Security’s access control panels, the de facto standard embraced by more than two dozen access control original equipment manufacturers (OEMs). Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments related to the Mercury platform. MercTech4 highlighted a new generation of access control products, which are increasing the capabilities for Mercury OEMs in areas such as two-way communication and encryption. Enhancements include use of the OSDP (Open Supervised Device Protocol) v2 communication standard instead of the older (and less flexible, less secure) Wiegand standard. Other advantages are relay count activations, a crypto memory chip and default encryption, a critical feature ensuring greater cybersecurity. Integration Of Hardware With Physical Security Mercury hardware is sold exclusively through OEM partnerships. The new LP4502 controller and access control platform use the Linux operating system. Mercury also provides hardware integration at the controller level with elevator manufacturers such as Otis, Kone and Thyssenkrupp, including “destination dispatch,” which groups passengers going to the same floors into the same elevators, thus reducing waiting and travel times. Mercury hardware is sold exclusively through OEM partnerships. The new LP4502 controller and access control platform use the Linux operating system Integration of Mercury controllers with LifeSafety Power’s IP-based intelligent power supplies enables system health and diagnostic data to be shared for preventive maintenance. Mercury also offers several “bridge” products to enable its OEMs to transition installed proprietary systems from outdated Casi-Rusco (GE), Software House I (Tyco) and Infographics (GE) technologies to an open platform using Mercury hardware. Business As Usual Other recent news for Mercury is the company’s acquisition by HID Global last fall. Mercury Security President Matt Barnette says the acquisition will not impact how Mercury goes to market. “It’s business as usual,” he says. “It’s 130 days into the acquisition, so it’s still early on, but we are continuing to do what we do.” HID will develop a roadmap for improved combined solutions among the controller, reader, credential and cloud Steve Carney, HID Global’s vice president of product marketing for physical access control, provided an update from the HID Global perspective to MercTech4 attendees. He reiterated that there would be no change in Mercury’s OEM go-to-market strategy. He emphasized that Mercury’s team and talent remain core to the brand, and HID will develop a roadmap for improved combined solutions among the controller, reader, credential and cloud. Open architecture companies throughout the access control industry – Mercury’s OEM partners – are incorporating the new boards into their products, each putting their “spin” on those capabilities and expanding the functionality of their systems. At MercTech4, seven of those OEMs hosted small groups of consultants in focused meetings to highlight what’s new with their products. Lenel Honored As 'Platinum Premier' Partner Lenel, Rochester, N.Y., has been a Mercury's OEM partner since 1995. Lenel is Mercury’s first-ever "Platinum Premier" partner. In recent years, Lenel’s OnGuard system has evolved into a fully browser-based system providing both alarm and cardholder management through web browsers, and access to the platform on a computer, laptop or tablet. OnGuard WATCH (Web Access Trending and Comprehensive Health) provides system monitoring tools and health checks, such as tracking CPU usage and logging error files. Lenel has introduced its own BlueDiamond mobile credentialing system based on Bluetooth Low Energy and deploying mature technology previously used by sister UTC companies for real estate locks and in the hospitality market. Feenics, an Ottawa, Ontario, cloud-based access control company, was also among the Mercury OEMs participating in MercTech4. The Keep by Feenics platform is scalable from a single door to a global enterprise environment. A RESTful API provides easy connection of third-party applications. Feenics emphasizes cybersecurity in the cloud, using Amazon Web Services, Transport Layer Security (TLS) encryption, and Veracode penetration testing. They use MongoDB open source database replica sets instead of Microsoft SQL. Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments Integration And Encryption RS2 Technologies, Munster, Indiana, is another Mercury OEM highlighted at MercTech4. Their top vertical markets are K-12 schools, utilities, healthcare and government. RS2’s features include a PSIA-compliant interface, compatibility with BACnet and the Pinwheel DME (Data Management Engine) for bi-directional database integration. RS2 offers web-based support, and each edition of the Access It! software implements features suggested by customer RS2 offers web-based support, and each edition of the Access It! software implements features suggested by customer. Product enhancement is a focus of RS2’s engineering. Open Options, Addison, Texas, is a Mercury Platinum Elite partner whose customer base spans every vertical, and whose feature set reflects customer feedback. Open Options offers Mercury hardware mounted inside a sleek plastic enclosure, among other form factors. The company emphasizes an open business culture and dedication to customer service. Customer support is a direct phone line to speak with a live person every time to get any issue resolved. Open Options’ DNA Fusion Version 7 platform includes new features such as an updated user experience. DNA Fusion interfaces seamlessly with security technologies — including video, biometrics, wireless locks, and more. Last year, Open Options marked 20 years of partnership with Mercury Security. Engineering For The Masses Avigilon, Vancouver, B.C., is embracing new Mercury products in its completely browser-based Linux platform that can scale from entry-level to enterprise systems. The ACM (Access Control Manager) software is engineered for IT professionals and is updated every 60 days.The Linux-based system uses features such as the Avigilon “Appearance Search” capability to shift operation of security systems from a reactive to a proactive stance For Avigilon, access control is a component of a broader approach that uses analytics and self-learning to manage massive amounts of data and provide the information an operator needs. The system uses features such as the Avigilon “Appearance Search” capability to shift operation of security systems from a reactive to a proactive stance. Genetec, Montreal, Canada, emphasizes the value of its “unified” approach that combines video, access control and automatic license plate recognitions into a single platform – designed from the ground up – that incorporates communications, intrusion detection and analytics. Cybersecurity failures prominent in the news often occur because of negligence – the customer had not implemented a software patch, for example. Genetec helps to manage such concerns. When cameras are deployed in the Genetec platform, the system provides an alert if a new camera firmware version is needed. The Genetec Update Service (GUS) notifies customers of any needed software updates. Prominence Of Cybersecurity Honeywell’s Win-Pak access control software is integrated with the Pro-Watch security management suite. Cybersecurity is a corporate priority for Honeywell, whose products follow the SDLC (systems development life cycle) process with security requirements based on the ANSI/ISA 62443-3-3 standard. Microsoft's Threat Modelling tool identifies entry and exit points of systems that an attacker could exploit, providing the development team an attacker's viewpoint. The secure product development process includes static code analysis, secure code review, code signing, binary scanning and component inventory. Products are thoroughly tested by the Product Security Assurance Team and at times by an Advance Independent Testing Team. If vulnerabilities are identified after release, they are handled by the Product Security Incident Response Team. Cybersecurity issues dominated a consultant roundtable event on the second day of MercTech4. There was plenty of spirited discussion and some valuable insights among the 40 or so participating consultants. More to come on that in another article in the next couple of weeks.
Kunsthalle Mannheim is a museum in Germany which contains a major collection of important art. Reliable technology, integrated in a networked solution from Bosch, ensures all-round protection on a total of 3,600 square meters of exhibition and storage space. A special focus of this is optimally safeguarding people and property without interfering with visitors’ encounters with priceless works of art. Customized Security Solution And Integration Since its inauguration in 1909 over a century ago, Kunsthalle Mannheim has acquired a global reputation as a very special place to experience modern art. The complex comprises a building in Art Nouveau style dating from 1907, underground storage rooms, a main building, and the newer Hector Building, completed in 2018. Coinciding with the opening of the Hector Building, a customized security solution installed and integrated by Bosch experts also debuted. The system’s components are almost invisibly connected with the various exhibition areas. The modular alarm system UGM 2040 and around 260 state-of-the-art video cameras monitor the interiors of Kunsthalle Mannheim as well as the open areas around. Fire Protection All of the security equipment is controlled by the Building Integration System from Bosch Comprehensive fire protection is provided by a fire alarm system spanning 700 detection points. There are 330 speakers in case it should ever be necessary to evacuate visitors and employees. All of the security equipment is controlled by the Building Integration System from Bosch. Modular Alarm System Thanks to this new solution, Kunsthalle Mannheim is facing the future with confidence. The modularity of the alarm system UGM 2040 allows fast, cost-effective implementation of modifications and extensions. Professional service technicians from Bosch regularly maintain it and perform any required repairs to ensure highly reliable operation and low overhead.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, working alongside Sonitrol of Fort Lauderdale, is pleased to announce the completion of a highly-anticipated security system upgrade for Junior Achievement of South Florida (JASF) at the organization’s JA World Huizenga Center at the Lillian S. Wells Pavilion (JA World). JA World is located on the Broward College North Campus in Coconut Creek, Florida. With over 60,000 square feet of learning areas, rentable meetings rooms, and the Huizenga Catering Kitchen, JA World is the largest Junior Achievement facility in the world. Each year, more than 21,000 5th grade and 20,000 8th grade students from Broward and south Palm Beach counties visit the facility. The 5th graders learn basic economic concepts, workplace skills, and personal and business finances in a simulated city built for young students; the 8th graders focus on how their educational choices will impact their future earning potential, managing a budget and learn about high growth industries to help spark their career exploration. The initial security system included remotely managed access control, verified audio intrusion detection, and analog camerasRequirement Of IP Camera Technology “Each day, 450 students participate in JA BizTown and JA Finance Park simulations at JA World. Their safety and the safety of our volunteers, staff, and guests is of the utmost concern to us,” said Laurie Sallarulo, President & CEO, JASF. Sonitrol of Fort Lauderdale started working with JASF in 2008, in the early design/build phase of the facility, and through its completion in 2009. The initial security system included remotely managed access control, verified audio intrusion detection, and analog cameras. At the time, IP cameras were considered too expensive. “Previously, we had 18 analog cameras on the system,” explained Leni Smith, Director of Operations for JASF. “As time went on, it was clear that we needed to bring more areas inside and outside the building under surveillance, we wanted to access more cutting-edge IP camera technology, and we wanted to have all our surveillance under one Video Management System (VMS).” Installation Of 3xLogic Hybrid NVR Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analog camera investmentWorking in tandem, Sonitrol of Fort Lauderdale and 3xLOGIC designed a system upgrade that, through a combination of discounts and donations, JASF could afford. It also helped that John Ray, President of Sonitrol Fort Lauderdale, is a long-time, active JASF Board member. In order to fit JASF’s budget, Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analog camera investment, while adding in higher-resolution IP cameras for expanded coverage. The hybrid solution also creates a migration path, allowing JASF to continue improving visibility with new IP cameras over time as their budget allows. “As part of ongoing security and safety improvements, our staff participates in an annual active shooter training,” explained Monica McNerney, VP Operations, “and during those trainings, two things became clear. We needed to cover more areas with surveillance, and we needed to partner more closely with local law enforcement to give them real-time access to our system in case of an emergency.” Viewing Discrete Areas With VIGIL Software JASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server softwareJASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server software. These include the reception area, two loading dock areas, other exterior doors, their large meeting rooms, and the student areas, known as JA BizTown and JA Finance Park, where 450 young people spend most of their time each day at JA World. The receptionist controls public access to the building by viewing who is requesting entry, and buzzing that person in. The receptionist also monitors the loading dock area and notifies the appropriate staff member when a delivery has arrived. Leni Smith, who manages day-to-day security matters, reviews video after an incident is reported to her. “I really like how with the upgraded system, I can use motion detection alarms to hone in on exactly the video I need to review—I bet we’ve cut the time for review easily in half, if not more. I also really value how I can draw a box in a camera view and zoom into that area easily and quickly to find out exactly what happened.” Working With Community Partners We work very closely with our community partners to help them understand and access our facility and security system"Monica McNerney expanded on how the upgraded system is positively impacting another aspect of the JASF security program. “We work very closely with our community partners like Broward College security and local law enforcement to help them understand and access our facility and security system. We also routinely ask for their expert feedback on whether we’re managing our security effectively. “So far, they’ve told us we’re doing exactly what we need to be doing, and they’re excited about the expanded access they have to our camera views, although we hope that no event ever warrants that need.” TotalGuard Solution For Emergency Situations Jennifer Thomas, Vice President of Operations for Sonitrol of Fort Lauderdale, also discussed continued improvements that are planned for JA World. “We are actively designing phase II of the camera upgrade, which will include improved coverage and image clarity for camera views outside the front doors. TotalGuard allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring center “We are also ready to deploy our latest technology for the main lobby area—TotalGuard. TotalGuard is a great solution for emergency situations, it allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring center, for prioritized verified police response.” Sallarulo had a final thought on how things have been going with the system upgrade, “As for Sonitrol of Fort Lauderdale, they always provide us an amazing response. As a non-profit, we could not do what we do without the help of partners like Sonitrol. We are very grateful for their support and service.”
Your Homes Newcastle (YHN), which manages more than 26,000 properties on behalf of Newcastle City Council, is taking an innovative approach to fire safety with a pilot project utilizing thermal imaging cameras in tower blocks. The ALMO has installed the thermal imaging cameras in three of its 45 multi-story blocks across the city in a trial partnership with OpenView Security Solutions, with the project attracting praise from Tyne and Wear Fire and Rescue Service. Mobotix M16 Thermal Cameras The trial of the Mobotix M16 Thermal Camera sees the cameras installed in bin chute rooms The trial of the Mobotix M16 Thermal Camera sees the cameras installed in bin chute rooms. The cameras detect minute increases in temperature, triggering an alarm in YHN’s central enquiry center before any fire has had a chance to take hold, meaning within seconds of a possible fire starting the alarm is raised with the fire service. The camera continually monitors the temperature in the room, with information relayed back to the fire service, enabling them to better prepare for responding to the fire. David Langhorne, YHN’s Assets and Development Director, said: “The tragic events at Grenfell Tower have undoubtedly put fire safety in multi-story blocks under a microscope, but we have been trialing new measures in our multi-story properties for some time. Faster Fire Detection “We pride ourselves on being innovative, so it was an easy decision for us to test something that had not yet been adopted elsewhere. The early detection system provided by the camera has many benefits, but, most importantly, the faster response time from the fire service means the potential impact on residents and their properties is minimized and they and their homes are far safer as a result.” “This trial system is one of many fire safety measures currently in place in the blocks we manage across the city, where we also have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers, and bin room sprinklers.” Reducing False Fire Alarms Alan Robson, Assistant Chief Officer at Tyne and Wear Fire and Rescue Service said “It’s great that YHN is innovating in this way. Using technology to support the monitoring of storage areas such as this helps improve the information we receive about incidents. This technology can reduce false alarm calls and improve our response to confirmed fires.” The standard CCTV lens provides a live feed for further verification of events OpenView Security Solutions is the UK’S largest privately-owned independent security company and a leading national supplier of fire, electrical and mechanical services to the public and private housing sectors. Thermal Imaging The Mobotix M16 Thermal camera’s lens is triggered when an unexpected heat pattern occurs and automatically sends an alert to the central control room. Images from the thermal lens are automatically presented to operators enabling the exact location of hotspots, such as smouldering fires, to be pinpointed. The standard CCTV lens provides a live feed for further verification of events. YHN’s existing infrastructure, which uses Openview installed equipment in the blocks to link alarms through to its enquiry center via Jontek, meant the new approach could be easily implemented without any disruption to residents. Innovative Fire Protection Solutions Andy Ward, Sales Director of OpenView Security Solutions, added “This innovative fire protection solution enables housing providers to ensure a safer environment for residents and minimize the incidence of false alarms. It now forms part of our expanding portfolio of fire and life safety solutions, one of the fastest growing areas of our business, and consolidates our leading position in the public and private housing sector.” Commenting on the partnership with YHN and OpenView, Frank Graham, Mobotix Regional Sales Manager, said: “We are very happy to be working so closely with both YHN and Openview in the development and provision of an innovative solution for such a serious issue. Mobotix cameras have inbuilt intelligence to meet all the requirements of integrator and end users alike and we look forward to a longstanding and fruitful partnership with both organizations moving forward.”
Jumbo Ten Brink Food introduced the face server into their store environment in March 2017 after discovering that almost 80% of shoplifting took place via large shopping bags. Since then, Jumbo has installed 80 Panasonic cameras in-store, helping them to win the award. Previously recognized by the National Institute of Standards Technology (NIST) as the most accurate on the market, Panasonic’s face server uses deep learning technology which maximizes the performance of the core engine to achieve accurate and reliable recognition. The technology identifies faces that are ordinarily difficult to recognize with conventional techniques, such as those taken from an angle of up to 45 degrees to the left or right or 30 degrees up or down. It also maintains a 90% accuracy rate when detecting faces that are partially hidden by sunglasses or face masks. With this improved accuracy, security protection is enhanced and the system allows matches even when images are 10 years old Enhanced Security Protection If people are caught stealing, their image remains on the database. The face server provides a real-time processing capacity of up to 20 cameras per server and can execute high-speed searches of up to 30,000 registered reference faces. With this improved accuracy, security protection is enhanced and the system allows matches even when images are 10 years old. “The moment that a known shoplifter attempts to re-enter the store, an internal alarm is triggered, and we can take the best suitable action,” explains Edwin ten Brink, founder of Jumbo Ten Brink Food stores. “Thanks to the Panasonic face matching server, Jumbo has been proclaimed the safest store in the Netherlands." Karen Sangha, Panasonic’s Security Solutions Regional Marketing Manager says, “We are pleased to see that our customers are winning awards as a result of implementing our technology. We firmly believe that our face server is industry-leading and Jumbo Ten Brink Food’s success is testament to that.”
MARSS NiDAR system has been selected to secure and protect a critical national infrastructure (CNI) site in the form of a major dam facility. The NiDAR command and control (C2) system has been selected to integrate a thermal camera and a sonar system to protect the dam from potential underwater and surface approaches. NiDAR is an advanced long-range surveillance system designed to protect maritime and land-based critical infrastructure from air, surface and underwater approaches. Tracking Objects In Real Time NiDAR is sensor agnostic, enabling it to integrate with any existing hardware or systems, and due to its modular design, not only does it meet the current contract needs, but it also offers the flexibility to meet any future expansions or requirements. NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time, of over 1000 known and unknown, air, surface and underwater objects thanks to the software algorithms. It can intelligently analyze and rank unknown objects to determine potential threat levels and automatically trigger the appropriate alert. When the user determined warning and alarm zones are breached the system can automatically or manual deploy integrated countermeasures to deter potential approaches and de-escalate threats. Enhanced Awareness Picture The intuitive C2 interface provides an enhanced awareness picture, in real-time, through a touchscreen user interface and multi touch control. Rob Balloch, Sales Director of MARSS said, “NiDAR was chosen for this critical national infrastructure as it is robust and suited to all environments, however challenging. Its high availability and reliability, low maintenance and cost effectiveness makes it the perfect choice for any future growth, or change of requirements, with minimum disruption.”
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorized access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling Access Areas Within Hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single Access Card System Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilizing a single accesscard system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilizing a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the center of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-Down System Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional license feature. Streamlined Parking Processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being rechargedThe program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilizing another Gallagher license feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What role can social media play in security?
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?