Rhombus Systems, an enterprise video security startup, releases Unusual Behavior Detection (UBD) to quickly notify organizations when something is wrong. Last year, Rhombus Systems released their AI-Powered R1 security camera to provide organizations cloud-management, facial recognition, people analytics, and enterprise integrations at an affordable price point. Today’s existing video surveillance systems are reactive and used only after an incident has already occurred. Rhombus is changi...
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all o...
DW Complete Surveillance Solutions, the provider of digital recorders, surveillance cameras and related management software, announces the launch of our new 2U Blackjack X-Rack server. The DW-BJX2U is the latest addition to our Blackjack family, offering a high-end, high-capacity solution for enterprise scale applications. The Blackjack X-Rack comes with DW Spectrum IPVMS server installed for setup and configuration, and is recommended as a complete solution with one or more Blackjack NAS devic...
Motorola Solutions, Inc. announced it has acquired VaaS International Holdings, Inc. (VaaS), a data and image analytics company based in Livermore, California and Fort Worth, Texas. Motorola Solutions paid a purchase price of $445 million in a combination of cash and equity. VaaS, a ‘video analysis as a service’ company, is a global provider of data and image analytics for vehicle location. The company’s image capture and analysis platform, which includes fixed and mobile lice...
Milestone Systems, the number one global provider of open platform networked video management systems, has released Device Pack 10.1a for partners and customers using Milestone XProtect video solutions. The latest Device Pack offers new firmware support for partners Axis, FLIR Systems, Hanwha Techwin, Honeywell and MOBOTIX. New features include support for SRTP (Secure Real-time Transport Protocol), a feature that ensures that camera video streams are received via secure end-to-end encrypted tr...
Johnson Controls has introduced exacqVision Cloud Drive storage, an untethered way for customers to easily store, access and search critical surveillance video in the cloud. As a pioneer in video solutions, Exacq recognizes that many customers are turning to cloud solutions to provide an offsite copy of video that ensures protection against natural disasters, theft and other events while reducing capital expenses and increasing accessibility. Allocating Storage Across Multiple Cameras exacqVis...
FLIR Systems, Inc. announces three Neutrino midwave infrared (MWIR) camera cores: the small, lightweight FLIR Neutrino LC and two FLIR Neutrino Performance series cores, the SX12 and QX. The latest models expand the FLIR Neutrino cooled camera core family for commercial, industrial, and defense original equipment manufacturers (OEM) and system integrators. The Neutrino LC is FLIR’s first High Operating Temperature (HOT) MWIR camera core and the first model in the SWaP+C (Size, Weight, Power, and Cost) series. As the smallest, lightest weight, and lowest power consuming Neutrino model available, the LC can be integrated with smaller drones and allow drone operators to fly longer. Provide Crisp Imagery With HOT technology, Neutrino starts imaging two times faster than previous models, allowing optical gas imaging professionals to detect gases faster. Additionally, the Neutrino’s longer operational lifetime allows installation in security applications where maintenance access is restricted, difficult, or costly. The two new Neutrino Performance series products, the Neutrino SX12 and the Neutrino QX, offer the highest-resolution MWIR performance from FLIR The two new Neutrino Performance series products, the Neutrino SX12 and the Neutrino QX, offer the highest-resolution MWIR performance from FLIR. The Neutrino SX12 produces high-definition (HD) thermal imaging video, while Neutrino QX, with more than 3.1 megapixels, is FLIR’s highest resolution MWIR core. Both Neutrino Performance models provide crisp imagery at long distances while maintaining a wide field of view and are ideal for ground-based or airborne intelligence, surveillance, reconnaissance (ISR), and counter-drone solutions. Powerful Software Controls “The three new Neutrino cooled camera cores offer significant technological advances, from setting a new bar for size, weight, power, cost, and lifetime, to offering the highest resolution for a midwave thermal camera in its class,” said Jim Cannon, President and CEO of FLIR Systems. He further added, “With common industry-standard interfaces, simple and powerful software controls, and technical support, the new Neutrino products empower OEMs to reduce product development risk and shorten time to deployment. The expanded Neutrino line opens opportunities for FLIR to help customers solve challenges, increase efficiencies, and save lives.” The Neutrino SX12, QX, and LC are dual-use camera cores for commercial, industrial, and defense products and are classified under the U.S. Department of Commerce Export Administration Regulations as Export Control Classification Number 6A003.b.4.a.
Edesix, UK-based provider of Body Worn Cameras, announces a partnership with Environment Agency enforcement teams in the East Midlands following a successful six-month trial. The trial, which was commissioned after a growing number of abusive incidents during site inspections to waste sites, found that wearing Body Worn Cameras helped to reduce incidents of anti-social behavior, assaults and threats against Environment Agency staff. Abusive Behavior Footage captured on a bodycam in the North-East was recently used by the Environment Agency for the first time to convict an offender Enforcement officers throughout the East Midlands will now be equipped with Edesix VideoBadges on their visits. The cameras will also be used by fisheries enforcement officers during their routine activities. Footage captured on a bodycam in the North-East was recently used by the Environment Agency for the first time to convict an offender. The defendant pleaded ‘guilty' of wilfully obstructing the officers in the execution of their duty and using abusive behavior towards two officers when he knew they had video evidence. "The safety of our staff is paramount," explains Pete Haslock, Enforcement Team Leader for the Environment Agency in the East Midlands. Prevent Threatening Situations He further added, "They are well trained in dealing with hostile situations and we take any threat against them very seriously. Our preference is to prevent hostility in the first place and wearing the cameras can prevent threatening situations from escalating. We want to get on with our jobs without the threat of violence and the cameras will help to protect staff and bring obstructive individuals to justice.” Officers will switch on the cameras if and when they enter a hostile situation or where hostility may be anticipated" “Officers will switch on the cameras if and when they enter a hostile situation or where hostility may be anticipated. That could be a site where they have experienced aggressive behavior in the past or an unknown quantity, such as on a remote river bank." Richie McBride, managing director of Edesix, added: "This is another great example of a new market which can utilize Body Worn Cameras to improve security and functionality." Recent Success Edesix, which was recently acquired by US-based security specialists Vigilant Solutions, has enjoyed a great deal of success lately, ranging from winning some major contracts with the likes of UK prisons, Scotrail and South Australian Police, to being named in the Sunday Times Hiscox Tech Track 100 league table. Edesix currently supplies markets across the globe, through direct sales and international partners, to geographies including the UK, Europe, USA, Canada, the Middle East and Australasia.
At Intersec this year, on stand SA-J31, Veracity will be demonstrating and launching COLDSTORE Colossus, the 4U, 45-bay, 630TB video storage solution. COLDSTORE Colossus is engineered to meet the long-term retention needs of the Middle East. The COLDSTORE family offers unique benefits including a 10x increase in hard disk life and power savings of 90%+. In fact Colossus, with 630TB and 45 disks, consumes less than 80W of power! This gives the COLDSTORE range not only enviable performance benefits but also a compelling total cost of ownership case not available with other video storage solutions. COLDSTORE is in use throughout the world at critical infrastructure sites, major sporting venues, in retail, in custodial and policing environments and in city centre command and control operations. High Power Consumption COLDSTORE has patented technology designed specifically for sequential and continuous recording of video surveillance channels COLDSTORE has patented technology designed specifically for sequential and continuous recording of video surveillance channels. As a result, many of the operational issues with standard storage systems, such as long disk rebuild times, high power consumption, excess heat and reduced disk life, are eliminated. Also on display will be the COLDSTORE Pro 3U, 210TB unit that uses only 0.4W per Terabyte. Visitors will also hear about COLDSTORE embedded NVR functions and the ability to record from camera direct to COLDSTORE through ONVIF compatibility or using embedded COLDSTREAM code in open platform cameras, such as Axis and Hanwha. Over 100 channels can be supported, at 4Mbps per second, on all but the smallest COLDSTORE units. Critical Command Solutions Also on display at Intersec is VIEWSCAPE, the integrated and open command and control solution. VIEWSCAPE is a real success story in use in many city centre, retail, critical infrastructure and other sites. Anyone with an interest in C3, critical command solutions should get to know VIEWSCAPE. With over 100 integrations, this comprehensive command and control system can be seen on Veracity’s stand at SA-J31. As a market leader, the full range of multi-channel Ethernet over Coax, extreme distance Ethernet and other transmission products will be on show Veracity, of course, is most famous for its transmission solutions. In 2005 Veracity launched the world’s first Ethernet over coax solution. As a market leader, the full range of multi-channel Ethernet over Coax, extreme distance Ethernet and other transmission products will be on show. Experience Rapid Growth This includes LONGSPAN, which delivers IP video and POE (Power over Ethernet) over a distance of 820m on standard Ethernet cable! Veracity will also have its informative IP transmission workshop running on stand SA-J31. UK-based Veracity operates from its regional office in Jumeirah Lakes Towers, Dubai, and continues to experience rapid growth fueled by the development of strong relationships with many customers and partners across the Middle East. Veracity experts will be available throughout Intersec at stand SA-J31 from the 20th to 22nd of January 2019 at the Dubai World Trade Centre. Make sure you visit veracity’s stall.
Live Earth, an advanced data visualization platform for directing and monitoring complex business and security operations, has partnered with HERE, the Open Location Platform that provides advanced location intelligence, to improve operations and safety measures across indoor venues. Through this partnership, organizations will be able to integrate HERE Venue’s detailed floor plans with a variety of assets that include sensors, door access controls and security cameras. The ability to marry detailed maps and monitoring tools with the Live Earth platform will provide venues and building owners the ability to track resources throughout the premises with far greater accuracy than was previously available. Enhancing Safety Measures For organizations Live Earth and HERE Venue’s integrated system improves outdated surveillance and security systems by providing precise venue mapping“GIS technology has evolved and with the addition of HERE Venues, Live Earth’s platform capabilities now reach the indoors,” explained Craig Johnston, Live Earth’s VP of business development. “HERE Venue’s indoor mapping solution will add a critical layer to Live Earth’s visualization platform, improving safety measures and monitoring for organizations.” Traditionally, venues have relied on surveillance footage and timestamps to monitor facilities. Live Earth and HERE Venue’s integrated system improves outdated surveillance and security systems by providing precise venue mapping layered with data that can be monitored within the context of a larger building. If unauthorized access should arise, for example, security personnel can immediately pinpoint an exact location and map the quickest way to address the threat. The combined technology enables faster response times during critical situations when every second counts. Improving Building Efficiency The integration offers building managers and maintenance teams the opportunity to improve building efficiency“It’s one thing to drop a pin in a map and call it a security camera. It’s quite another to drop that pin, then have the ability to access the asset that pin represents, understand its data and understand the context of what’s going in and around that pin’s space,” Jim Leflar, manager, Venues Marketplace at HERE said. “This is where HERE and Live Earth’s collaboration offers a powerful use case to customers and building owners.” In addition to security and public safety, the integration offers building managers and maintenance teams the opportunity to improve building efficiency. Building managers can set up alerts to a host of data including asset maintenance, grounds keeping, vandalism, Direct Digital Controls and fire alarms. The combined insight provided by Live Earth and HERE has the potential to reduce overall maintenance costs as well as protect valuable investments in the property.
ISS – Intelligent Security Systems, a provider of intelligent VMS and analytics globally, has launched a newly designed website with a host of features designed to further support the company’s growing base of customers and expanding reseller network. Additionally, the new website reflects the company’s emphasis on the extreme intelligence provided by the company’s flagship SecurOS VMS and organic analytics, supported by refreshed branding and messaging, including the official debut of the company’s newly designed logo. Intelligent Physical Security Solutions “Our new website reflects ISS’ extensive software development experience in areas such as neural networks, pattern recognition and robotic control systems which provide the foundation for higher levels of integrated intelligent physical security solutions,” said Janet Fenner, Chief Marketing Officer, ISS. The SecurOS system design tool provides a comprehensive bill of materials and summary of selected devices and SecurOS solutions “In addition to an expanded set of features designed to better support existing and new customers and reseller partners, our new website reflects a refreshed brand positioning and messaging including a newly designed logo.” Powerful SecurOS System Design Tool In addition to being fully responsive to ensure a positive user experience across all platforms on any device, the URL change to www.issivs.com features ISS’ new theme, ‘Intelligent Video. Defined.’ to emphasize the advanced programming offered in the company’s portfolio of SecurOS VMS solutions and organically developed analytics. The new website also offers a host of user-intuitive features, including a powerful SecurOS system design tool that takes users through an easy step-by-step user-prompted process to configure cameras and other system devices with the desired functionality provided by an expanded portfolio of SecurOS solutions. Upon completion of the configuration process, the SecurOS system design tool provides a comprehensive bill of materials and summary of selected devices and SecurOS solutions.
Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the selection of Brian White as Regional Sales Manager for the Great Lakes Region. The company, a new business unit of Costar Technologies, Inc. (OTC Markets Group: CTSI), was launched on July 13th, 2018 and is expanding its sales and support across the Americas. “Brian brings nearly two decades of senior-level sales experience in security and cloud computing to our customers in the Great Lakes,” said Kyle Parker, Vice President, Americas Sales. “He is very familiar with the needs of security industry end users in the territory, and skilled in engaging and supporting sales partners to deliver complete solutions.” Worked With Prominent Security Companies Brian's previous security industry career included sales positions with Avigilon and TycoMr. White joins the Arecont Vision Costar team from his most recent posting at IDIS where he held a similar assignment. His previous security industry career included sales positions with Avigilon and Tyco, and earlier assignments in the IT and Telecommunications spaces. “Brian has demonstrated determination and innovation throughout his career in support of his customers,” stated John Bujarski, Senior Sales Director, Eastern US and Canada. “His diverse background in security and technology will help ensure his success in bringing the Total Video Solution and its components to customers in the Great Lakes region.” Total Video Solution The Total Video Solution is a comprehensive product offering introduced by the company in the first half of 2018. It includes the original MegaIP single-, dual-, and multi-sensor megapixel cameras that are used around the world by Arecont Vision Costar customers, as well as the new world-class ConteraIP single- and multi-sensor cameras, advanced ConteraVMS software, cloud-managed ConteraCMR video recorders, and ConteraWS web services. Customers can select a complete system, or integrate their choice of components with existing cameras, VMS or NVR systems Customers can select a complete system from Arecont Vision Costar, or integrate their choice of components with existing cameras, VMS or NVR systems, and infrastructure via ONVIF compliance. The Technology Partner Program and the MegaLab test facility has also been used by dozens of other industry leading vendors to go beyond ONVIF standards, ensuring the best possible integration with Arecont Vision products. “The new Arecont Vision Costar is a great opportunity for any security industry sales professional,” stated Mr. White. “I am already finding great interest among both existing and emerging customers in the company and our expanded product portfolio.” Based in the Columbus, Ohio area, Mr. White holds a BA from John Carroll University and a BS Finance from the University North Carolina-Charlotte.
The security marketplace is talking about a lot of different subjects. Our website’s Expert Panel Roundtable discussions in 2018 reflected some of the “hot topics” in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2018 was about privacy issues and GDPR’s impact on physical security systems. Other hot topics that made the Top-10 list of roundtable discussions included obstacles to adoption of mobile credentials, what’s new “on the edge,” and the value of physical security data. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2018, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2018 (including the quotable panelists named and linked below). 1. How do privacy issues and GDPR impact physical security systems? "GDPR specifically restricts the capture and use of EU residents’ personal data and is in direct conflict with the adoption of artificial intelligence (AI) platforms to track individual activities. The challenge for manufacturers will be to design solutions capable of capturing valuable information for security or business intelligence purposes while simultaneously anonymizing retained data.” - Peter Strom, March Networks 2. What are the security challenges of the hospitality market? "The primary challenge the hospitality industry faces is the fine balance between the delivery of exceptional customer service and maintaining a safe and secure environment. The industry sees a range of threats, including theft, terrorism and natural disasters, and more modern risks, such as those related to cybersecurity, liability and compliance." - Jumbi Edulbehram, Oncam 3. Where is it inappropriate to install video cameras? "The most obvious examples would be in bathrooms or bedrooms, but the more interesting cases are those that are not so obvious – such as religious institutions like a church or a mosque. An increase in the boldness of would-be thieves has led to a recent rise in surveillance outside of houses of worship." - Stuart Rawling, Pelco by Schneider Electric 4. What technology will impact security most in the rest of 2018? "The hottest trend we are currently seeing in 2018 is the continued adoption of intelligent devices and automation into the security framework. We have embraced a model where our software and hardware components continually get smarter and easier for security and IT teams to manage and deploy." - Stuart Tucker, AMAG Technology 5. What are the obstacles to adoption of mobile credentials for access control? "Mobile credentials have been slow to take off because legacy readers traditionally did not have Bluetooth or NFC capacity. However, upgrade kits will soon be available from some access control vendors, and customers will be able to easily upgrade their readers." - Derek Arcuri, Genetec 6. What’s new “on the edge” of security and video surveillance systems? "As more powerful in-camera chipsets are developed, edge devices are capable of even more powerful analytics that can inform operators in real-time of events requiring attention. Part of this significant evolution is from a form of artificial intelligence (AI) called deep learning." - Paul Kong, Hanwha Techwin America 7. Are integrators and end users overwhelmed by too many choices? "Being proactive in tracking new developments and networking with like-minded professionals are critical. Find out what your colleagues are using or testing, and get their feedback on what is working well, especially if their organization is similar to yours. Join local groups, attend industry conferences, and connect on social media to compare notes on emerging technologies." - Brandon Reich, Pivot3 8. What role does social media play in promoting security? "Social media can help us reduce false police dispatches by drawing in a personal circle of people that can validate an alarm, whether it be a neighbour looking out their window to see what’s going on, or a family member that knows your travel plans and is taking care of your house." - Wayne Jared, 3xLOGIC 9. How should your security company measure total cost of ownership (TCO)? “When looking at TCO you need to consider the obvious initial capital cost – compared to alternatives – and also the operational costs across the lifespan of the systems, across one, three and five years. On top of this, though, security can add additional value through integration.” - John Davies, TDSi 10. What is the value of physical security data? "While active protection is the primary job of a security system, the data generated by today’s networked solutions can provide a wealth of intelligence to help organisations optimize both their security strategies and their business operations.” - Mark Perkins, Boon Edam
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
It's no secret that one of the next market segments to see exceptional growth nationwide is somewhat non-traditional: cannabis. The global cannabis market is projected to reach $60 billion by 2024, according to Ameri Research, fueled by the increasing legalisation and decriminalisation across much of the United States. It is estimated that 22 million pounds of marijuana are grown each year in the United States, with 80 percent coming from California, Tennessee, Kentucky, Hawaii and Washington, according to Mother Jones. Unlike other products, this commodity is valuable from the moment the seeds go in the ground to the exchanging of money for end-user products - and at every point in between.Within large greenhouses, 360-degree cameras that show a wide field of view are essential for cannabis protection From seedlings to selling, securing every point within the supply chain is vital to the assets being distributed, and companies are now realising how lucrative this endeavor can be. Critical to the success of the industry is keeping the merchandise secure and the workers safe. In this article, we explore each part of the supply chain within the cannabis market and address ways of implementing robust security measures. Plants, Fields And Greenhouses This is one industry where money actually grows on trees! When cannabis crops are planted either in greenhouses or in fields, security becomes critical, since the plants themselves are worth a significant amount of money. A single truckload can be worth hundreds of thousands of dollars, so securing the load is crucial to the process Producers don't want plants stolen – especially high-end varieties that garner a bigger profit when harvested and sold – and the size of the plants make theft a greater possibility. Video surveillance becomes vital at this point and can be used in a variety of ways. Within large greenhouses, single cameras that can cover a wide expanse of space, such as cameras that offer 360-degree views, are essential and can provide more coverage with less investment overall than traditional narrow field-of-view cameras.Advanced technology, such as unmanned aerial vehicles (or drones), are also being used in open fields in an effort to protect these plants. Comprehensive video surveillance becomes the main tool for thwarting cannabis theft and addressing incidents as they arise Transportation And Protection Once the plants are mature enough to be harvested, they must be transported to a production facility where they are either dried or cured based on the needs of the grower, as well as processed and transformed into edible products to be sold at retail locations. There are already a range of companies that specialize in keeping these crop yields safe while they are transported: think Brinks armored transportation used for cash, but for cannabis. A single truckload can be worth hundreds of thousands of dollars – if not more – so securing the load is crucial to the process. Losing one of these loads can lead to large-scale losses for a producer. Surveillance equipment that can withstand sanitation standards and power-washing is paramount for effective protection After being transported, cannabis must be processed. In these environments, where strict handling processes are in place, surveillance equipment that can withstand sanitation standards and power-washing is paramount. This requires camera enclosures that are rated for resistance to high-pressure water jets, dust and vandalism/tampering. Since edible processing requires stringent regulations be followed, it becomes more critical for security managers to identify solutions that carry the NSF Mark, making them compliant with standards set forth for commercial food equipment in North America, or the HCV EU, the equivalent in Europe. Many of these locations handle and store large amounts of cash since customers have to pay with cash Retail Protection As the final products come out of processing and go into storefronts to be sold by retailers in States that have recreational or medical facilities, there's another level of security that must be in place to protect these transactions. But careful considerations must be made. Traditional security tags cannot generally be used because of the small size of many of the end products, making it more difficult to track with tracking devices. Traditional security tags cannot generally be used because of the small size of many of the end products In this instance, comprehensive video surveillance becomes the main tool for thwarting theft and addressing incidents as they arise. In these locations, a loss prevention or security officer has to be an integral part of the team. Another consideration is the careful screening of the potential employees. Since the federal government doesn't recognize cannabis producers and retailers, banks that are federally insured through the FDIC don't accept money from these establishments, meaning that many of these locations handle and store large amounts of cash since customers have to pay with cash. There must be security measures in place for these kinds of transactions, including the ability for video surveillance to be played back instantaneously in the event of an incident at a cash register. The cannabis market comes with a variety of challenges at each and every step of the operation, from growing to transport to production and sales. Video surveillance and business intelligence solutions are ideal for these applications, and as the market grows, more and more security companies will look to cater to the market.
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve.However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfill a gap in the industry event calendar and provide something new and fresh to a disillusioned audience. Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from?What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take on board all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham. We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split. Q: What conference programming is being planned to augment the trade show event? Norman: Content will be delivered across three focused theaters, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights. All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the program. We look forward to announcing those in coming weeks. Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC? Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational program for the visitors. Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website. The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer. Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor? Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far. We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward. The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?The Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc. We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event. Q: How would you expect/hope the show would continue to evolve in coming years? Norman: I hope over the next few years The Security Event cements itself as the industry’s favorite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defense force. Wireless Technology For Cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need For More Security In K-12 Schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging The Gap Between IT And Physical Security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT And Cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fueling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training Courses For Integrators And Partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instill added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new center in Barcelona (in addition to current R&D centers in Copenhagen and Sofia, Bulgaria). Making Camera Installation Easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the color of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras With Sound Detection Technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analyzing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralize systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine Learning Engine For Crime Prevention In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focused on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyze shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT Devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition Of IP Door Intercom Company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analog components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and Assa Abloy (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions And Consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasizing the impact of consolidationEmphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specializing in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New Avenues Of Growth" The early days of new ownership is opening fresh opportunities for both organizations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organization, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance SearchThe company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The Growth Of The Cannabis Market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalized in dozens of U.S. states, and Canada is on the verge of legalizing the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
A video surveillance system installed by Daemon Fire & Security, based on an AMG Systems-supplied Ethernet switch network, is helping to protect the UK’s first new inland rail freight hub for over a decade: iPort Rail. The iPort project near Doncaster, South Yorkshire, offers 6 million square feet of space across 337 acres. The massive park is already home to enormous distribution facilities for companies like Amazon, CEVA, Fellowes and Lidl, and its occupancy is set to expand in the coming years. The newly developed iPort Rail terminal, located on its own 30-acre site within iPort, is connected to the electrified East Coast Main Line via the South Yorkshire Joint Line. It offers integrated access to iPort, meaning occupiers can directly approach the rail terminal using their own specialist vehicles on the facility’s private roads. Implementing Video Surveillance System The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System"The terminal can handle up to six trains a day, operating 24-hours, six days a week. Each train can be the maximum UK length of 775m. iPort Rail has an 800m reception siding and two 400m handling sidings, with storage capacity for 1,500 shipping containers. With iPort Rail playing such a crucial role in developer Verdion’s iPort transportation strategy, there was a pressing need to ensure that the terminal has effective ongoing video monitoring. Buckingham Group Contracting Ltd was responsible for the work on iPort Rail, and they worked with CCTV specialist Daemon Fire & Security to implement the video surveillance system for the perimeter of the terminal. Chris Tattersall, Technical Director at Daemon, said the system runs on a redundant fiber optic network. “AMG Systems assisted us with the fiber optic network design.” Tattersall said. “The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System. The cameras are on towers from Altron, and the networking is from AMG.” Cameras For Intrusion Detection The cameras utilize Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through"There are 32 cameras mounted on 18 towers around the rail terminal site perimeter. Tattersall explained that the cameras are primarily used as detectors to monitor for trespass or intrusion. “The cameras utilize Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through,” he said. “The cameras are monitored live by the 24-hour security team in the site gatehouse. The system is networked using equipment and expertise from AMG Systems. Daemon and AMG designed a failsafe fiber optic ring system together,” Tattersall said. “From the gatehouse there’s a fiber optic cable which goes and loops around every camera tower and goes back to the gatehouse,” he said. “It’s a redundant ring, so if they get a fault or deliberate cut, everything will carry on working. We’re using industrial PoE Ethernet switches in the towers so they can withstand low temperatures, which is particularly important during cold winters in a relatively open site like this.” Operative In Extreme Temperatures The industrial managed switches are able to operate in temperatures ranging from -40 deg C to 75 deg CThe industrial managed switches, 20 of which were used in this project, are able to operate in temperatures ranging from -40 deg C to 75 deg C and are designed for medium to large network environments to strengthen network connections. AMG Business Development Director Sara Fisher said AMG was thrilled to be involved in this project. “We were delighted to be asked by Daemon to contribute our design and product expertise to help protect this important and growing freight hub,” she said. Daemon’s video surveillance project took around 10 weeks in total, including implementation and commissioning. It was handed over on time and installed on target. Tattersall said the smooth running of the project could be put down to Daemon’s good working relationship with contractor Buckingham, distributor Pro-Vision, networking and transmission expert AMG Systems, and product suppliers Bosch and Altron.
Amthal has created a scalable program of works to upgrade security at St Albans School and ensure staff and pupils can inspire learning and develop values and skills to the highest standards, in a secure environment. With former students including the renowned Professor Stephen Hawking, St Albans School, ‘the first school in Hertfordshire’ has a rich history as a celebrated independent boys’ school and co-educational Sixth Form. With an architectural mixture of buildings dating back from the Roman-era cellar, to modern extensions built in the 1990s, alongside a well-equipped field study center and sports facilities, the grounds-care team was keen to ensure security was kept up-to-date. Co-Curricular Facilities Amthal was able to present an all-encompassing solution right from the perimeter systems through to CCTV and internal access control" Gary Douglas, Estates Manager at St Albans School commented: “As a school catering for over 860 pupils, it is our priority to deliver a robust level of security for everyone who works and learns here. In addition, the historical significance of the School is something we are immensely proud of and we are committed to ensuring the buildings and facilities are cared for at every level.” “With a view to upgrading our security to enable smarter solutions, Amthal was able to present an all-encompassing solution right from the perimeter systems through to CCTV and internal access control. These enhancements were carefully planned into a program of works that is scaleable to work around learning timetables and the continued projects designed to further our excellent academic and co-curricular facilities.” Right Security Systems Amthal worked closely with the team at St Albans School right from the initial design process, acting in a project management capacity to ensure the right security systems were selected to suit the school. Not only did this require solutions that offered the smartest capability for the perimeter systems, where Avigilon CCTV was installed, but also working within school buildings and including Paxton Access Control that could be installed seamlessly, all without compromising on the historical ambience of the architecture throughout the site. Today, St Albans School is one of the leading day schools in the country, a centre of educational excellence" Paul Rosenthal, Sales Director at Amthal added: “There has been a school on the Abbey Gateway site for more than 1,000 years. Today, St Albans School is one of the leading day schools in the country, a centre of educational excellence, occupying a campus that has been transformed and continues to grow.” Expandable Solution “It is an absolute privilege as a local company to be on board to support the Estates Team to secure the School. We were very careful in our planning and design stages to structure a full team approach with leading suppliers, and present an expandable solution with the capacity to integrate with the requirements of this very impressive multi-dimensional educational institution.” Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire & security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.)
On his 2018 two-day visit to Ireland for the World Meeting of Families, Pope Francis’s scheduled activity was protected by high-performance Predator and Invictus cameras from UK CCTV design and manufacturing company, 360 Vision Technology. Specialists in a wide range of leading-edge CCTV, Access Control, PA, AV and radio communications, County Kildare-based Mongey Communications was chosen to provide the additional security surveillance protection measures necessary to secure the Pope’s visit to Dublin. With the massive crowds expected to see the pontiff, the temporary surveillance installation needed to be minimally disruptive and use mobile radio to provide the multi-scene coverage required during the two-day visit. Multi-Site CCTV Surveillance The camera images were to be used for co-ordination and management by multiple agencies To support an existing small-scale CCTV installation at the Pope’s final venue of Phoenix Park (the largest enclosed city park in Europe), there was a need for further camera coverage along the park’s approach routes, entrance/exit gates, search areas and general areas of crowd movement and congregation. A similar solution was also required for the Pope’s visit to the Knock Shrine pilgrimage site and the Capuchin Day Center, where public space CCTV was again already in place but of limited overall coverage. Full integration with the existing CCTV system at the 82,300 capacity Croke Park stadium for a papal address to the Festival of Families extravaganza was also required, with communications and CCTV feeds from all locations required to be transmitted back to local on-site control rooms at each location, and additionally to a central Command and Control room at Dublin Castle. At the main Command and Control Center, the camera images were to be used for co-ordination and management by multiple agencies, including the Office of Public works (OPW), Garda Síochána, Defense Forces Ireland, Dublin Fire Brigade, HSE / Ambulance Services and Civil Defense. High-Definition Video Security To Secure Phoenix Park “With 300,000 people expected to attend a papal mass at Phoenix Park to close the World Meeting of Families, we were briefed to provide the very best possible reliability and imaging performance from the additional cameras we employed,” explains Kevin McGrath of Mongey Communications. We needed to be confident of camera reliability straight out of the box, along with simple and fast set-up" He further added, “With this in mind, we needed to be confident of camera reliability straight out of the box, along with simple and fast set-up, and quality high-definition video for forward transmission to the various control rooms. Our very positive experience of employing 360 Vision Technology cameras on many high-security installations in the past led us to be confident about the image and build quality of the manufacturer’s cameras, and product support.” “So, to fulfill the challenges we faced for this high-profile project, we specified the latest version of 360 Vision’s Predator camera, and also their new cost-effective and ruggedized Invictus Hybrid HD PTZ camera.” 360 Vision Invictus Hybrid HD PTZ Camera The new 360 Vision Invictus cameras specified for the project employ the latest compact camera modules with a choice of 20:1 or 30:1 zoom and are available with 1/2.8” Sony StarVis or 1/1.9” Sony Exmor (Ultra) sensor packages. Bridging the divide between analog and IP technology, all Invictus cameras are equipped with Hybrid functionality enabling installation in existing analog systems and also in full 1080P HD IP video streaming networks. Alongside ONVIF 2.4 Profile S compatibility, this means the Invictus range is not only economical, but simple to install, providing Mongey Communications engineers with a reliable, flexible and high- performance solution with which to enhance the existing electronic surveillance measures for the Pope’s 2018 visit. HD IP Video Streaming Networks An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view Further enhancing camera reliability for this important event, the new Invictus camera range design draws cost-effectively on features usually associated with very high-end cameras, including construction from high grade, hardened aluminum and stainless steel, to ensure a rugged, durable and compact camera. An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view, plus the ability to tilt above the horizon – enabling operators to view targets above camera installation height (i.e. up hills) – an invaluable asset where cameras were being installed in the difficult installation and operational conditions of Phoenix Park. Technical Relationship With 360 Vision Technology “Our decision to once again entrust the provision of the best technology available for the project to 360 Vision Technology was proven correct, and we had no issues of consequence with the installation, commissioning and performance of all the cameras - straight out of the box,” explains Kevin. “Because of the condensed set-up period available and challenging terrain of some of the installation areas, we had to act fast to ensure the successful inclusion and full control of the cameras for the multi-agency command and control room,” adds Kevin. “Here our technical relationship with 360 Vision Technology really paid dividends throughout this time-critical project, affording easy integration of all the additional cameras into the control room’s Cathexis VMS. Cathexis VMS Images from the cameras were relayed back to the various event control centres In all, over 60 additional 360 Vision Technology cameras were employed over the various sites throughout the Pope’s visit. With extensive digging and cabling not a practical option, images from the cameras were relayed back to the various event control centers via a network of reliable and secure microwave transmission links, powered by temporary generators and back-up batteries. “The new Invictus cameras were perfect for the role thanks to their low power consumption compared to other similar specification PTZ cameras,” explains Kevin. “Low power consumption really helps when adding multiple cameras to a network with a temporary power system - and meant we could add more cameras for the benefit of maximum scene coverage.” High-Speed Fiber-Optic Connectivity High-speed fiber-optic connectivity between the various remote sites and Dublin Castle was installed, together with video walls at the various control rooms. “The Pope’s visit was a great success with no security issues reported,” says Kevin. “Images relayed to the control room from the additional 360 Vision Technology cameras were vital in the smooth running of the visit and allowed all of the state agencies involved to keep a constant update on the movements of the vast crowds drawn over the pontiff’s two-day visit.” “Our long-term technical partnership with 360 Vision Technology and our direct input in to the development of their new products really pays off with high-profile projects like this,” concludes Kevin. “We have many new and exciting installation challenges on the horizon and I’m confident that 360 Vision Technology camera products will continue to be an integral part of those future projects.”
With a century-long tradition for trade and commerce, the Hala Koszyki market hall was opened in 1908 on Koszykowa Street in Warsaw, Poland. Known as the ‘People’s Bazaar’, the Art Noveau-style building endured numerous social and political changes throughout its storied history. Between 2009 and 2016, Hala Koszyki was remodeled entirely according to a design by Polish star architects JEMS Architekci. Since its grand reopening in autumn 2016, Hala Koszyki has emerged as a major attraction for food connoisseurs in the Polish capital. The remodeled building retains some of the architectural layout of the historic original while offering international flavors in a variety of restaurants, bars, and food shops, plus several office spaces in a premium ambiance. Retail Solutions Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions Providing integrated security for Hala Koszyki called for a vendor that could solve three key challenges: First, the security system needed to blend in with the market’s stylish interior without attracting attention. Second, shop and restaurant personnel as well as office workers required specific access privileges to otherwise restricted areas. And third, building operators wanted a customisable system to meet the specific demands of Hala Koszyki’s shops, cafes, offices, parking spaces and other areas. Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions, also including the high-profile New Union Square shopping center and office tower in Downtown Warsaw. The experts equipped Hala Koszyki with video security, intrusion alarm, and access control systems. Intelligent Video Analytics The market hall’s video security system features moving and fixed IP-based cameras from Bosch throughout the premises. Integrated on the Bosch Video Management System (BVMS), the cameras are monitored by security staff in an on-site control room. For added security, cameras in critical areas feature Intelligent Video Analytics to recognize threats, unauthorized access, and suspicious behaviors automatically. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorized visitors, Bosch installed access control readers Aside from greatly reducing the manpower needed to monitor video screens, the system also offers forensic search functionality for evidence in a user-friendly interface. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorized visitors, Bosch installed access control readers. Answering a key requirement, the access control system also logs the entry and exit times of employees, while keeping track of the current number of employees in the building. Complete Security Solution Safeguarding the Hala Koszyki against intruders, the integrated security solution features Professional Series intrusion detectors equipped with PIR (passive infrared) sensors. Combining these detectors with the intrusion panel Modular Alarm Platform MAP 5000 ensures continued operation in events such as short circuits or interruption of the power supply in a scalable system that can grow with customer requirements. The complete security solution for Hala Koszyki is managed by the Building Integration System (BIS). Overall, the integrated Bosch solution achieves the feat of accommodating Hala Koszyki’s various security and access requirements ‘under one roof’ while blending into the architecture, so end consumers are free to enjoy their shopping and dining experience undisturbed.
TCA, the provider of security services for North Lanarkshire Council, has seen savings of around £50,000 a year, after installing 300 Panasonic CCTV cameras, waterproofed with a unique ClearSight coating. Located east of Glasgow, North Lanarkshire has challenging weather conditions for any technology, which has previously hindered the provision of cost-effective security in the area. High levels of rain resulted in water marks, dust spots and condensation, which meant heavy maintenance burdens and the potential for missing incidents. When considering an upgrade to the system, TCA needed to combat these issues with a security system that remained affordable in an era of local authority austerity. Implementing PTZ Cameras For Cost Reduction The ClearSight coating forms an invisible layer over the surface of the dome preventing water droplets from obscuring footageTCA secured the lower total cost of ownership they were seeking by implementing Panasonic PTZ cameras. The ClearSight coating forms an invisible layer over the surface of the dome preventing water droplets from obscuring footage, while also eliminating dirt and dust build-up on the dome cover. "On many models, when the rain stops, you tend to get a coating of dust on the dome, which the camera then focuses on," says Nikola Graham, Operations Manager. "We just haven't seen that with the Panasonic cameras. In fact, we have actually halved the number of maintenance visits, which we think probably equates to a £50,000 annual saving.” The initial installation took place over two years with the bulk of the cameras installed on 27 high rise blocks, identified as having problems with crime and antisocial behavior. Reduction In Criminal Incidents "The result has been impressive. The council has seen a reduction in the number of criminal and anti-social incidents within the residential blocks, the cameras have contributed greatly to this. The people living in the blocks feel safer as a result,” said Graeme Good, Business Manager at TCA. In total, 875 cameras are monitored round the clock, while a further 300 cameras are linked in and monitored out of hours if an alarm is triggered “A camera in the Motherwell area has on several occasions been used to catch vehicles that were used in some pretty serious crime. The quality of the footage and the evidence packs that we are giving the police is exactly what they are looking for.” Round The Clock Monitoring Utilizing tours and salvos, the control room in Coatbridge has eyes trained on 21 Full HD monitors. In total, 875 cameras are monitored round the clock, while a further 300 cameras are linked in and monitored out of hours, if an alarm is triggered. Various triggers, such as alarms within the lifts, will show as priorities for the operators. "It's great credit to our integration partners that some of the cameras we monitor are 16 years old," adds Graeme Good. "Every time we have a fault, we will appraise whether it's cost-effective to repair the unit. If not, we'll continue with the roll out of Panasonic, which have been virtually faultless thus far."
The first Starbucks coffee house opened in in Moscow in 2007 and in ten years the chain’s growing popularity across Russia has seen more than 100 outlets open. There are now several different store formats including classic coffee shops located in shopping centres; stand-alone stores characterized by open vaulted ceilings; smaller kiosk outlets; and drive-through outlets where customers can buy fragrant coffee and fresh-baked goods round the clock without leaving their cars. Following a survey of the latest solutions AVIX recommended IDIS technology as the best option for reliable, scalable video that could be remotely accessed via PCs and mobile devices. Maximum Design IDIS Solution Suite was identified as the best video management software option to integrate existing legacy equipment IDIS Solution Suite was identified as the best video management software option to integrate existing legacy equipment, the analog IDIS DirectCX range to leverage existing infrastructure as well as the latest IDIS IP solutions. The VMS also offered the most user-friendly and convenient for use not only for Starbucks security controllers but also by the senior operations managers In the classic coffee house outlets IDIS HD TVI DVRs have been installed handling either 8 IDIS cameras (TR-3108) or 16 cameras (TR-4116) depending on the site requirements. A mix of analog and IP camera technology is used across the Starbucks estate, giving maximum design and installation flexibility. New drive-through outlets are protected by a combination of external and internal cameras. Older Legacy Cameras In the shopping centre kiosk outlets an easy-install and compact full-HD flat dome camera (DC-F1211) has been deployed, while a compete view of the entire point of sale is covered by a vandalresistant IR camera, the DC-D2233WR, with both cameras linked to an H.265 4K recorder (DR-2304P). With thousands of customers visiting stores every day, and hundreds of staff to take care of, Starbucks’ management wanted a robust, flexible video surveillance solution that would operate effectively in every store location and in all store formats. AVIX, a Russian distributor was challenged with designing a system that would deliver optimum quality video regardless of the store format and make use of older legacy cameras in certain locations. The system also needed to be convenient to install while maintaining the aesthetics of each outlet with the ability to focus in on sales transactions in real-time. Maintaining Quality Standards This IDIS solution gives us excellent video quality the operational control we need to manage our continued expansion" The system was required not just to ensure high security standards but also to be used by Starbucks’ senior operations managers to control efficiency and underwrite customer service and performance as the number of stores continues to grow. Senior staff in the Starbucks operations department, and security managers, now use the video system day-to-day, verifying working hours, maintaining quality standards and controlling incidents. “This IDIS solution gives us excellent video quality the operational control we need to manage our continued expansion. The IDIS Solutions Suite VMS is comfortable and convenient for remote monitoring and it works perfectly by allowing our current mix of IP and analog cameras, including the latest IP IDIS models and equipment. The system is future scalable, and we will easily adapt it to changing needs.” Alim Sizov, General Manager ‘SVS Project’ – Starbucks Partner. Following the success of this first phase installation a comprehensive upgrade to IDIS video cameras is being implemented across the entire Starbucks estate.