SmartTask, a UK-based developer of cloud workforce management solutions, has announced the availability of its mobile operations app. Fully integrated smartphone app streamlines mobile patrols, alarm response callouts, and keyholding for security officers and controllers helping demonstrate BS7984 compliance. Designed specifically for UK security services providers in collaboration with the UK security industry, SmartTask mobile operations keep field officers in contact with the control room....
The opportunity for businesses to take full advantage of the meta-data captured by AI cameras has been significantly enhanced with the introduction of 3 new Wisenet NVRs. The feature-rich NVRs, which offer up to 400Mbps network camera recording, are able to read the AI metadata, enabling operators to quickly and accurately search video for objects and attributes associated to them. Introduced at the same time as the 64 channel XRN-6410B4 and sharing the same features, the Wisenet XRN-3210B4 has...
Axis Communications announces the upcoming launch of AXIS Object Analytics. This intelligent video analytics application offers detection and classification of humans and vehicles tailored to the surveillance need. Ideal for various installations including public buildings, warehouses, and parking lots, it will be offered pre installed on compatible Axis network cameras, adding value at no extra cost. Designed with a straightforward interface, tailored scenarios are easily set up with only a few...
The new Wisenet TNV-8010C 5-megapixel corner mount camera has been built to make it impossible for a ligature to be tied around it, as well as very difficult for someone to rip it off a wall. Although primarily intended to assist police, prison and mental health institutions in preventing inmates and patients from self-harming within secure room environments, the vandal-resistant and water-proof TNV-8010C also offers a robust solution for other demanding applications, such as the monitoring of...
Globally renowned access control systems manufacturer and supplier, Videx has announced the launch of two new apps for its web server access control system, the WS4 and has also released a new firmware with additional features. WS4 web server access control The WS4 can manage up to 20 entrances locally or remotely from anywhere via a mobile phone, tablet or PC using a web browser to connect to the system and it’s very easy to install. It can also hold approximately 2,500 proximity and co...
The integration developed between Vanderbilt’s ACT Enterprise access control software platform and Hanwha Techwin’s Wisenet WAVE video management software (VMS), means operators are now able to instantly visually verify access control activity and events directly from ACT Enterprise. ACT Enterprise is a role-based software platform which streamlines the monitoring and management of ACTpro access control systems comprising web-enabled door controller interfaces and MiFare and/or DESf...
Sectigo®, a provider of automated digital identity management, embedded security, and web security solutions, and Green Hills Software, the pioneer in high-assurance operating systems, have announced a global reseller agreement. The agreement enables Green Hills Software to offer Sectigo's Icon LabsTM Embedded Firewall, integrated and optimized for use with Green Hills Software’s INTEGRITY® real-time operating system (RTOS) and its embedded high-performance TCP/IP v4/v6 host and router networking stack. Internet-Connected platform The pairing strengthens Green Hills Software’s internet-connected platform solutions with the expanded networking security required in connected systems responsible for critical functions for automotive, industrial, medical, transportation and mil/aero industries. “Most cyberattacks on embedded systems remain undetected until it is too late. Early detection is critical as it maximizes the safety of products while helping to prevent the loss of IP, disruption of services, and attacks proliferating to other portions of the system or network,” explained Alan Grau, VP of IoT/Embedded Solutions, Sectigo. “Green Hills Software’s integration of our embedded firewall with their proven and mature INTEGRITY RTOS will provide customers worldwide with a powerful combination of experience and security technology that sounds the alarm, then stops the attack.” Critical embedded systems The INTEGRITY RTOS microkernel architecture is designed for critical embedded systems The INTEGRITY RTOS microkernel architecture is designed for critical embedded systems demanding proven separation, security, and real-time determinism. The operating system’s separation architecture helps manufacturers safely and securely partition software running at different levels of criticality. For critical functions, INTEGRITY assures secure and real-time execution by means of impenetrable partitions that deliver freedom-from-interference and guaranteed system resources. The Sectigo Icon Labs Embedded Firewall enjoys widespread global adoption, combining numerous powerful and configurable features to detect and contain cyberattacks. Disabling static filtering Configurable filtering policies — Uses configured filtering rules to control the filtering engine. The rules provide complete control over the type of filtering performed and the specific criteria used to filter packets. Rules can be configured for: Static filtering rules for IP address, MAC address, port number, and protocol number Block list and allow list filtering modes DPI filtering rules for message type, message contents, and message source Threshold-based filtering criteria Independently enabling and disabling static filtering, dynamic filtering, DPI filtering, and threshold-based filtering Replay attack protection EDSA Compliance support — Serves as an important building block for achieving EDSA compliance for embedded devices, providing support for many capabilities mandated by EDSA-311: Protocol fuzzing and replay attack protection Data flooding protection Denial of service protection Notification of attacks Disabling of unused ports Logging and alerting — Maintains a log of security events and policy violations, enabling command audits and forensic investigation to determine the source of an attack. Enabling remote management Management system integration — Incorporates an agent that enables remote management from an enterprise security manager system, or to other Security Information and Event Management (SIEM) systems. This integration provides: Centralized management of security policies Situational awareness and device status monitoring Event management and log file analysis Intrusion detection and prevention — Blocks all unused ports and protocols, limiting the attack surface hackers can exploit. Logging packets that violate configured filtering rules enables detection of unusual traffic patterns, traffic from unknown IP addresses, and other suspicious behavior. additional cybersecurity capability “Green Hills is pleased to be adding this additional cybersecurity capability to our portfolio of industry-leading foundational security offerings,” said Dan Mender, VP of Business Development, Green Hills Software. “Protecting critical internet-connected solutions is paramount for our customers, and Sectigo’s Icon Labs Embedded Firewall capability extends our customers’ ability to design purpose-built secure solutions in automotive, industrial, medical, transportation and mil/aero markets.” Green Hills Software’s internet-connected platforms are integrated and optimized with Sectigo’s embedded firewall and are available.
3xLOGIC, the globally renowned provider of server and cloud-based technology, has announced the launch of its VIGIL suite of video solutions, across the UK, Europe, Middle East and Africa (EMEA) regions. VIGIL suite of video solutions The ecosystem, comprising software and hardware components, such as cameras, recorders, thermal imagers, people counters, and accessories, is designed to provide a scalable security solution that’s tailored to every business need. Business executives have increasing amounts of data available to analyze, with the total amount of data in the world forecast to reach 59 zettabytes in 2020. The 3xLOGIC ecosystem taps into this, by capturing and analyzing these ‘big data’ elements and combining disparate data sets. Integration with security systems and cloud-based platforms The VIGIL suite of video solutions help business executives to optimize their operations, find efficiencies, secure their buildings and assets, and solve problems they never knew they had in the first place. The VIGIL suite of video solutions help business executives to optimize their operations The video suite additionally integrates with security systems, Point of Sale systems, alarm management platforms, and cloud-based management systems to make security management easier and more efficient. Bill Hobbs, Vice President of Global Sales at 3xLOGIC stated, “For over 15 years, 3xLOGIC has been proud to be at the forefront of server and cloud-based technology. The launch of the VIGIL video suite is the next step, helping business executives make data-driven, informed decisions across their supply chains, their sites, their buildings, and people.” Integrated security ecosystem He adds, “With VIGIL, business executives don’t just get a single security system, access control, or video management system, they get an ecosystem that’s bespoke to their needs and goals.” To help 3xLOGIC dealers and integrators understand the capabilities of the various solutions in the VIGIL suite, 3xLOGIC is delivering a range of webinars in November and December 2020. 3xLOGIC webinars These webinars will offer an overview of the real-world benefits that VIGIL hardware and software will bring to them and their clients. They will also address topics such cameras, accessories and mounts, recording appliances and VIGIL’s software options. The webinars will conclude with a session that shows how installers can become a 3xLOGIC Value Added Reseller (VAR).
Integrated Design Limited (IDL) has developed a new cost-effective and rapidly deployable entrance control solution that can help business owners adhere to COVID-19 social distancing guidelines and help keep staff and customers safe. Based on existing, proven technology, the Integrated Design Limited’s customized Door Detective Compact entrance control solution has been adapted to enable robust and straightforward population monitoring and control at single entrance doorways. Door Detective Compact solution The Door Detective Compact solution is ideal for a range of workplaces, such as offices, especially for shared kitchen facilities or toilets, small retail stores, factories, leisure facilities, and colleges, etc. or any other work environment where the maximum capacity needs to be controlled to prevent overcrowding. Installed on either side of a door frame or placed on both sides of an entrance on stands, Door Detective Compact units monitor the doorway using infrared optical technology and detect pedestrian movement in either direction. Real-time population monitoring and detection Using the newly developed control box, a maximum population threshold limit is set Using the newly developed control box, a maximum population threshold limit is set. As people walk in and out of the monitored area, the real-time population is detected and displayed on the control box, along with the maximum number of people permitted in the space at any one time, with lights and alarms used to provide alerts when safe numbers are exceeded. If the population is at a safe number, the units display green lights indicating that further people can enter. Should the population count reach the set threshold limit, the Door Detective Compact units turn red, providing a warning that no further people should enter. If the maximum limit is exceeded, the units flash red and an audible alarm sounds to indicate that numbers need to be reduced to a safe level. As people leave the monitored area, the population count decreases and the units return to green, to signal that it is safe for further people to enter. Small footprint, aesthetic design The rectangular stainless steel enclosures of the Door Detective Compact have a small footprint and offer an aesthetically pleasing two-tone design to complement multiple types of décor, while still maintaining its market-renowned performance. Tony Smith, Major Accounts and Marketing Manager at Integrated Design Limited (IDL), stated “Businesses which require their staff to be physically present, whether that be in an office, a factory, a retail store, or other, have been looking for ways to control the number of people it is safe to have in their premises, or particular areas within their premises, at any one time.” Tony adds, “We have developed a rapidly deployable and cost-effective solution which is, in essence, a ‘plug-and-play’ population counter which doesn’t require any complex installation and can be set up in around 15 minutes, to help business owners keep their staff and customers safe by preventing overcrowding.”
New interface expands functionality, increases compliance in highly regulated markets and simplifies administration and deployment LenelS2 announced an interface between the OnGuard® physical access control system and the DMP XR550 and XR550E intrusion detection systems. The interface expands functionality, increases compliance in highly regulated markets and greatly simplifies the administration and deployment experience. LenelS2, a pioneer in advanced security systems and services, is a part of Carrier Global Corporation, a global provider of healthy, safe and sustainable building and cold chain solutions. “The DMP interface expands the OnGuard system’s built-in, real-time intrusion detection capabilities, providing end users with an outstanding option for monitoring and controlling alarms,” said Ryan Kaltenbaugh, vice president, Vertical Market Solutions, LenelS2. “Having a native interface with DMP also helps OnGuard system users better meet the stringent requirements and policies in highly regulated vertical markets, including the U.S. federal government.” Leveraging the new interface The OnGuard platform can now centrally manage and link cardholders with users for both systems minimizing manual and redundant input of user profile information. Additionally, the interface provides command and control of the DMP-monitored areas, zones and devices within the DMP panels. OnGuard users will now be able to easily arm and disarm the system as well as quickly see all alarm events within the OnGuard interface. “At DMP it’s all about our customers and the integrity of our products. This interface with the OnGuard system provides our joint customers with an improved experience,” said Mark Hillenburg, vice president, Marketing at DMP. “From a simplified setup and programming process to enhanced management capabilities, this new interface is a game changer, and we are thrilled with the advancement.” The interface was developed by the LenelS2 Advanced Services team and covers the DMP XR550 and XR550E intrusion detection systems, the flagship in DMP’s line of products.
DMP releases its new line of alarm communication radios that are FirstNet Ready™ and approved for use on FirstNet®. FirstNet is built with AT&T in a public-private partnership with the First Responder Network Authority and is the only nationwide, high-speed broadband communications platform dedicated to and purpose-built specifically for America’s first responders and the extended public safety community. It’s the solution to decades-long interoperability and communications challenges first responders have long been experiencing. Alarm panel communications “The FirstNet network is an important step forward in our nationwide first responder infrastructure, and DMP is pleased to support public safety nationwide,” says Mark Hillenburg, vice president of Marketing at DMP. “Also, we are very excited to work with The Monitoring Association (TMA) and AT&T to deliver alarm panel communications using the highly secure and reliable FirstNet service.” Alarm service companies qualify to use the FirstNet network by first obtaining a TMA Certificate The transmission of public safety related alarms via FirstNet Ready™ alarm panels qualifies for FirstNet extended primary service. Alarm service companies qualify to use the FirstNet network by first obtaining a TMA Certificate of Verification that verifies they are in compliance with accepted Alarm Industry Standards. Safety related alarms The Certificate of Verification ensures the company transmits public safety related alarms (e.g. burglary, fire, emergency medical) to a Central Monitoring Station that confirms and verifies the authenticity of the alarm before notifying a Public Safety Answering Point (PSAP) for relay to a public safety agency for the purpose of initiating an emergency response. In addition to the TMA certification, alarm service providers must enter into a FirstNet Agreement with AT&T before they can offer FirstNet Ready™ alarm panels with FirstNet service. With DMP’s FirstNet Ready™ communicator, the XR Series control panels are among the first available for use on the FirstNet network. This gives alarm companies the advantage of using Band 14 – nationwide, high-quality spectrum set aside by the federal government specifically for FirstNet.
The Alarm.com Smart Water Valve+Meter is now available to service providers partnered with Alarm.com and its subsidiaries to help protect connected homes and businesses from unexpected water emergencies and steep water bills. The award-winning device, unveiled at the Consumer Electronics Show (CES) earlier this year, is an affordable, Z-Wave water shutoff valve that combines innovative technology with high-quality plumbing hardware. Leveraging critical system and occupancy data helps the Smart Water Valve+Meter intelligently respond to large leaks, small drips and leaky appliances that cause billions of dollars in property damage every year. Preventing water damage “We are big fans of the Smart Water Valve+Meter because of the insight it provides, especially around how much water is being used and even wasted at times,” said Matt Madden, project manager at Superior Alarm & Electronics. “The data it provides can help customers be more aware of their water use and costs. Another crucial aspect is its ability to detect and react to water leaks of any size and alert the customer via the mobile app. You can’t put a price on peace of mind.” Designed and developed by Building36, a subsidiary of Alarm.com, the Smart Water Valve+Meter quickly identifies excessive or continual water flows to help prevent water damage, as well as health and safety issues that often result from prolonged low-volume leaks. Water management solution Property owners get mobile alerts about excessive water usage to avoid higher water bills As part of the Alarm.com Water Management solution and overall ecosystem, users can manage everything remotely through a single point – the Alarm.com mobile app. Property owners get mobile alerts about excessive water usage to avoid higher water bills and real-time water use data to guide conservation efforts in their homes and businesses. “Our comprehensive water solution that includes the Smart Water Valve+Meter makes homes and businesses safer from damaging and costly water problems,” said Jeff Bedell, chief strategy and innovation officer for Alarm.com. “The advantages of having a robust ecosystem of connected devices make it easy for our partners to deliver solutions that help their customers protect the things they care about most.” Integrator and installer benefits The Alarm.com Smart Water Valve+Meter has earned multiple awards this year. It received a 2020 SIA New Product Showcase award and a 2020 Security Sales & Integration Most Valuable Product award, for its unique design, function and integration features, such as: Automatic water supply shut-off when leaks are detected Remote control and automation as part of Rules or Scenes from the mobile app or customer website Durable, high-quality manufacturing and materials Monitoring for tiny leaks without the need to shut down the water supply to a property Real-time view of water consumption Patterns behavior to identify and signal when water use differs from normal There are numerous integrator and installer benefits as well, including over-the-air firmware updates to reduce post-installation customer visits and support costs.
Many businesses will already have some form of security in place, but what is often overlooked is the need to assess whether the protection is suitable enough for the nature of their business, or efficient enough for the premises they are utilising. As the country continues to face unprecedented times, it is crucial than ever to protect your business, particularly outside working hours or if at present the majority of your workforce is working remotely for the foreseeable future. So, what can you do to ensure that you’re protected? Intruder prevention For many intruders, bypassing the security of a building will just be target practice and an opportunistic attempt to see what they can find, often without any real plan or knowledge of the building’s precautionary measures. With this in mind, it can be worth pre-empting any unwanted entries with a more sophisticated process: fogging. A fogging system is a fast-acting deterrent for intruders. When activated, a thermally generated white smoke-like substance instantly delivers a dense, impenetrable As the country continues to face unprecedented times, it is crucial than ever to protect your business, particularly outside working hoursfog that covers the surface area where valuable equipment and other contents are kept, obscuring them from sight, and protecting them from the possibility of theft or damage until authorities arrive on the scene. Fogging system provider, Bandit UK works with ADT Fire & Security to enhance security measures, providing additional safeguarding for business properties. Putting this in place can mean that considerable cost, time and effort can be saved in the event of an attempted break-in, whilst disruption to business is reduced to a minimum. For small business owners, the financial burden of enhancing your security may seem unfeasible at the moment. In order to make a more informed decision, here are some other useful steps you can adopt, whether you are open or temporarily closed for business. Secure your equipment Simple routine checks such as regular property and equipment audits can help keep track of equipment and help to allocate responsibility for particular items to individual employees. Tagging computers and recording details of serial numbers will also help track down stolen equipment but is also useful for contacting IT services in the event of theft to ensure confidential information doesn’t fall into the wrong hands. Consider securing expensive equipment to floors or walls, this will make it difficult for opportunistic thieves to dash around grabbing expensive computing equipment for example. The right locks There should be a robust locking system in place, with a minimum of two locking points on external doors that meet British Standards. While you’re not physically on the premises, all internal doors, including fire doors, should be closed. Ensure that you have recorded each member of staff that has keys and therefore access to the building; this should be kept to a minimum for monitoring purposes. Perhaps it’s been several years since the locks were changed, and personnel have changed or sets of keys have gone missing. A locksmith can quickly and cost-effectively change your locks if necessary. Window glazing It may be a good idea to consider additional glazing on your windows. Installing laminated glass provides an extra layer so that windows cannot be easily tampered with or broken. Boarding of windows is another option and will completely prohibit outsiders from having a direct view into the building – this could be a cost-effective measure if you are temporarily closed. Review your monitored intruder alarm system So, you already have CCTV installed on your premises. From a maintenance point of view, how long has it been since you tested your system? Although you can review simple things like whether the lens is still picking up clear visuals, it may be best to ask an engineer from your security provider for advice on how to service There should be a robust locking system in place, with a minimum of two locking points on external doorsyour technology. It may be some years since you first installed the system, so it is worth checking if there have been any app developments, as this is a fantastic way to monitor your premises without being there. Also be sure to check you have adequate storage so that you are able to browse through previous footage if needed. Some companies use a cloud-based service; do you know what yours uses? Don’t forget fire hazards Electrical items can also be the biggest culprit of fires. In the first instance, the mains integrity should be checked, gas and electricity lines (for frayed or faulty wires), as well as plumbing. All electrical appliances should be repaired or installed by a certified firm to reduce risk of electrical fires, and it’s advised that a routine PAT test should be implemented every twelve months. It is a legal requirement for UK businesses to carry out a Fire Risk Assessment (FRA) - this identifies a host of fire-related pitfalls, such as fire hazards, the people at risk if fire strikes, emergency exit plans and even covers staff training. Ensure you have this document regularly updated (and in an easily accessible place) to ensure that all bases are covered. Invest in external lighting If your building is in a poorly lit area, it’s a good idea to invest in external lighting. You won’t need planning permission for this but use your best judgment to decide on the area you want to light up, and what gradient you’d like to use. It is best to have a system installed that automatically switches on when visibility is reduced. This also goes beyond just security; entrances and exits, ramps, pavements, and car parks should be well lit for additional safety for staff and visitors. Property maintenance Your business may be operating at a reduced level or potentially even closed in line with the government’s lockdown recommendations. It may still be important to have a senior member of staff visit the site at regular intervals to ensure that everything is in order. There’s never an ideal time to review your security, but it’s important to do it regularly to help pre-empt any potential opportunistic burglars and give yourself complete peace of mind.
COVID-19 has been a thorn in the side of countless companies within the security industry and far beyond. Here, we speak with Richard Huison, Regional General Manager for the UK and Europe at Gallagher Security, who summises his personal experience from these recent months and how Gallagher has adapted in the face of pandemic-induced adversity. How has the COVID-19 crisis impacted Gallagher on a day-to-day basis? Gallagher was actually well placed as a result of work already in progress with a number of visionaries and innovators within our business, such as our CIO Neville Richardson. They are determined to put the business on the front foot, making it more digital and proactive in delivering high speed change and we had already been migrating to Microsoft Teams before COVID-19 first reared its ugly head. It’s part of our philosophy to make our business and the solutions we create as stable, reliable and resilient as possible. Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world It means Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world. When lockdown was imposed, we set about prioritising our clients’ needs and delivering on our commitments as a critical supplier. The Gallagher leadership team quickly rolled out the means to stay connected, positive and safe as each region went into isolation. Effective communication, both internally and externally, has always been a critical success factor for our business. That hasn’t changed with the more remote and virtual nature of our communication now and, if anything, it’s even more important both for business continuity and for the personal wellbeing of each and every one of our colleagues. We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done in new ways, such as using the emojis on Microsoft Teams. Perhaps the most striking example of this is our new European marketing manager Bethan Thompson, who joined Gallagher on 1 April, little over a week after lockdown was imposed in the UK. She has enjoyed the richest and most comprehensive introduction to the business from the safety of her own home armed with just a laptop and Teams. What can be the benefits of having employees working from home? There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done To be honest, before COVID, we didn’t disconnect enough, close the laptop, switch off our technology and allow ourselves NOT to respond instantly. But trust is an integral part of our culture at Gallagher and we can easily and effectively continue to champion the right balance and support for the team moving forward. How can employees ensure they keep a healthy work/life balance? Working from home can require some personal discipline around taking regular breaks and disconnecting from technology. I encourage all my colleagues to stay active and get regular exercise during the day. Taking time out allows you to process ideas with greater clarity, to be more creative, to plan your day and use your time more effectively – all of which is part of achieving that balance. And it’s important that we do switch off and close our laptop at the end of the day, which requires some discipline when you work for a business headquartered in New Zealand, where they are 11 hours ahead. It’s good to cultivate hobbies and welcome distractions that you are passionate about, to switch off from work more effectively. Personally, I love to be outside on a long dog walk with no technology. It’s liberating. Are you seeing that businesses are already beginning to think differently about their security? We have to remember why security is important. We all have a different view on how we should maintain business continuity. Yes, properties need a reliable detection and defense solution to resist the opportunist. With the mass migration to work remotely, business leaders are concerned that their IT systems are vulnerable to attack and we read daily about the growth in cyber-attacks. It’s common sense to protect your business with a suitable access control and intrusion detection system and the pandemic has proven to business the value of being truly resilient and able to still operate whatever circumstances ensue. What will be the biggest security challenges facing businesses over the next six months? In that timeframe, I don’t see us returning to how things were prior to the pandemic, so businesses will have to adapt to a new normal. We will have to adopt a more holistic view of security, encompassing safety, security and wellbeing, with our teams at the heart of that. In the new world, how can we maintain our teams’ safety at home, or limit them to certain floor space or introduce rotas for office attendance and keep surfaces virus free while they’re there? We need to be alert to where the next threat will come from and mitigate risk against both cyber and biological threat as we’ve seen a virus in either domain can be devastating. How is Gallagher meeting the evolving demands of the market? To be honest, Gallagher has always been ahead of the curve. We’ve been talking about competencies, compliance and resilience for decades, long before cyber became the buzzword. Everything we do is related to business resilience and continuity and security is baked in to our products and solutions at source, providing confidence and reliability for all of our customers.
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyze the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognizing and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognizing and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behavior analytics Behavior analytics is another field of analytics based on artificial neural networks. Even if recognizing suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and license plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specializing in VMS and modular AI analytics at ISC West 2020. Even if recognizing suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and licence plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyze employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works VMS analyzes the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognized the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognize all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specializing in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specializing in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.
Trends in the alarm industry point to a need for a software system that accommodates business patterns such as recurring monthly revenue (RMR). Workhorse Service Company provides a software that combines customer relationship management (CRM), enterprise resource planning (ERP) and field service management (FSM) into a “cradle-to-grave” system designed specifically for the alarm industry. “Making an alarm sale is different than making a CCTV sale, and the processes for the salesperson, technician and customer service rep are different,” says Steven Hayes, founder of Workhorse Service Company. He says WorkHorse is built on modern programming languages, is responsive, and provides a pleasant user experience regardless of the device being used. Client experience “Before coming on WorkHorse, our clients have needed to use multiple softwares such as bookkeeping, quoting, central station software, email, spreadsheets, and more,” says Hayes. “This would cause issues with continuity between softwares. Mistakes are made, appointments are missed, and customers leave.” When building WorkHorse, Hayes and his team interviewed dozens of companies to find out what they were missing and what their pain points were. “There are other CRM and FSM softwares on the market, but the ones that are made for our industry are generally designed for dealer programs and selling contracts,” he says. “Others are designed to bill your RMR and have basic service call functionality.” Alarm companies know that they need RMR to survive, and WorkHorse seeks to make it easy. WorkHorse allows companies to have multiple subscriptions inside a single deal. Single point of data entry WorkHorse ensures a single point of data entry for alarm companies Merchant services come with Auto Updater. If a credit card expires or even if it is canceled, the service will reach out to the issuing bank and get the new number or token necessary to bill customers. This means less time with past due bills and calling on customers to get an updated form of payment. With two-way sync integration into central stations, WorkHorse ensures a single point of data entry for alarm companies. Information used at the time of the sale to create accounts is then pushed right from the tech portal to the central station. Employees can Create, Place Online/Offline, on test, and terminate accounts through the use of WorkHorse. The Workhorse call center, ProConnect.io, will answer phone calls and provide a Tier 1 Tech Support line for clients as a well as a concierge service. Operators will trouble-shoot alarm issues or create a service ticket if they cannot help them (subscriptions to both ProConnect and WorkHorse are needed). Operators will also try and collect money that is past due while assisting clients. Misconceptions in the industry Over the next year the prevailing trends will likely be a large swing from dealer programs to the traditional alarm company, says Hayes. This will make software like WorkHorse incredibly important as companies move from a funding program to managing their in-house sales, RMR, service, and customer retention, he adds. There is a misconception is that an owner/operator can purchase a bookkeeping software and run their alarm company efficiently and effectively. Another misconception is that someone can just turn on a software and know how to use it without any help or guidance, that “playing around” with it at night will be enough to make them proficient users. The software used to run a business should be a top priority. The software used to run a business should be a top priority The WorkHorse team is looking to expand verticals into other environments in the future. WorkHorse is built in a way that could easily expand verticals by making changes to the deal and service call modules. “In mid-2020 we plan on starting Pool Cleaning and Pest Control followed by HVAC, Plumbing, Electricians, and more,” says Hayes. WorkHorse has all in-house developers located in South West Florida. The team is continuously working to create additional features and integrations in order to bring the best user experience to clients and their customers.
The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry on issues involving municipal alarm management for the approximately 18,000 public safety agencies in the U.S. and Canada. Specifically, SIAC works to minimize the number of false alarms, which are a costly waste of resources for law enforcement jurisdictions. SIAC works directly with leaders in law enforcement at the national level, such as the International Association of Chiefs of Police (IACP) and the National Sheriffs’ Association (NSA); and at the state and local levels to provide expertise and proven strategies to reduce unnecessary dispatches to alarm sites while maintaining the police response taxpayers endorse and deserve. The primary tools for alarm management are education on causes of false alarms and implementation of the Model Ordinance for Alarm Management and False Alarm Reduction. SIAC's Model Ordinance SIAC works to minimize the number of false alarmsRecently both the International Association of Chiefs of Police and National Sheriffs’ Association passed resolutions supporting SIAC’s Model Ordinance. This has resulted in dispatch reductions between 40-50% in jurisdictions where all of the model’s recommendations have been followed. Adoption of some version of the Model Ordinance grows each year. It has been adopted nationwide by over a thousand large cities and small towns. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee through state associations of chiefs of police. “This enables the industry to work with law enforcement leadership on a regular basis and in a formalized structure to discuss and address issues,” says Stan Martin, SIAC Executive Director. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee SIAC worked with the industry on new alarm panel standards that made it less likely an end user would trigger a false alarm. The overall dependability and sophistication of alarm systems have also helped make them less vulnerable to outside forces that can trigger the system. Video and audio technology are playing an ever-increasing role with helping monitoring centers evaluate whether a crime is in progress before dispatching the police. Dramatic changes in the industry Kirk MacDowell was recently selected as SIAC’s new Chairman of the Board. He is a dynamic industry leader with more than 39 years of experience in the industry. SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes in the structure of the electronic security industry. The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes Some cities require a "verified response" before police officers are dispatched to an alarm. This requirement is problematic for the end-user as it requires a third-party confirmation that a crime is being or has been committed. This creates a significant delay in response to crime victims needing immediate help. Fortunately for citizens, the vast majority of cities have rejected ordinances that require confirmation that a crime has taken place prior to police dispatch – verified response. Over the past 15 years only about 34 of 18,000 public service agencies in the U.S. have adopted some form of verified response and 10 of those cities ended the policy. It is important to note that despite the rejection of verified response in favor of the Model Ordinance, there are still individuals who lobby aggressively to curtail police response without verification. This requires a continued and aggressive education program to get in front of these lobbying efforts which are based on false premises and misleading statistics, says Martin. Despite SIAC’s success, there are a number of important issues that need to be addressed, says Martin. First is the high turnover among law enforcement leaders and elected officials. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders who are currently rising through the ranks of their departments. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders Coordinating challenges Another challenge has been the attempt by at least one city (Sandy Springs, Ga.) to fine alarm companies for customer-generated false alarms. SIAC is currently coordinating a challenge of that ordinance in federal court with the state alarm association in Georgia. SIAC is also working on plans for more secure funding and on succession planning so the organization can continue to move forward aggressively in the future. SIAC, Inc. is a 501(c)(6) not-for-profit Delaware corporation. The Board of Directors has two members from each of the major North American trade associations: Canadian Security Association (CANASA), The Monitoring Association (TMA, formerly CSAA), Electronic Security Association (ESA), and the Security Industry Association (SIA), and an elected official. SIAC is funded by donations from individual companies. There are no memberships dues, and the organization sells no products or services.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
One of the largest public train operators in the United Kingdom, Southeastern Rail Network, now relies on a smart video security solution from Bosch Security Systems to secure twelve train depots, including five unmanned locations, against theft and intrusion. The fully digital video surveillance system presents a significant upgrade to the British train operating company, which provides train services between London, Kent and parts of East Sussex and transports 6, 40,000 passengers each weekday on its 392 trains. built-in Intelligent Video Analytics Powered by cameras featuring built-in Intelligent Video Analytics, the solution was installed and configured to the specific requirements at the train depots by Bosch integration partner, Taylor Technology Systems Ltd., over the course of six months. Video security system relies on machine learning algorithms to automatically sound alarms on security threats Fully operational at all twelve locations, the video security system relies on machine learning algorithms to automatically sound alarms on security threats, such as intruders and perimeter breaches. Beyond security applications, the system also tracks important metadata on the arrival times of trains, while also monitoring deliveries at the train depots, among other AI-assisted functions that it carries out. IP-based cameras with Starlight technology The cameras portfolio installed across the twelve depots replaces an analog legacy solution with IP-based security cameras from the Flexidome, Dinion, and Autodome product lines of Bosch Security Systems. These smart cameras include Bosch’s Intelligent Video Analytics capabilities as a built-in feature, ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Because night-time security and surveillance is critical, especially at the five unmanned train depots on the network, the Bosch cameras rely on Starlight technology to provide full intelligent analytics at night and in low light levels. The Starlight technology supports color filtering down to a light level of only 0.0077 lux, so as to deliver detailed monochrome images where other cameras show no image at all, and guard against intruders and unauthorized entry around the clock. Featuring digital ‘trip wire’ to counter false alarms Highly resilient against false alarms, the smart cameras can detect movement at the perimeters of the train depots using a digital ‘trip wire’. In case of a security breach, the system alerts Southeastern Rail Network’s watch personnel, who can view live camera footage, as well as recordings of incidents for heightened situational awareness and total perimeter security. Instead of relying on the pre-configured capabilities, such as vehicle tracking and more, security personnel can also use the built-in camera trainer function to ‘teach’ new functionality, such as detecting certain types of objects or situations. Remote video recordings storage with Divar recorders Recordings from the depots are safely stored and managed remotely with Divar recorders in encrypted format As an integral part of this end-to-end Bosch security solution, recordings from the depots are safely stored and managed remotely, using Divar all-in-one recorders in encrypted format. When looking at the bigger picture, the video security solution adopted by Southeastern Rail Network is part of an industry-wide evolution from cameras as mere video capturing devices to smart sensors capable of collecting rich metadata. Insights beyond security This metadata unlocks unique insights beyond security, including video analytics at the train depots that support applications such as monitoring deliveries to onsite buildings, providing access to personnel and logging the arrival and departure times of incoming trains. The system thereby not only ensures that all train depots remain fully guarded and protected 24/7 against criminal access, but also provides a data-based foundation to keep efficiency gains and cost savings on track in the long run.
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defense system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor center. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”
The new CCTV system installed by WLS at Vauxhall City Farm, is according to its Chief Executive, Monica Tyler, being used to its full potential to ensure that the 50,000 visitors who visit the farm every year, are able to safely enjoy all its facilities. “Our previous CCTV was well past its ‘use-by’ date. Although it was still working, it lacked the functionality we needed to ensure around the clock security of our animals and property, as well as ensuring compliance with our health & safety procedures,” said Monica. Central urban farms “The new CCTV system, generously donated and installed by WLS, has transformed our working lives by providing us with peace of mind in knowing we can monitor every area of the farm, including our recently opened eco-garden, without any blind spots.” “The quality of the images captured by the Dahua cameras enable us to see close up detail of any activity or incident, whilst I and other colleagues are able to use an app running on our mobile phones to remotely keep an eye on the farm when it is closed and if there is an alarm event.” Located within earshot of Big Ben, Vauxhall City Farm is one of the oldest and most central urban farms in London. Local and wider communities The farm was established in 1976 when a group of architects began working on a vacant plot of land The farm was established in 1976 when a group of architects began working on a vacant plot of land and made it available to local residents for them to grow vegetables and care for livestock. From those humble beginnings, the farm has continually grown and is now the home for over 100 animals, a riding center and a cafe, and with the enthusiastic support of a large team of volunteers, conducts dozens of education and youth projects. As a registered charity, the farm’s main objectives are to enhance the health, well-being and life chances of children and disadvantaged people, as well as create enjoyment and recreational opportunities for those from our local and wider communities. Intruder detection systems WLS’s connection with Vauxhall City Farm spans over 15 years, during which it has installed and maintained the farm’s fire and intruder detection systems, as well as the now superseded CCTV system. Alison Ewen, the wife of WLS’s managing director, also has a close bond with the farm. Having been a volunteer for over 20 years, Alison has been appointed a trustee specializing in Riding for the Disabled activities. “As a company which has enjoyed considerable success installing a great number of electronic security solutions across London, we believe we have a corporate responsibility to give something back to the community,” said Jeremy Ewen. “We have welcomed the opportunity to do so by supporting a charity which we have such high regard for, in respect of the support, education and enjoyment it gives to so many people.”
Security and surveillance systems have become a vital component of a casino management system enabling gaming club operators to monitor and manage security threats in real time. Apart from the original purpose of security measures, it helps raising concerns over card counting, advantage playing, and various other suspicious or prohibited activities. However, a typical casino atmosphere often involves great complexity in its environmental lighting, leading to high noise level in captured video images. Challenges: Inadequate lighting in casino making it difficult for cameras to distinguish colors and movement, resulting in blurry images. Lack of advanced video analytic functions in traditional surveillance systems presents difficulties to an effective monitoring process, with high labor cost needed for scanning live views and recorded footages manually. Access control system Different casino areas require different solutions to fulfill its demand. At gaming tables, it’s critical to capture the subtle movements of each players and dealers. Cameras with higher FPS, 3D DNR and super low lux image sensor gives a neater and brighter image under dim lighting, while 2-way audio provides additional audio information. Casino operations involve a multitude of monetary transactions in critical areas including cages, vaults and offices where cash, chips, and other valuables are circulated. An access control system integrated with facial recognition functions helps operators in strengthening the security level. Exceptional customer experience is the key to good customer loyalty. Facial recognition system Video analytics allows operators to filter videos recording smartly with object attributes With ANPR (Automated Number Plate Recognition) and facial recognition embedded into the management system of carparks and VIP lounges, customer entry and exit can be streamlined minimal interruptions. A modern video surveillance system complemented by top notch IP cameras can improve and simplify the entire operation. Modern video management software possesses features that are not offered by traditional systems. Video analytics such as human object detection allows operators to filter videos recording smartly with object attributes, e.g. colors of customer clothes. The architecture of modern video management provides scalability to accommodate the growing amount of video sources during business expansion. Standardized protocol offers higher interoperability in terms of 3rd party system integration with access control or alarm system. Cameras for centralized management Thanks to the internet, control center is now able to receive and group videos from dispersed cameras for a centralized management. The operators could access to the live views of different casino affiliates and receive real-time notification on cellphone devices when specific events are in action.
Empire House, the luxury business members' club due to launch in West Yorkshire in a few weeks, has invested a five-figure sum in state-of-the-art, automated security systems to create a slick customer experience, intensify site security and help protect clients from COVID-19. In readiness for opening in a few weeks’ time, the Slaithwaite-based business center – which will incorporate offices, a ‘lounge’ area with stocked bar and corporate and event facilities – is set to attract businesspeople from all over West Yorkshire and offer 24-hour access to tenants. CCTV and intruder system Recognizing a need to heighten client experience and reduce the manpower required, Empire House has invested in CCTV, access control, fire and intruder alarm support from Huddersfield-based specialists, Centurion Fire & Security Ltd. The automated system has been designed to make the management of the building simple. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality Able to be programmed to allow and deny access around the building, the system ensures that no unauthorized individuals can gain entry. It is wholly integrated with the CCTV and intruder system, permitting ‘triggers’ and push-notifications to key holders when an area has been ‘breached’. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality, allowing or denying entry based on whether they are wearing a mask or not. Manned onsite teams Amy Byram is the founder of Empire House. Commenting on the investment, she said: “We wanted to provide the utmost security for our clients, whilst ensuring that their experience is slick and uninterrupted – the last thing that people want is to feel that their privacy is being intruded, and we have got that balance just right.” “I am impressed with the functionality of the software, which will allow the management team to ensure security is maximal at all times, without the costly need for manned onsite teams. We can lock and unlock doors directly from an app, whilst enabling us to mark people as safe or missing in an emergency. We hope our clients will be as equally as impressed by the technology as we are.”
Inaugurated in 2012, the government of West Bengal had taken an initiative to build a Cultural & Research Institute to commemorate the birth anniversary of Bengal’s polymath, known as the Bard of Bengal, globally. Spread over an area of 4.89 acres, the institute is in the heart of New Town with facilities including an auditorium, art gallery, exhibition hall, mini cinema hall and music room. Every year, thousands of guest tour exhibits, attend cultural programs, enjoy movies, and view artifacts. Incident management While the Cultural & Research Institute had delegated personnel to keep a watch on the premises, manning the expansive property proved to be time-consuming and inefficient. For security team, round-the-clock security preparedness at the location was crucial and ensuring the safety and security of the guests was quite a challenge. The management wanted to build a unified solution, aiming to not only deliver 24x7 surveillance but also empower the on-ground team to manage incidents proactively. Specially, they were facing the conflicting dilemma of keeping priceless objects safe yet allowing millions of visitors a chance to see them Intelligent VMS After analyzing the requirements, the Videonetics team conducted a detailed survey of the property along with the system integrator for the project, Prakash Electricals, to draw out a comprehensive plan for the campus. The state-of-the-art Videonetics unified solution combining Intelligent VMS and Intelligent Video Analytics coupled with IP cameras were chosen to address the unique needs of specific areas. Videonetics Intelligent VMS helps in recording and viewing 25+ cameras throughout the property including gated entrance, open-air pavilion, fountain park, art gallery, auditorium, passages, server room to name a few. The institute wanted a video analytics solution that could help with protecting valuable artifacts in the art gallery. The art gallery is secured with a virtual and invisible protective barrier called Artifact Protection. If an individual breaches this perimeter, in an attempt to touch or steal an artwork/paintings, an alarm is triggered and immediately received both in the centralized location as well as by the security personnel on their mobile devices, allowing them to react and take action quickly. During the survey, some of the vulnerable areas were identified where Videonetics deployed Zone Monitoring as part of the unified solution. The zone monitoring was required at the entrance, operators’ room, art gallery, park space, to detect when a person stays beyond a certain duration in a user-marked zone. Monitored facility The Cultural & Research Institute has been very successful in promoting an open and secured environment where guests and staff could move freely throughout the premises while keeping an eye on strategic locations and limiting access to more sensitive areas such as management offices, cash handling office and crossing barrier near to precious artifacts. Today, incidents are rare at the institute; but if something happens, the team is ready. The security team is alerted in real-time to any irregularities within the site, including tampering with the exhibits and entry into the restricted access zones. From the start of the tour, visitors become aware that they are in a secured and monitored facility. “As we looked to address a variety of surveillance challenges, we were assured to have Videonetics on board to exceed customer’s expectations, in terms of intuitive functionalities, open architecture and accuracy. With Videonetics team, we have successfully provided a right balance between securing the people and protecting assets, to the institute,” expressed, Ujjwal Kumar Dey, Partner, Prakash Electricals.
Round table discussion
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?
Security alarm: Manufacturers & Suppliers
- RISCO Group Security alarm
- Vanderbilt Security alarm
- OPTEX Security alarm
- Bosch Security alarm
- ADPRO Security alarm
- Texecom Security alarm
- DSC Security alarm
- ITI Security alarm
- Klaxon Security alarm
- Climax Technology Security alarm
- Visonic Security alarm
- CQR Security alarm
- Esser Security alarm
- Scantronic Security alarm
- Guardall Security alarm
- Elmdene Security alarm
- IR-TEC Security alarm
- Senstar Security alarm
- Hanwha Techwin Security alarm
- Concept Engineering Ltd Security alarm