Blind spots in surveillance coverage, incompatible video and access control systems, lack of adequate perimeter measures are some of the common issues that facility directors must address with their security teams. At the end of the day, facility executives need technology that accomplish more with less and that expand situational awareness, overall system functionality, and real-time response capabilities, while generating cost savings. By leveraging technology like thermal imaging, this is pos...
Panasonic i-PRO Sensing Solutions Corporation of America announces the introduction of their new body-worn camera for law enforcement applications. Designed to provide officers and agencies with a superior solution for evidence collection and documentation, the new i-PRO BWC4000 features a 12-hour detachable battery that can be swapped quickly in the field with a compact spare. “Our new i-PRO BWC4000 equips law enforcement professionals with the superior video technology they need to help...
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, has announced the launch of its new high definition Wisenet X PTZ PLUS cameras. Available immediately from Hanwha’s extensive network of resellers and systems integrators, the new cameras feature AI-based object tracking, precise PTZ control, improved pre-set accuracy, adaptive IR illumination and enhanced cyber security. Designed for perimeter protection and large, open area applications such as airp...
IDS is now offering more than 20 new C-mount lenses. Thanks to lens resolutions of 5, 8 and 10 MP as well as different focal lengths and optical classes, they can be used in numerous application scenarios. In addition, they are characterized by a very good price-performance ratio. With these features they fit seamlessly into the "It's so easy!" product philosophy of the company. "When implementing image processing applications, it is not only important to choose the right camera, the lens also...
Overview Ltd, renowned UK developers of high-precision, sensor and camera positioning technology, this week announced the release of their Hydra 3000 series of rugged PTZ surveillance cameras which offers a range of enhanced features. The Hydra 3000 has been designed to support operation in harsh, outdoor environments. Incorporating the same quality build synonymous with Overview’s existing Hydra family of high-performance Pan-Tilt-Zoom (PTZ) camera platforms, Hydra 3000 combines aestheti...
‘Making things easier’ – Under this maxim, the Panomera multifocal sensor systems by video technology manufacturer, Dallmeier have guaranteed maximum image and analysis data quality with minimum camera units for ten years now. The latest generation of the Panomera S-Series features a completely new design and offers numerous innovations, from the one-man mounting concept to contactless front glass cleaning, and above all, superior video analysis capabilities. Panomera multifo...
Choosing the right interface for the machine vision application is a key decision in one’s camera selection process. The following sections provide an overview of the different types of cables and connectors available for machine vision applications along with associated pros and cons. Useful for applications where extremely high-speeds or ultra high-resolution necessitate the use of such interfaces; for example, line-scan cameras used to inspect continuous flow processes like paper or plastic film production where cameras frequently work in the kHz range. However, these interfaces tend to be significantly more expensive, less flexible and add to system complexity. Machine vision interfaces These are specialized adapter cards to receive image data and assemble it into usable images CarmeraLink (supports up to 6.8Gbit/s of data) and CoaXPress (supports up to 12Gbit/s) are dedicated machine vision interfaces typically used in such applications. In addition to the cameras, systems using these interfaces require frame grabbers. These are specialized adapter cards to receive image data and assemble it into usable images. Dedicated machine vision interfaces also use proprietary cables, making integration with other peripherals a little more challenging. CoaXPress (CXP) The CoaXpress interface was launched in 2008 to support high-speed imaging applications. CXP interfaces use 75ohm coaxial cables and support data transfer speeds of up to 6.25Gbit/s per channel, with the ability to use multiple channels to support even faster data transfer rates. A CXP cable can supply up to 13W of power per cable and requires that both the 'device' and the 'host' support the GenICam camera programming interface. While single-lane coaxial cables are inexpensive, the cost of setting up multi-lane cable assemblies and frame grabbers add up very quickly. Maximize signal integrity CameraLink The CameraLink standard was launched in the year 2000 by Automated Imaging Association (AIA) and has been upgraded progressively in order to support higher data speeds, with some versions requiring two cables for transmission. The three main configurations available include Base (2.04Gbit/s), Medium (5.44Gbit/s) and Deca/Extended (6.8Gbit/s). The base standard uses MDR ("Mini D Ribbon") 26-pin connector, while the medium/full configuration doubles capacity using a second cable. The Deca/Extended versions go beyond limits imposed by CameraLink, carrying up to 6.8 Gbit/s of data. Like CXP interfaces, CameraLink requires frame grabbers and additionally need to be compatible with Power over Camera Link (PoCL) standard in order to supply power. CameraLink lacks any error correction or resend capabilities, requiring expensive and cumbersome cable setups to try and eliminate dropped images by maximizing signal integrity. Machine vision implementation Consumer interfaces These interfaces enable machine vision cameras to connect with host systems using widely available USB and Ethernet standards. For most machine vision applications, the USB 3.1 Gen 1 and Gigabit Ethernet consumer interfaces provide a winning combination of convenience, speed, simplicity and affordability. Furthermore, consumer interfaces support widely available hardware and peripherals for machine vision implementation. Most PCs, laptops and embedded systems include at least one port each of Gigabit Ethernet and USB 3.1 Gen 1 USB and Ethernet hubs, switches, cables and interface cards can be purchased anywhere from Amazon to the local computer or electronics store at a range of price points to suit the exact requirements. Most PCs, laptops and embedded systems include at least one port each of Gigabit Ethernet and USB 3.1 Gen 1. The most obvious difference between these categories of interfaces is their bandwidth. Faster interfaces enable higher framerates for a given resolution. Semiconductor wafer inspection system A faster interface enables you to capture more images each second or capture higher resolution images without sacrificing throughput. For example, a semiconductor wafer inspection system being upgraded from 8” to 12” wafers, higher resolution cameras will be required. In this case, the system designer will need to choose between keeping their existing interface and trading higher resolution for reduced throughput, or upgrading to a faster interface to maintain or improve the throughput. The user’s requirements for resolution, frame rate, cable length and host system configuration should all be considered to ensure they get performance they require without spending more than they need. FLIR’s machine visions cameras support all three trusted and widely available interfaces. Camera control protocols Universal Serial Bus (USB) USB is everywhere. Look around and count the number of USB devices and accessories around. Most USB machine vision cameras use the USB 3.1 Gen 1 interface. This interface provides up to 4Gibt/s of image data bandwidth between the camera and the host system. The USB3 Vision standard helps ensure compatibility between a wide range of cameras and software by defining a common set of device detection, image transfer and camera control protocols. The 5m maximum cable length of USB 3.1 Gen 1 is generally not an issue for embedded systems USB supports Direct Memory Access (DMA). With this DMA capability, image data can be transferred across from the USB directly into memory where it is available for use by software. DMA coupled with the widespread support for USB and availability of drivers for USB controllers on virtually any hardware platform makes USB ideal for use in embedded systems. The 5m maximum cable length of USB 3.1 Gen 1 is generally not an issue for embedded systems. Active optical cables USB 3.1 Gen 1 can simplify system design by supplying up to 4.5 W of power to a camera. The recently developed USB Power Delivery specification allows some hosts to supply more power to devices like rapid-charging cellphone, this specification is independent from the base USB 3.1 Gen 1 standard and has not been adopted by machine vision camera manufacturers. High-flexibility USB cables help maximize the lifespan of cables in systems where the camera must be moved repeatedly. Active optical cables (AOCs) may be used to greatly extend the working distance and provide Electromagnetic Interference (EMI) resistance. The performance of active optical cables is dependant on the throughput requirements and the host system configuration. When using optical cables, even those that supply power via the cable, FLIR recommends using powering cameras externally via GPIO. Locking screw position Additionally, locking USB cables provide a secure connection between cables, cameras and host systems. Prior to purchasing locking cables, FLIR recommends checking the locking screw position and spacing compatibility, as several options are available. USB 3.1 Gen 1 is available on FLIR Blackfly S - Cased and Board level versions, and the tiny Firefly S. Gigabit Ethernet (GigE) GigE provides up to 1Gbit/s of image data bandwidth. Its combination of simplicity, speed, 100m maximum cable length and ability to supply power to cameras over a single cable make it an extremely popular camera interface. Ethernet cables are available with robust shielding. This is ideal for environments with high electromagnetic interference caused by proximity to the powerful motors found in some robots and metrology equipment. Software accessible memory FLIR GigE cameras also support a packet resend feature which further boosts transmission reliability. Unlike USB, GigE does not support DMA. Packets containing image data are transmitted to the host where they must be reassembled into image frames prior to being copied to software accessible memory. This process is trivial for modern PCs, though it may result in latency for some low-power embedded systems with limited system resources. The widespread adoption of Gigabit Ethernet means there is an incredibly wide range of supporting products from cables to switches, ready to meet any project requirement. GigE cameras support the IEEE1588 PTP time synchronization protocol, enabling cameras and other Ethernet enabled devices such as actuators and industrial Programmable Logic Controllers to operate on a precisely synchronized common time base. High flexibility requirements The widespread adoption of Ethernet across many industries has enabled availability of many specialized cables and connectors for a wide range of use cases. For example, there are Ethernet cables designed to protect against EMI (Electromagnetic Interference), high temperature and chemical resistance, while some cater to high flexibility requirements and so on. Ethernet cables have a category number depending on their construction Ethernet cables have a category number depending on their construction. CAT5e is the most common for GigE, while CAT6A, CAT7 and CAT8 may be used for additional EMI resistance at the expense of greater cost and increased cable diameter. Some industrial devices use an X-Coded M12 connector to provide increased shielding, however, for most applications, the familiar RJ-45 connector is good enough and provides greater convince at lower cost. 3D scanning Additionally, screw locking RJ45 connectors easily add additional security to RJ45 cables. 10Gigabit Ethernet (10GigE) 10GigE builds on the strengths of GigE by increasing the bandwidth to 10Gbit/s. 10GigE is an ideal interface for high-resolution 3D scanning, volumetric capture and precision metrology. GigE and 10GigE can be combined in numerous ways. Multiple GigE cameras can be connected to a 10GigE switch to support multiple GigE cameras at full speed over a single 10GigE port on a host system. Incoming image data While CAT5e cables will work with 10GigE cameras over distances less than 30m, CAT6A or higher cables are recommended. 10Gbit/sec is a lot of data. Modern PC systems with high-speed CPUs, PCIe 3.0 and dual channel memory can handle this well, while higher performance systems can support multiple 10GigE cameras. Embedded systems with reduced system resources will generally lack the memory bandwidth and processor speed required to keep up with the incoming image data. 10GgiE is available on FLIR Oryx cameras. Both consumer and dedicated interfaces are used across many machine vision applications. Pros and cons mentioned in previous sections would eventually determine the suitability of one over another for a specific use case. However, the combination of performance, ease of use, widespread availability and low cost make consumer interfaces an attractive choice for most machine vision applications.
Acoustic imaging, or the ability to see ultrasonic sound, has emerged as an effective method for manufacturing and utility organizations to locate compressed air leaks or the existence of partial discharge (PD). It enables professionals to conduct more frequent predictive maintenance routines, to help provide a crucial first warning of impending electrical/mechanical failure that could lead to energy loss and even worse, downtime of critical systems. To help customers take advantage of the benefits of ultrasonic imaging, FLIR made its Si124 industrial acoustic imaging camera available for purchase globally. The FLIR Si124 industrial acoustic imaging camera senses, displays and records sound waves producing a precise acoustic image. The acoustic image is overlaid, in real time, onto a digital camera image all with an easy-to-use, ergonomic, one-handed camera solution weighing a little more than 2 pounds (980 grams). Detecting compressed air leaks The blended visual and sound image can be viewed live on screen to help users’ pinpoint issues from the sound source, helping staff identify issues up to 10 times faster than traditional inspection methods for common mechanical, electrical, vacuum and compressor systems. Built with 124 microphones and a high definition visible-light camera, the battery-powered Si124 can detect potential issues up to 100 meters away, even in loud industrial environments, for up to seven hours of continuous use. Two primary use cases for the Si124 include detecting compressed air leaks and partial discharge (PD) such as corona, arcing, and tracking. Compressed air is often the single most expensive energy source in factories, but air is often lost due to undetected leaks or equipment inefficiencies. Potential unplanned downtime The Si124 provides the ability to perform quick non-contact inspections from a safe distance That leaked air can be difficult to detect by the human ear or touch, particularly in loud manufacturing environments where workers are required to wear hearing protection. The Si124 can solve this issue by visually pinpointing the exact source of a leak instantaneously, especially in hard to reach places that might otherwise go unnoticed. For high-voltage electrical systems, PD can preface a catastrophic failure, creating an unsafe environment and potential unplanned downtime. The Si124 provides the ability to perform quick non-contact inspections from a safe distance. The system then immediately provides the PD type, allowing users to prioritize repairs. What sets the Si124 further apart from other cameras is the FLIR Acoustic Camera Viewer cloud service. Online cloud portal Image captures are quickly uploaded over Wi-Fi to the cloud service then immediately analyzed, providing the user in-depth information such as the size and energy cost of a compressed air leak or the PD classification and pattern of an electric fault. This information is accessible on the Si124 and through the online cloud portal. In addition, users get 8 GBs of storage and wireless data transfer capabilities, making sharing photos and data simple and efficient.
The National Security Inspectorate (NSI) has announced the launch of a new eLearning course to help NSI approved companies understand and apply the requirements of the revised Code of Practice BS 7858:2019 'Screening of Individuals Working in a Secure Environment'. NSI eLearning screening course This introductory eLearning course is available to all who wish to enroll, but is particularly useful for screening administrators and controllers. Accredited by the National Security Institute’s CPD Scheme, the course includes guidance on information and documentation requirements, relevant legislation and regulatory requirements, the difference between personal opinion and fact, and the implications of non-compliance. Upon completion of the course, learners will understand the reasons for screening and will be able to assist in developing an effective screening process. The eLearning course will also help them understand how to apply the requirements in practice. Each learner will receive a personalized certificate of completion. Split into four parts, the eLearning course will take approximately two hours to complete, and learners may log in and out as many times as they wish, saving their progress each time. Understanding requirements of BS 7858:2019 We are very pleased to be able to offer this new eLearning course to our approved companies" Max Linnemann, Head of Certification Services at the National Security Inspectorate said, “We are very pleased to be able to offer this new eLearning course to our approved companies. We are committed to helping our companies keep on top of standards developments and widening their access to training.” Max adds, “Our new eLearning screening course provides a cost-effective and convenient way of understanding the latest requirements of BS 7858:2019, which NSI approved companies in the security systems and guarding services sectors need to be aware of.” Those who would like to find out more information about the course, pricing and how to enroll for the course will be required to contact Maxine Dent, Training, Facilities and Events Coordinator, at the National Security Inspectorate, via email.
The rampant spread of COVID-19 around the globe continues to challenge public health officials and governments alike to find ways to manage the spread of the disease until an effective vaccine can be developed. This challenge has led to new and novel approaches, particularly in the use of technology. One of the most recent technology applications to control the spread of the virus is the use of security cameras combined with facial recognition software. Facial recognition is part of a computer software category that uses video content analysis (VCA) technology. VCA technology uses machine learning and artificial intelligence to detect objects within a video image and then extract, identify, classify, and index them for a broad range of applications. As schools and businesses reopen, contact tracing has become an essential tool in preventing the spread of COVID-19. However, not surprisingly, people infected with the virus often struggle to remember everyone they have come in contact with in the previous two weeks, which reduces the effectiveness of contact tracing. Video security systems Instead of relying on human memory, schools and businesses that have video security systems can use facial recognition to quantify people's proximity across time and location. They can track where on the premises a student or employee has been and identify any other people that person has been in contact with while in the building. This technology helps avoid having to close an entire school or business when an individual tests positive for the virus by providing more precise information about what areas need to be sanitized and who may need to be quarantined. Safe and responsible reopening VCA technology and video security systems can also be used together to help ensure safe and responsible reopening In addition to contact tracing, VCA technology and video security systems can also be used together to help ensure safe and responsible reopening during the current pandemic in other ways, too: Improving compliance with face mask requirements -- Providing the ability to search for people with or without a mask, facial recognition can be used to detect face mask violations in real-time and alert those responsible for ensuring compliance. Limiting occupancy to ensure proper social distancing -- Video management systems software can be encoded with lower occupancy thresholds and rules to count the number of people entering and exiting a building or an area within it and send alerts when the occupancy thresholds are met. This allows security staff to ensure proper social distancing and provides a better understanding of where social distancing may be more challenging. Contact tracing Here is one example of how a business might use facial recognition for contact tracing. When an employee self-discloses that he/she has tested positive for COVID-19, the employer can upload a digital image of that employee into its VCA system to conduct a filtered search through its video footage for the last 2-3 weeks for any face matches for that employee. When matches are identified, the operator can review the video for each match to identify where in the facility the employee has been and who the employee may have come in contact with. The employer can then notify those individuals that they may have been exposed to the virus and recommend or require that they self-quarantine for the recommended 14 days. It is incumbent on the employer and required by the federal Health Insurance Portability and Accountability Act (HIPAA) to protect the individual’s identity when notifying the people he/she has interacted with. Important Considerations Critics argue that using video surveillance with facial recognition in hospitals and public spaces creates privacy issues Research has found that facial recognition is not as accurate as people may think. In an analysis of the use of facial recognition technology in law enforcement, Cardiff University found thousands of false-positive matches. Concerning facial recognition algorithms' accuracy, the National Institute of Standards and Technology (NIST) defines a false positive as two different individuals incorrectly identified as the same person. A false negative means that the software failed to match two images of the same person. The fact is, facial recognition technology has been controversial since its development. While facial recognition has been used to locate missing children and has improved the security at airports against terrorism, critics argue that using video surveillance with facial recognition in hospitals and public spaces creates privacy issues. In contrast, others point to concerns that inaccurate results can lead to false arrest problems when used in law enforcement. Facial recognition Given the strong feelings that the use of this technology can elicit, any organization considering using facial recognition should be prepared to address them openly. The Brookings Institute has developed several recommendations to help protect people from the potential problems facial recognition software can pose. These recommendations were developed prior to the emergence of COVID-19. Transparency However, while many of them will take years to implement, there are two that, in the short term, can do much to help ensure the responsible use of facial recognition in preventing the spread of the disease: Limit the Data Storage Time -- This is a reform that could go far in mitigating privacy concerns and fears around the misuse of data for purposes other than that for which it was originally collected. Data collected for contact tracing will no longer be relevant after the pandemic is over; therefore, there is no need to retain it beyond that. Defining limits on how long such videos will be retained will instill confidence that their images are used only for beneficial purposes and only for a specific period. Provide Clear Notification in Public Areas that Facial Recognition is Being Used and Why -- This would allow those who object to avoid those areas. While it would seem that everyone who wants to do whatever they can to help control the spread of COVID-19, some may not agree that facial recognition is an appropriate way to do that. Transparency concerning the use of these technologies in public spaces is therefore very important.
IDS Imaging Development Systems GmbH has announced extended its Ensenso N 3D camera series with the introduction of Ensenso N40/N45 3D cameras that are compact, lightweight and collaborative. Ensenso N 3D camera series The Ensenso N-Series is a compact and robust 3D camera system designed specifically for 3D applications in robotics and automated series production. Thanks to IP65/67 protection, it is also well-suited for use in harsher environments. The Ensenso N-Series camera family is now being expanded with the addition of the new N40 and N45 models. They feature a novel design, both inside and outside. Lightweight and with rounded edges, they open up new application possibilities, for example in collaborative robotics. Ensenso N40/N45 3D cameras The housing of the new Ensenso N40/N45 3D cameras is made of fiber-reinforced plastic The housing of the new Ensenso N40/N45 3D cameras is made of fiber-reinforced plastic, resulting in the lightest stereo vision cameras with Gigabit Ethernet in the IDS product range. When mounted on a robot arm, for example, this means less stress on the robot mechanics. The Ensenso N40/N45 3D cameras also minimize the risk of injury thanks to their rounded edges. As a result, they also excel in collaborative use with human colleagues. Enhanced infrared projector Furthermore, the housing meets the requirements of protection class IP65/67 and is effectively protected against dirt, dust and water spray. Electronics have also been revised for the new 3D cameras. The improved infrared projector enables higher light output and has an optimized heat management. This results, among other things, in better data quality or higher clock rates. The projector is optionally available with blue illumination in the visible range (465 nm) or with infrared illumination (850 nm). Equipped with monochrome CMOS sensors The new models each include two monochrome CMOS sensors (global shutter, 1280 x 1024 pixels) and are equipped with screwable GPIO connectors for trigger and flash. Power-over-Ethernet allows data transfer and power supply to be realized even over long cable distances. The Ensenso selector on the IDS website helps customers to choose the right camera model. A new stereo matching process, which is available as standard for all models, when using the Ensenso SDK 3.0, also ensures particularly detailed point clouds. ‘PatchMatch’ works extremely effectively with a large distance range at different object distances and without significant effects on the execution speed of the algorithm. This benefits, for example, applications in which large volumes are to be captured in the shortest possible time.
TRENDnet, a pioneer in reliable SMB and consumer networking and surveillance solutions, announces that its Gigabit PoE+ smart surveillance switch Series is currently shipping and available for purchase. These smart surveillance switches are the first network switches to be designated as ONVIF® Conformant, supporting ONVIF Profile Q. TRENDnet’s Gigabit PoE+ Smart Surveillance Switches are integrated with camera management functions which are easily accessible within the surveillance switch’s user interface. The new smart surveillance switch Series were originally planned to be on display at ISC West 2020 in Las Vegas. Camera firmware upgrades The Gigabit PoE+ Smart Surveillance Switches Series launches with two models, the 18-Port Gigabit PoE+ smart surveillance switch (TPE-3018LS) and the 12-Port Gigabit PoE+ smart surveillance switch (TPE-3012LS). Camera management functions available through the switch’s GUI include modifying camera administrator access, performing camera firmware upgrades, e-map support, and changing IP addresses. The ONVIF Conformant designation ensures users that Profile Q requirements have been met, which guarantees a level of interoperability with other ONVIF devices, such as NVRs, IP cameras, and software. The PoE self-healing support on these Smart Surveillance Switches include both PoE device-recovery, and switch power scheduling. If the Smart Surveillance Switch fails to respond, or if the network connection to a connected device is interrupted, TRENDnet’s Gigabit PoE Smart Surveillance Switch Series will auto-reboot or power cycle the affected PoE port and/or the entire switch. Critical network operations Managed switch features include IPv6, QoS, IGMP snooping, port bandwidth controls, and spanning tree support The PoE self-healing support featured on these Smart Surveillance Switches helps to reduce overall network downtime and the amount of onsite support required, which can be crucial especially during critical network operations. TRENDnet Gigabit PoE+ Smart Surveillance Switches are the first and only official ONVIF Conformant network switches currently available. They feature both PoE+ and standard RJ-45 ports, as well as SFP slots for long-distance fiber connectivity. The Smart Surveillance Switch Series also feature long-range PoE support that can reach up to 656 ft. (200m), double the current PoE standard distance. The front-facing LED display shows useful PoE power usage statistics. Managed switch features include IPv6, QoS, IGMP snooping, port bandwidth controls, and spanning tree support. Smart surveillance switch TRENDnet’s Gigabit PoE+ Smart Surveillance Switches are available online on the TRENDnet Store, or worldwide through select distribution and retail partners. TRENDnet originally planned to have working demos of the new Gigabit PoE+ Smart Surveillance Switch Series at their booth at ISC West; however, an alternative means to demo and review the switches and its interface are available on the respective product pages on the TRENDnet website. 12-Port Gigabit PoE+ Smart Surveillance Switch, TPE-3012LS 8 x Gigabit PoE+ ports 2 x Gigabit Ports 2 x SFP slots 110W PoE power budget Extend PoE+ signal up to 656 ft. (200m) at 10Mbps 24Gbps switching capacity 18-Port Gigabit PoE+ Smart Surveillance Switch, TPE-3018LS 16 x Gigabit PoE+ ports 2 x Shared Gigabit ports (RJ-45 or SFP) 220W PoE power budget Extend PoE+ signal up to 656 ft. (200m) at 10Mbps 36Gbps switching capacity
Security and surveillance applications require accurate, scalable, and cost-effective solutions. However, traditional security technologies pose many risks and challenges including frequent false alarms and high costs—both for system installation and ongoing maintenance. Because of the shortcomings of these technologies, many organizations have adopted 3D LiDAR-based security solutions to improve reliability, reduce false alarms, and streamline their operations. Integrated with cameras and video management systems (VMS), LiDAR enhances security by reducing false alarms, allowing for real time tracking of intruders, and enabling automated PTZ camera control for a more comprehensive security system. Choosing the right technology for security and surveillance The most critical element of any security solution is its ability to quickly, accurately, and reliably identify potential threats so that security personal can be promptly mobilised to respond to said threat. Advanced security capabilities and reduced incidence of false alarms are especially critical when protecting sensitive areas like critical infrastructure and other limited access locations However, many traditional security technologies often fail to deliver the low rate of false alarms necessary to reliably protect secure areas, at any time of the day or night and in any weather condition. For example, cameras can be blinded by bright lights and cannot operate in dark conditions. In addition, cameras and other sensing technologies area also affected by harsh environmental factors like high wind and heavy rain—both of which can lead to security failures. The risks posed by an ineffective security system are high The risks posed by an ineffective security system are high. False alarms are costly, wasting valuable time and resources to respond to nonexistent threats. In addition, security personnel may experience alarm fatigue due to frequent false alarms, which can lead to latency in their response to real threats. Because of the consequences of false alarms and other security failures, security solution providers are searching for technology alternatives which can enhance the accuracy of their current Perimeter Intrusion Detection (PID) system as well as interoperate with the existing VMS platform managing their security devices. How LiDAR works differently LiDAR, which stands for Light, Detection, and Ranging—is a time-of-flight sensing technology that pulses low-power, eye-safe lasers and measures the distance between the sensor and objects based on the light reflections off those objects. The resulting sensor data is used to generate a centimeter-level accurate 3D point cloud image, providing spatial location information to reliably detect and track moving targets, such as intruders. LiDAR sensors are operational in various weather conditions and perform reliably in both very bright and extremely dark conditions. The anatomy of a LiDAR-based security solution A LiDAR-based security solution starts with the LiDAR sensors, but it does not end there. In any security application, several LiDAR sensors will be mounted at various points throughout the area, gathering environmental data to provide a complete 360-degree view of the protected space. A 3D perception software platform using artificial intelligence algorithms will detect, track, and classify objects based on the rich point cloud data received from the LiDAR sensors. From there, the object information is routed in real-time to a VMS, which may also compile data from cameras (including CCTV, IP cameras, etc.). The LiDAR-based object information can be used to enable automated PTZ control based on the target’s position, keeping the target in view of security cameras at all times. This provides a complete and nuanced perspective of the area being surveilled. LiDAR technology can pinpoint the exact location of a threat on a map, enabling quick and effective responses when and where they are needed. The fully integrated solution also empowers security personnel with the tools and information they need to respond to threats confidently, thanks to an extremely low risk of false alarms. LiDAR enhances security, reduces false alarms, and enables timely, effective responses LiDAR-based systems are becoming increasingly popular choice for security and surveillance applications due to the technology’s accuracy, reliability, and cost-effective operation. Overall, LiDAR enhances security, reduces false alarms, and enables timely, effective responses to security threats compared to security cameras alone. 4 key advantages of LiDAR for security LiDAR provides many benefits over competing technologies, including high accuracy, real-time tracking and analysis, seamless integration with existing infrastructure, and simple system management. High accuracy and low rate of false alarms In security applications, false alarms are extremely costly. Whenever an alarm sounds, staff must be mobilised to quickly respond to the threat of an intruder. A security system with a high rate of false alarms not only requires more staff members to respond to these false alerts, but it can also require additional devices to enhance the system’s detection accuracy. In addition, frequent false alarms can desensitise operators, lowering their efficiency in responding to alerts. 3D LiDAR sensors can provide greater than 95 percent detection accuracy and 24/7 reliability in all lighting and atmospheric conditions. The accuracy and reliability of a LiDAR-based solution significantly reduces false alarms, ultimately saving time and costs. A lower rate of false alarms provides personnel with confidence in the reliability of the alerts, improving the quality and promptness of their responses. Real-time tracking and analysis With LiDAR, security data is available in real time. The solution automatically tracks individual people and provides real-time location information, enabling security personnel to quickly locate and respond to potential threats. Seamless integration with cameras and existing infrastructure LiDAR sensors can be integrated with PTZ cameras and Video Management Systems (VMS). The positional data from sensors can be used to automate PTZ camera control and accurately identify and track moving objects in areas of interest. PTZ control is programmable, and the location data is used to intelligently select which camera to follow the intrusion based on pre-programmed rules. Some LiDAR manufacturers provide Automatic ID handover™ technology, which works by assigning a unique identification to each object detection enabling the system to track any object across all sensors within an environment and providing tracking continuity regardless of the target’s location within the secured area. This ensures seamless tracking of an individual’s movement across the entire LiDAR coverage area. Finally, when paired with a VMS platform, all sensors and video footage can be managed under one platform with a single visualization pane. The ability to clearly visualise moving targets on dynamic maps allows security personnel to take corrective action quickly and effectively. Easy-to-manage, fully automated solution Some LiDAR-based surveillance solutions use machine learning and 3D perception algorithms to scan the sensor’s field of view, analyze point cloud data, and provide anonymised information on detected individuals. This enables a fully automated security solution that is easy to manage. Overall, LiDAR-based security and surveillance technology reduces the risk of false alarms and enables security personnel to accurately identify and respond to threats—all at a cost-effective price point.
The only constant theme for video technology is its constant evolution. Over the last 40 years, cameras have gone from limited view, constantly monitored rarities to being one of the most populous Internet of Things (IoT) devices with a global reach. Fixed cameras with limited fields of view have been augmented with panoramic cameras with 180- and 360-degree viewing capabilities at ultra-high resolutions in the 4K and 8K ranges, a far cry from the grainy, monochrome viewing of the past. Threats have also evolved in that time, leading to a necessary evolution in security posture, moving from a series of individual programs and practices, to a comprehensive strategy designed around complex risk assessments. To ensure the successful implementation of your security stance in today’s world, you need technology to integrate seamlessly and vendors to work together to deliver coherent solutions rather than individual components. Since successful partnerships are always a two-way street, it’s important to take a look at some of the factors that vendors should offer and expect to receive when entering a beneficial partnership where technology seamlessly folds into the ecosystem of the partner’s technology offerings. Open Technology Standards If you ask any customer what the biggest negative is when it comes to new and emerging technologies, you’ll get a pretty rapid answer of “vendor lock-in.” You can have the best technology in the world, but if you don’t give a customer the opportunity to build multiple, “best-of-breed” products into a comprehensive strategy, you’re going to fall by the wayside pretty quickly. You need technology to integrate seamlessly and vendors to work together That’s not to say that you can’t have unique, proprietary or visionary technology; you absolutely can, and it is what innovation and progress thrives on. Building those technologies around open technology standards is vital if you are looking for wide-scale adoption. Using open technology standards also allows you to integrate with established industry players faster, more smoothly and with increased benefits to the customer. All of this leads to a faster time to revenue and a more rapid scaling of your presence in the market. Direct Technology Integrations Continuing the theme of open technology standards improving the ability to drive relationships with existing, complimentary technology partners, the directness and depth of integration also bears consideration. Using open technology standards also allows you to integrate with established industry players faster, more smoothly and with increased benefits to the customer One of the blights of building a security practice is getting all of your technologies to integrate together and feed information to each other. When you add the fact that each technology has its own user interface (UI) and management console, it can very quickly become overwhelming for the end user to keep tabs on each console, learn every interface and complicates building a workflow in the case of incidents or investigations. The administrators who manage the system also have to update each component individually, ensure that the integrations don’t break when an update is delivered and ensure that any new technologies don’t cause an existing piece of your solution to fail. As a technology vendor, if you have used open technology standards, and written your software with integrations in mind, you will find yourself becoming an easy solution to turn to. Camera manufacturers in particular can take advantage of this when integrating with a video management system (VMS). The deeper you integrate, and the easier you make it to manage, update, monitor and interact with your cameras for the VMS and subsequently the operator using the VMS, the more likely your technology will be designed into solutions. Open Communication and Equal Joint Development Successful partnerships are all about communication, and in my experience, having organizational alignment throughout both companies does wonders to improve the development processes. Executive support in particular is key, and a mutual understanding between leaders makes for a more successful go to market strategy. Equally as important is joint development, especially for engineering teams. Often, software engineers are just thrown the software from the larger of the two partners and told “make sure we integrate with this.” It is then down to the engineering teams to figure out how the partner software works and figure out their integrations. This is less difficult if the partner is using open standards, but there is still a high degree of difficulty involved. It also takes longer to create, test, adjust and release software integrations in this way. Then you have to repeat the process whenever there is a software update on either side. Successful partnerships are all about communication If you work collaboratively as engineering teams with defined co-development plans and processes, this process is simplified, and a better solution is realised for the customer. Working as equals also allows you to drive technology advancement faster, especially for the longer established vendor. New technology companies are forced to innovate faster to stay alive and that is well worth remembering. Your mutual sales teams also have a large part to play here, since working together in front of customers with a connected message will deliver better feedback into the engineering teams for future developments and projects. If you build your technology partnerships on these foundations, then you are well positioned to deliver great solutions to your customers, real value when it comes to forming a major part of the wider security ecosystem and will be well on your way to becoming a mainstay in the physical security world.
News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powerful tools, it all depends on who uses it. Face recognition can, in fact, be used in an immoral or controversial manner. But, it can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence. Concerns of facial recognition With the increased facial recognition applications, people’s concerns over the technology continuously appear throughout news channels and social media. Some of the concerns include: Privacy: Alex Perry of Mashable sums up his and most other peoples’ privacy concerns with face recognition technology when he wrote, “The first and most obvious reason why people are unhappy about facial recognition is that it's unpleasant by nature. Increasing government surveillance has been a hot-button issue for many, many years, and tech like Amazon's Rekognition software is only making the dystopian future feel even more real”. Accuracy: People are worried about the possibilities of inaccurate face detection, which could result in wrongful identification or criminalization. Awareness: Face recognition software allows the user to upload a picture of anyone, regardless of whether that person knows of it. An article posted on The Conversation states, “There is a lack of detailed and specific information as to how facial recognition is actually used. This means that we are not given the opportunity to consent to the recording, analyzing and storing of our images in databases. By denying us the opportunity to consent, we are denied choice and control over the use of our own images” Debunking concerns The concerns with privacy, accuracy, and awareness are all legitimate and valid concerns. However, let us look at the facts and examine the reasons why face recognition, like any other technology, can be responsibly used: Privacy concerns: Unlike the fictional dystopian future where every action, even in one’s own home, is monitored by a centralized authority, the reality is that face recognition technology only helps the security guard monitoring public locations where security cameras are installed. There is fundamentally no difference between a human security guard at the door and an AI-based software in terms of recognizing people on watchlist and not recognizing those who are not. The only difference is that the AI-based face recognition software can do so at a higher speed and without fatigue. Face recognition software only recognizes faces that the user has put in the system, which is not every person on the planet, nor could it ever be. Accuracy concerns: It is true that first-generation face recognition systems have a large margin for error according to studies in 2014. However, as of 2020, the best face recognition systems are now around 99.8% accurate. New AI models are continuously being trained with larger, more relevant, more diverse and less biased datasets. The error margin found in face recognition software today is comparable to that of a person, and it will continue to decrease as we better understand the limitations, train increasingly better AI and deploy AI in more suitable settings. Awareness concerns: While not entirely comforting, the fact is that we are often being watched one way or another on a security camera. Informa showed that in 2014, 245 million cameras were active worldwide, this number jumped to 656 million in 2018 and is projected to nearly double in 2021. Security camera systems, like security guards, are local business and government’s precaution measures to minimize incidents such as shoplifting, car thefts, vandalism and violence. In other words, visitors to locations with security systems have tacitly agreed to the monitoring in exchange for using the service provided by those locations in safety, and visitors are indeed aware of the existence of security cameras. Face recognition software is only another layer of security, and anyone who is not a security threat is unlikely to be registered in the system without explicit consent. The benefits In August 2019, the NYPD used face recognition software to catch a rapist within 24 hours after the incident occurred. In April 2019, the Sichuan Provincial Public Security Department in China, found a 13-year-old girl using face recognition technology. The girl had gone missing in 2009, persuading many people that she would never be found again. Face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crimeIn the UK, the face recognition system helps Welsh police forces with the detection and prevention of crime. "For police it can help facilitate the identification process and it can reduce it to minutes and seconds," says Alexeis Garcia-Perez, a researcher on cybersecurity management at Coventry University. "They can identify someone in a short amount of time and in doing that they can minimize false arrests and other issues that the public will not see in a very positive way". In fact, nearly 60% Americans polled in 2019 accept the use of face recognition by law enforcement to enhance public safety. Forbes magazine states that “When people know they are being watched, they are less likely to commit crimes so the possibility of facial recognition technology being used could deter crime”. Saving time One thing that all AI functions have been proven to achieve better results than manual security is speed. NBC News writes, “Nearly instantaneously, the program gives a list of potential matches loaded with information that can help him confirm the identity of the people he’s stopped - and whether they have any outstanding warrants. Previously, he’d have to let the person go or bring them in to be fingerprinted”. Facial recognition can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence With AI, instead of spending hours or days to sift through terabytes of video data, the security staff can locate a suspect within seconds. This time-saving benefit is essential to the overall security of any institution, for, in most security threat situations, time is of the utmost importance. Another way in which the technology saves time is its ability to enable employees (but not visitors) to open doors to their office in real-time with no badge, alleviating the bottleneck of forgotten badge, keycode or password. Saving money A truly high-performance AI software helps save money in many ways. First, if the face recognition software works with your pre-existing camera system, there is no need to replace cameras, hence saving cost on infrastructure. Second, AI alleviates much of the required manual security monitoring 24/7, as the technology will detect people of interest and automatically and timely alert the authorities. Third, by enhancing access authentication, employees save time and can maximize productivity in more important processes. The takeaway AI-enabled face recognition technology has a lot of benefits if used correctly. Can it be abused? Yes, like all tools that mankind has made from antiquity. Should it be deployed? The evidence indicates that the many benefits of this complex feature outweigh the small chance for abuse of power. It is not only a step in the right direction for the security industry but also for the overall impact on daily lives. It helps to make the world a safer place.
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
A networked surveillance system has been installed at Petwood Hotel in Lincolnshire, the former home of members of 617 Squadron, more famously known as The Dambusters, during World War 2. The hotel, situated in the village of Woodhall Spa, was originally built in 1905, as a country house for a wealthy Baroness, and after serving as a military convalescence hospital during World War 1, was converted into a hotel in 1933. Located among magnificent lawns and landscaped gardens, the Grade II-listed hotel has 53 bedrooms, a Squadron Bar filled with World War II memorabilia, a restaurant and terrace bar, and function rooms. Dahua Smart PSS viewing platform The system at the Petwood Hotel comprises 12 HFW5431-ZE bullet cameras, four HDBW5431-ZE dome cameras, and 13 HDBW2421R-ZS mini dome cameras. Images are recorded and processed on to a central server, while viewing is managed by a Dahua Smart PSS viewing platform. Some 29 Dahua bullet, dome and mini-dome network cameras have been installed by Videcom Security around the hotel. Externally, cameras monitor the car parks, where previously there were incidents of damage to vehicles. With the new system, however, the source of any damage can be quickly located, so helping with guests’ insurance claims. Other cameras are positioned so that the hotel’s management has coverage of the entire perimeter. Perimeter protection Inside, cameras are located in public areas such as reception, the bar area and function rooms Inside, cameras are located in public areas such as reception, the bar area and function rooms. They are designed to help resolve payment discrepancies and to deter any unwarranted behavior. Images from the cameras go back to a secure room in the hotel’s separate office block, while staff at reception is able to view live images. “The Dahua system delivers all the benefits we were looking for,” said George Kane, General Manager at the Petwood Hotel. It is reliable, easy to use, and provides excellent quality recorded images, which can be accessed quickly and easily. The cameras are discreet and sensitively installed in and around the listed building. Video surveillance system The technology is great and Videcom Security have handled the project well and sensitively, considering the building is more than 100 years’ old and the hotel remained open throughout the period of installation. “The new surveillance system has been brilliant. The high image quality will enable us to resolve any liability issues in the car parks, while the system reassures guests and staff about internal and external security,” said Danny Harsley, Northern Engineering Manager at Videcom Security. Danny adds, “The Dahua equipment was ideal for this project and, as we have found on many other projects, was easy to install and commission. It’s also a great system to use.”
As a multi-faceted community with several buildings, public safety services, healthcare facilities, schools, childcare, barracks, a commissary and a visitor’s center, a typical U.S. Military base is a city in itself. Beyond the protection of armed forces personnel, the base is responsible for the safety of many civilians and civil servants. With such high standards and complex needs, U.S Military bases recognize the need for intelligent security systems that enable proactive monitoring, provide fast and smart forensics and comply with NDAA Section 889. Challenges faced by the US Military Base Inadequate situational awareness - The size and diversity of the military base pose a challenge. Past security measures led to gaps in coverage, leaving the base vulnerable to both internal and external threats. In addition, the COVID-19 pandemic created the need for increased situational awareness. Without a real-time and dynamic understanding of the environment, it became increasingly difficult to enforce preventative measures to control and mitigate the risk of transmission. Slow incident response time - Speed is critical. Within the confines of the military base, the consequences of slow incident response time can be devastating and even sometimes deadly. The longer it takes for the Security Operation Center (SOC) to gather, understand, and analyze the details of the incident, the greater the threat becomes. It became clear that responding to an Active Shooter, vehicle breach, or an assault, required immediate action that wasn’t available through their existing technology. Limited real-time analytic capabilities - The base wanted to prevent incidents from occurring rather than reacting after an incident has occurred. The traditional method of receiving an emergency call and responding after the fact was too costly. The US Base needed a platform that would provide the security team with automation notifications and alerts based on anomalies and rule-violations that were captured on video. NDAA-889 compliance - All military bases must meet the NDAA-889 compliance which states that the U.S. Government has banned specific telecommunications and video surveillance equipment utilising chips manufactured in China. Government contractors must help agencies remove/ replace banned equipment by Aug 12, 2021. Why Ava? One U.S. Military Base recently turned to Ava for an end-to-end intelligent security solution that would meet its full range of needs. Their requirements were a platform that was: Proactive - When there is a need to respond to a threat, the response needed to be immediate. Precise - On a base of this size, it was critical to pinpoint the exact location and nature of a security event in seconds - not hours or days. Simple - The system needed be straightforward to implement, manage and use within the existing infrastructure and cameras. Ease of use saves time and lives. Scalable - The system needed to be able to scale to thousands of cameras. Protecting military personnel and staff at the base Using Ava, operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights Ava understood that the ability to protect military personnel and civilians that run the US Military Base is of utmost importance with even seconds being critical. Ava’s wicked-fast and smart forensic searches and powerful analytics transform the manually intensive examination of massive surveillance footage into accurate and useful results within mere minutes. Security operators are using powerful appearance, event, or image search functions to narrow down and track people or objects of interest. Using Ava, security operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights. Each map can be configured and includes camera views, alarm views, as well as the ability to track people and objects as they move around the campus. Only Ava could meet their challenges by providing: Advanced Situational Awareness: Powered by Ava’s Smart Presence, the company’s use of AI and machine learning allows security personnel and operators to detect anything unusual at any time. Ava Aware VMS understands perimeters and behaviours, identifies, classifies, and tracks people of interest, vehicles, or other objects to send alerts before threats escalate. Operators now receive immediate alerts on unidentified loud noises including the exact source of the sound through microphones. The US Military Base’s security teams are now able to stop threatening actions, before there is damage to property or people. Rapid Incident Response: Powered by Ava’s Spotlight, video streams change dynamically to bring only the relevant feeds to the attention of the operator. Real-time alerts and notifications show up on the video wall to describe the incident, the time, and place it occurred. Using Ava’s Smart Search, the base is able to search by event and similarity to perform appearance and image detection powered by machine learning capabilities to comb through countless hours of video within seconds. Real-time Analytics: Ava provided the US Military Base with threat detection and notifications in real-time and uses intelligent algorithms and self-learning to detect abnormal behavior. The platform will alert the base’s security operators in real-time. It will intelligently highlight what’s relevant from all of the US Base’s cameras, in real-time, all the time. NDAA Compliant - Ava’s video hardware is TAA (Trade Agreement Act) Compliant, enabling any base to be fully NDAA 889 compliant. Ava’s solution provided operational efficiencies, such as: Seamless integration with existing cameras - Whether a military base is replacing all or some of their cameras, Ava Aware VMS easily integrates into and enhances existing cameras with the same AI capabilities. Now, existing ONVIF cameras are enhanced with analytics such as object detection, people and vehicle count, similarity based searching and more. By linking all existing cameras into a larger, AI-based video analytic platform, the base can leverage these powerful analytics across ‘all the cameras, all the time’. Access Control Integration - Ava’s solution easily integrates into access control, remote monitoring, and existing infrastructure. Monitoring the entire military base can be done as part of a single video management system. Scalable - The platform can easily be clustered to meet the growing needs of a base, from hundreds to thousands of cameras. Deployment simplicity - Ava’s system is designed for overall simplicity and readiness for deployment. With security cameras that were ready to go, fully loaded with out-of-the-box Ava Aware software, the base could easily replace cameras in a phased implementation, minimizing installation time and eliminating downtime. Ava’s simplified licensing/pricing model further simplified deployment. Plug and play configuration Plug and play configuration removes the need for user names and passwords The same simplicity extends to maintaining scalable management within a base’s group configuration policies. Plug and play configuration removes the need for user names and passwords, pre-configuration steps, and default settings. And finally, the base chose the Ava system for its general ease of use. Security operators now have access to detailed camera information, activity logs, and advanced video adjustments in a single, user-friendly screen view. Set up for success with intelligent video security The US Military Base is now set up for success with an end-to-end intelligent video security system that will scale with their needs. Highlights include: Camera installation, which will put the base into full compliance with NDAA-889. The US Military Base now has the highest level of security, to protect against the vulnerabilities of the connected world. The equipment has end-to-end encryption, factory-installed certificates, and records detailed audit trails of both operators and administrators to assist with any other compliance requirements. Security operators have gone from having ‘data overload’ to easily and quickly accessing ‘actionable insights’ to drive more confident and proactive security decisions. By leveraging powerful analytics, the base’s operators are able to respond in real-time and investigate incidents faster and with fewer resources. Operators are able to act on the system’s identification of objects, events, anomalies, and similarities that detect issues as they unfold. Furthermore, operators also have full occupancy insight to manage the flow of people and traffic across the base, in support of COVID-19 rules and regulations. Ava Smart Presence includes a people and vehicle counter to track objects in real-time, allowing for historical analysis and reporting. Configurable maps of all locations provide instant situational awareness and insights. The US Military Base seamlessly integrated the new system with existing access controls and non-banned cameras to cost-effectively meet the mandate and fully leverage analytics across the entire security system. Security teams at the base can trust in a powerful security solution that doesn’t inadvertently contain technology that poses a new threat. Whether enhancing existing cameras with advanced video analytics, replacing the entire video security system to meet the NDAA mandate, or creating a solution from scratch, the U.S. Military and supporting agencies can benefit from Ava’s secure cameras and leverage Ava’s powerful analytics for the highest levels of proactive security.
Security and surveillance systems have become a vital component of a casino management system enabling gaming club operators to monitor and manage security threats in real time. Apart from the original purpose of security measures, it helps raising concerns over card counting, advantage playing, and various other suspicious or prohibited activities. However, a typical casino atmosphere often involves great complexity in its environmental lighting, leading to high noise level in captured video images. Challenges: Inadequate lighting in casino making it difficult for cameras to distinguish colors and movement, resulting in blurry images. Lack of advanced video analytic functions in traditional surveillance systems presents difficulties to an effective monitoring process, with high labor cost needed for scanning live views and recorded footages manually. Access control system Different casino areas require different solutions to fulfill its demand. At gaming tables, it’s critical to capture the subtle movements of each players and dealers. Cameras with higher FPS, 3D DNR and super low lux image sensor gives a neater and brighter image under dim lighting, while 2-way audio provides additional audio information. Casino operations involve a multitude of monetary transactions in critical areas including cages, vaults and offices where cash, chips, and other valuables are circulated. An access control system integrated with facial recognition functions helps operators in strengthening the security level. Exceptional customer experience is the key to good customer loyalty. Facial recognition system Video analytics allows operators to filter videos recording smartly with object attributes With ANPR (Automated Number Plate Recognition) and facial recognition embedded into the management system of carparks and VIP lounges, customer entry and exit can be streamlined minimal interruptions. A modern video surveillance system complemented by top notch IP cameras can improve and simplify the entire operation. Modern video management software possesses features that are not offered by traditional systems. Video analytics such as human object detection allows operators to filter videos recording smartly with object attributes, e.g. colors of customer clothes. The architecture of modern video management provides scalability to accommodate the growing amount of video sources during business expansion. Standardized protocol offers higher interoperability in terms of 3rd party system integration with access control or alarm system. Cameras for centralized management Thanks to the internet, control center is now able to receive and group videos from dispersed cameras for a centralized management. The operators could access to the live views of different casino affiliates and receive real-time notification on cellphone devices when specific events are in action.
Interface Security Systems, a pioneering managed services provider that delivers managed network, business security and business intelligence solutions to distributed enterprises, recently provided Thrive Restaurant Group, one of Applebee’s largest franchisees in the US, with scalable network, communications and security services. Business security systems platform The new solutions include a next-generation secure SD-WAN architecture with network upgrades, 4G/LTE wireless capability, unified communications as service (UCaaS) with cloud-based VoIP and a secure and standardized business security systems platform. As a significant update to Thrive’s outdated legacy systems, the new Interface solution unclogs productivity bottlenecks and gives the flexibility the restaurant chain needs to address changing customer preferences. Managing multiple network and voice providers We needed a partner we could count on to manage our network, voice, and security for all locations" With 81 restaurants across the United States, Thrive found itself struggling with challenges common to many geographically distributed businesses, including managing multiple network and voice providers, dealing with outdated CCTV hardware, and a lack of accountability from vendors. “With 81 restaurants across ten states, we needed a partner we could count on to manage our network, voice, and security for all locations,” explains Brian Houchin, Director of IT for Thrive Restaurant Group. Troubleshooting technical issues When it came to managing vendors, Thrive simply had too many. Troubleshooting technical issues was challenging as it was difficult to pin accountability on a specific vendor. In addition, tracking invoices, service credits and administering multiple vendors was an inefficient and time-consuming exercise every month. Outdated hardware and changing regulations also posed a challenge. Unreliable CCTV equipment left the restaurants, employees and customers vulnerable to security risks on-premises. Constantly evolving Payment Card Industry (PCI) compliance rules meant Brian Houchin had to devote hours of his limited bandwidth to keep up with the latest changes and updates, so that Thrive could avoid major penalties and security threats. With the COVID-19 pandemic significantly disrupting Thrive’s business, restaurant staff found it challenging to handle sudden spikes in call volumes, as they had to work with a legacy phone system that was not scalable. The lack of 4G wireless coverage, outside of the restaurant premises made curbside pickup and take-out services impossible to manage. Secure, scalable network and communications Thrive turned to Interface to implement a secure, scalable network and communications backbone that would unclog the productivity bottlenecks and give the flexibility the restaurant chain needed to cater to changing customer needs. Interface implemented a next-generation secure SD-WAN architecture with network upgrades to guarantee seamless connectivity between all of Thrive’s locations. To deliver a better guest experience for customers calling in with their orders and enabling curbside pickup and payment, Interface rolled out a 4G/LTE wireless network that also doubled up as a backup when the primary network failed. UCaas with cloud-based VoIP implemented With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance. Interface also implemented unified communications as service (UCaaS) with cloud-based VoIP and auto-attendant features for Thrive’s locations to seamlessly route high volumes of customer calls to their dedicated order center. “We wanted to take the call-in experience out of the individual restaurants and put it into the hands of professionals who weren’t in a hurry to get off the phone,” explains Brian Houchin, adding “The VoIP service from Interface lets us take additional orders, dramatically improving our customer experience and increasing revenue.” Deploying secure video surveillance platform To solve the limitations of Thrive’s legacy CCTV infrastructure, Interface delivered a secure video surveillance platform with easy remote viewing from any location and simplified access management to boost restaurant security. Thrive’s partnership with Interface has allowed the restaurant group to focus more on their growth strategy and long-term plans. By consolidating their SD-WAN, UCaaS, CCTV and 4G/LTE services with Interface, Thrive gets real accountability without having to deal with the vendor run-around. Perhaps the greatest advantage is Thrive’s ability to aggressively expand, confident that Interface’s 24/7 managed services will always be ready to support their growth. “We’ve had a chance to test out multiple vendors for network, communications and business security and Interface definitely has provided us the best experience,” concludes Houchin.
The sailings may take as little as 22 minutes, but carrying almost 4.5 million holidaymakers and Islanders to and from the Isle of Wight every year is a huge challenge. It is perhaps not surprising therefore to discover that Wightlink has invested in the latest video security technology to help them do so safely and efficiently. The team at award-winning ferry operator Wightlink knows more than a thing or two about giving Islanders a frequent and punctual service to mainland Hampshire, as well as offering visitors an easy way to enjoy a taste of Island life. Providing ferry services Through its forerunners, Wightlink has been providing ferry services to and from the Isle of Wight for more than 160 years. As the cross-Solent ferry operator, Wightlink in a normal year would complete approximately 45,000 sailings over three routes with the help of a fleet of ships which includes six vehicle and passenger ferries and two passenger-only FastCats. Hanwha Techwin Europe’s Managing Director Bob (H.Y.) Hwang Ph.D., recently traveled to Portsmouth to see first-hand how Wisenet cameras are being used to assist Wightlink in almost every aspect of their day-to-day operations. Bob was accompanied by Jeff (Chae Won) Lee, the company’s Sales Director and Senior Strategic Sales Manager, Jon Hill. High definition images Wightlink’s crew are also making good use of the high definition images captured by the weather-proof cameras Over 260 Wisenet cameras have already been installed around Wightlink’s Portsmouth and Lymington facilities, as well as on three of the company’s ships. With safety of paramount importance, some of the cameras are being used to help verify any health & safety incidents which might occur in one of the terminals or onboard the ships. On the bridge, Wightlink’s crew are also making good use of the high definition images captured by the weather-proof cameras mounted at the bow and stern of the ships, which are assisting them with great precision to dock safely and efficiently. In addition, cameras supporting ANPR have also been deployed at various locations to ensure the smooth flow, identification and tracking of vehicles through every stage of their journey. IP network video surveillance The day was organized by Jim Kernahan, Managing Director of Trellisworks, a system integrator with extensive experience of designing, installing and maintaining IP network video surveillance, wireless and mobile network solutions. “The visit provided an excellent opportunity for Bob (H.Y.) Hwang and his colleagues to see how the Wisenet cameras were being put to good use,” said Jim. “However, our prime objective was to meet with members of the Wightlink team to explore how Trellisworks and Hanwha Techwin can continue to work in partnership to assist them in capitalizing on the latest advances in technology.” Hybrid energy ferry Stuart James, Wightlink’s Marketing and Innovation Director, who has the task of devising and driving the company’s strategy of continual improvement by wisely investing in new technologies and systems, provided a guided tour of the company’s Portsmouth harbor facilities and its newest and environmentally-friendly hybrid energy ferry, Victoria of Wight. We were able to generate a number of good ideas on how we can build on the success of the existing cameras" “I was pleased to host the visit and take the opportunity to express our appreciation and satisfaction with how well Trellisworks and Hanwha Techwin have been working together for our benefit,” said Stuart. “Most importantly, we were able to generate a number of good ideas on how we can build on the success of the existing cameras.” The discussions which followed on from the tour focused on how the latest technology might assist Wightlink to further enhance safety and security by supporting on shore staff and the ships’ crews, as well as ensuring every passenger has the best possible customer experience. Video security solutions Among the options considered were specialist video applications, such as passenger counting and queue management which can be run on-board Wisenet cameras and AI Deep Learning solutions. Commenting on the visit, Bob (H.Y.) Hwang said: “We are very grateful to Stuart for providing us with a great insight into Wightlink operational requirements and also to the company’s CEO, Keith Greenfield, who kindly took the time to greet us.” “We are understandably delighted that a prestigious and superbly well-run company such as Wightlink has placed its trust in Hanwha Techwin to provide effective and future proof video security solutions. We are looking forward to working ever more closely with Trellisworks, which is a member of our STEP partnership program, to ensure together we are always able to exceed Wightlink’s expectations.”
A national center of excellence for children and young people with mental health needs has been secured by a comprehensive security system from IDIS, the largest in country video surveillance manufacturer in South Korea. The £7 million refurbishment of Austen House, a 14-bed forensic hospital in Hampshire run by Southern Health NHS Foundation Trust, prioritized keeping both staff and patients safe from harm, given their specialized needs. Security systems integrator As the sole specialist National Health Service (NHS) unit of its kind in southern England, its refurbishment means vulnerable young people and their families no longer have to travel hundreds of miles to receive vital support. Video surveillance was key to allow incidents to be investigated and care practices to be monitored and improved. The solution had to cover all social and communal areas with no blind spots, be easy for non-specialist staff to use, and would have to comply with NHS cybersecurity requirements. Specialist security systems integrator ISD Tech selected IDIS technology as the best value and most robust solution, and one that would be the quickest and least disruptive to install. Outdated security setup The enhanced video coverage improves both standards of care and accountability Working with main contractor Kier Construction, ISD Tech and IDIS replaced an outdated security setup with an affordable cybersecure system which is easy to operate and maintain. It allows caregivers a complete overview of all internal and external communal areas at Austen House, including education facilities, music and sensory spaces, a gym and an art studio, as well as higher-risk isolation rooms. The enhanced video coverage improves both standards of care and accountability. It provides a complete record of events at the facility, making it easy for incidents to be investigated and video evidence to be provided, should it be required. Active tampering alarms Almost 100 IDIS 12MP Super Fisheye cameras, plus a mix of 5MP bullet and PTZ cameras, connected to 32-channel NVRs guarantee evidential-standard video coverage with a 360º view of all communal areas, a choice of 6 view modes and the ability to dewarp footage after the event. The 5MP bullet and PTZ cameras provide 24-hour coverage of the multi-use games area, gardens, car parks and perimeter. Built-in IR enables night-time image capture at distances of up to 30m, and the cameras enable intelligent functions such as active tampering alarms, motion detection, auto-tracking, and trip zones. All the IDIS cameras benefit from true DirectIP® plug-and-play set-up, which allowed the ISD Tech engineers to complete their work ahead of schedule. The ‘one-click’ set-up is faster and eliminates the cybersecurity risks associated with manual password entry. Local area networks IDIS Smart Failover protection ensures 24/7 continued recording, even during network instability or drop-out IDIS Smart Failover protection ensures 24/7 continued recording, even during network instability or drop-out. And, crucially, the Trust can link the new system to its local area networks without increasing the risk of hacking, thanks to IDIS’s use of proprietary software, which is inherently cybersecure. “Our upgraded IDIS video solution makes it easy for our clinical teams to review incidents quickly and work with external investigators whenever required,” said Tracey Edwards, Head of Security at Southern Health NHS Foundation Trust. “It’s not just an important tool for improving patient care, it allows us to maintain full public confidence and accountability.” Supporting clinical care Nicky Stokes, Managing Director of ISD Tech, commented: “We were impressed by the consultative approach of IDIS right from the initial design and planning, through installation to commissioning, and the ongoing support that they provide both to ISD Tech and the Trust. IDIS technology even helped speed up the installation so that we could deliver the project ahead of time.” IDIS Europe Sales Director Jamie Barnfield added: “This is the 4th major project that IDIS has completed for Southern Health NHS Foundation Trust, and it is part of one of the biggest refurbishments of its kind ever undertaken in the NHS. Not only is our video tech enhancing safety and security for patients and staff, it also supports clinical care and rehabilitation, which benefits the most vulnerable members of our community.”
Round table discussion
New software developments have dominated technology innovation in the physical security industry for years, making more things possible to the benefit of integrators and end users. However, hardware is another important piece of the puzzle. No matter how great your software, the system doesn’t perform unless the hardware works too. In our enthusiasm over software developments, let’s not overlook the latest in the hardware world. We asked this week’s Expert Panel Roundtable: How do hardware improvements drive better physical security?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Security cameras: Manufacturers & Suppliers
- Dahua Technology Security cameras
- Hikvision Security cameras
- Hanwha Techwin Security cameras
- LILIN Security cameras
- Visionhitech Security cameras
- Bosch Security cameras
- Arecont Vision Security cameras
- Pelco Security cameras
- Vicon Security cameras
- Messoa Security cameras
- eneo Security cameras
- Sony Security cameras
- Panasonic Security cameras
- FLIR Systems Security cameras
- VIVOTEK Security cameras
- Bolide Security cameras
- TruVision Security cameras
- Vanderbilt Security cameras
- Dedicated Micros Security cameras
- Honeywell Security Security cameras