The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each o...
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. A...
ADT Inc., a provider of monitored security and interactive home and business automation solutions in the United States and Canada, announces its intent to lead a new consumer privacy initiative with a coalition of organizations committed to driving the adoption of privacy standards and best practices across the home security industry. The initiative will focus on ensuring the security and home automation industry take a leadership role in protecting consumer privacy. Launched on Data Privacy Da...
When dealing with a substantial, complex security system installation – often covering multiple sites and many hundreds of people – you clearly need a security vendor with the resources and experience to deliver. Smaller security companies may not have adequate means to support the longevity of these projects. This generally isn’t an issue for larger companies, but beware - not all such companies are well placed to deal with large projects; that’s because not all of the...
Maxxess Systems continues to drive the virtualization of the physical security industry with the development and implementation of the industry’s most advanced enterprise level situational awareness and response coordination solutions. Enhancing Maxxess Systems’ momentum is the recent introduction of Maxxess InSite Awareness and Response Coordination System which meshes ‘system intelligence’ and ‘human intelligence’ to deliver an entirely new category of physi...
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organizations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anythi...
With more than 50 percent of U.S. households projected to use smart home technology by 2023, Interlogix, a provider of security and life safety solutions, is ready with an array of security platforms that support smart devices and links to top interactive service providers. Interlogix is a part of Carrier, a provider of innovative HVAC, refrigeration, fire, security and building automation technologies. “We’re uniquely positioned to meet the demands of the smart home segment that’s expected to nearly double over five years,” said Michael Chiavacci, general manager, Interlogix, North America. “Our flexible, integrated hardware platforms offer a variety of connected, smart devices that seamlessly integrate to proven service providers.” Enhance Lifestyle Convenience Interlogix has reinvested in its UL-listed, professional-grade, security panel lineup and added two touchscreen controls. In addition, it is providing access to more device integrations – such as sensors, lights, locks, thermostats and garage door controls, video doorbell cameras and voice-controlled digital devices, among others. Homeowners can design a smart home system to meet their needs today, with the peace-of-mind that they can easily expand functionality" All of these systems can be managed or monitored via a single smart home app. For example, new devices such as the Interlogix Command Button, enhance lifestyle convenience by wirelessly triggering up to three different, simultaneous automations within the home. “Our range of platform and service solutions make Interlogix a smart choice,” said Chiavacci. “Homeowners can design a smart home system to meet their needs today, with the peace-of-mind that they can easily expand functionality if their needs grow and change.” Encrypted Wireless Communication Interlogix solutions are professionally installed and configured through a nationwide network of security and smart home dealers to ensure each home has a customized solution that fits each homeowner’s needs. Many of these solutions will be displayed at the 2019 Consumer Electronics Show (CES). Booth visitors can preview a new line of door and window sensors, key fobs and pet-motion detectors that provide encrypted wireless communication between devices and select control panels. See many of the Interlogix solutions for home security and automation on display at the Pepcom Digital Experience, Jan. 7 in the Mirage Hotel and Jan. 8-11 in booth #40531 at the 2019 CES in Las Vegas.
Aiphone, the international manufacturer of intercom and security communication products, announces the next generation of video intercoms has arrived with the IX Series 2 Peer-to-Peer Video Intercoms. The new intercoms offer Session Initiation Protocol (SIP) compatibility, enhanced CCTV control, line supervision, backwards compatibility with the original IX Series and many more features and benefits to help create safer buildings with increased system flexibility. End users can create more efficient security operation centers (SOCs) using the IX Series 2 system as a single command point to control a variety of security layers. SIP Compatibility The IX Series 2 can page across multiple stations with general or emergency announcements and scan through video intercoms and CCTV cameras to monitor locations. There’s no break in security with the IX Series 2. New door, master and emergency stations can tie-in to a SIP IP PBX server to forward calls to an external phone number, such as an off-site call center. SIP compatibility allows the IX Series 2 master station to be used as a telephone, replacing VoIP phones and helping to clear desktop clutter. The IX Series 2 intercom system can more quickly and accurately assess situations with a new picture-in-picture feature The IX Series 2 intercom system can more quickly and accurately assess situations with a new picture-in-picture feature. Master stations can view images from an associated ONVIFÒ Profile S CCTV camera and close-up images from the 1.2-megapixel IX Series 2 camera. Emergency Situations With the optional CCTV camera arm on Aiphone emergency towers, users can quickly toggle between the CCTV camera image and the intercom’s eye-level video feed to better assess emergency situations. And there’s confidence the system is functioning as intended with line supervision and device check allowing for scheduled or manual health checks of all stations and their individual components. A clear visual alert indicates when a station is offline so staff can respond to the situation quickly. “The new IX Series 2 is designed for almost any budget yet packed with features our customers have told us they want and need,” said Dana Pruiett, Aiphone’s marketing manager. “The performance and flexibility of the IX Series 2 makes it ideal for virtually any video intercom installation.” Individual Communications Needs Other benefits of the IX Series 2 include: Zero annual licensing fees for intercom features. Users save money while avoiding repetitive, sometimes forgotten costs. No added server costs. As a peer-to-peer solution each IX Series 2 station acts as its own system — a PoE network drop is all that’s needed. That also means there’s less equipment to maintain and if one station goes down, the others are unaffected. Future-proofing an organization’s security investment. The Aiphone IX Series 2 stations are compatible with existing IX Series systems and will be compatible with future IX Series generations. Scalability. The IX Series 2 can start with a single door and master station then expand as needs change or a business grows. This flexibility ensures the system will continue to meet individual communications needs. Along with the arrival of the IX Series 2, Aiphone has become a Cisco Certified Partner, further showcasing its expertise in specific network architectures and solution areas.
The American National Standards Institute (ANSI) has appointed Susan Carioti, the vice president of certification, standards and guidelines at ASIS International, to a three-year term as a director-at-large on the ANSI board of directors. Standards And Conformance-Based Solutions As a director-at-large, Carioti will work with members of the board to determine and approve the policies and direction of ANSI’s strategic vision, and in close collaboration with stakeholders from industry and government, to identify and develop standards and conformance-based solutions to national, international and global priorities. “The role at ANSI is quite an honor and recognizes ASIS’s commitment and grit as both an accredited standards development organization and certification body,” said Carioti. “I look forward to continuing this important work and raising the bar with ASIS members and the security community.” ASIS National Standards Development Program Carioti joined ASIS more than a decade ago, and as an ANSI-accredited standards developer, established ASIS’s credible national standards development program. In addition to overseeing the ASIS standards program internationally by way of ISO security, risk and resilience activities, she provides strategic direction and management in advancing ASIS certification programs in conformance with ISO 17024 Personnel Certification accreditation requirements. An active participant in numerous ANSI groups for more than twenty years, Carioti currently serves on the ANSI appeals board and served many years on the ANSI executive standards council. “Sue’s experience and expertise are a valuable addition to the ANSI Board,” said Fran Schrotter, Sr. VP & COO, ANSI. “She has demonstrated tremendous commitment and drive for excellence in ANSI standards and conformity assessment activities. We more than welcome her ideas and contributions.”
Matrox Graphics Inc. is pleased to announce that the Matrox Mura IPX 4K DisplayPort capture and IP encode/decode cards are now shipping. These new dual DisplayPort 1.2 video wall cards feature 4Kp60 with full 4:4:4 color sampling support alongside a dedicated onboard network interface controller (NIC), offering the most advanced capture, encode, stream, record, and decode capabilities from a single card. The Mura IPX capture cards are ideal for OEMs and system integrators looking to build cutting-edge video wall controllers that deliver fast-moving video content and high-frequency desktop graphics and text to local and/or networked videos walls. Active Cooling Options Available in passive and active cooling options, the all-in-one Matrox Mura IPX cards feature two full-size DisplayPort 1.2 connectors for native capture of 4Kp60 physical sources, while the network connector enables the encoding and decoding of up to two 4Kp60, four 4Kp30, eight 1080p60, sixteen 1080p30, or exponentially more SD streams. System builders now have a building block to satisfy the increasing requirements of multi-4Kp60 content and can continue to mix and match System builders now have a building block to satisfy the increasing requirements of multi-4Kp60 content and can continue to mix and match from a wide selection of Matrox video wall cards to construct scalable, high-density, low-footprint video wall systems. Cost-Effective Integration “The new Mura IPX capture cards address two major pain points for the video wall industry,” says Fadhl Al-Bayaty, business development manager, Matrox Graphics Inc. “First, is the ability to capture and transfer multiple 4Kp60 channels over the bus without any color-quality degradation. Second, is the inclusion of IP technology directly on the board, a critical differentiator only available with Matrox capture cards.” “The ability to simultaneously stream, record, and decode while capturing physical signals from one board makes the new Mura IPX products the most powerful capture cards on the market. This industry-unique design translates into a smoother, more cost-effective integration process for OEMs and system builders looking to deploy high-density video walls.”
ISC East, in collaboration with premier sponsor, the Security Industry Association (SIA), reported strong growth results at the conclusion of this year’s industry event in New York City. The International Security Conference & Exposition is the Northeast’s largest security trade show, where close to 7,500 security and public safety professionals convened this month to meet experts from over 300 leading security brands, all the while co-locating with the launch of Unmanned Security Expo New York and Infosecurity North America, Europe’s global information security event. Welcoming 85 new companies and brands and close to 1,000 more industry professionals compared to 2017, the ISC East exhibit hall bustled and featured expanded in-depth content - including new technologies and product categories, more special events/networking opportunities, and a variety of all-new complimentary education through SIA Education@ISC and Unmanned Security Expo New York. Comprehensive Security for a Safer, Connected World The extensive variety of vendors and professionalism of the ISC staff make it one of the best shows out there" Mary Beth Shaughnessy, Event Director for ISC Security Events, noted, “It was exciting to see such a robust expo floor and high attendance growth with our New York event this year, all while matching up to our brand theme of Comprehensive Security for a Safer, Connected World. The top attended education sessions were formed around a diverse spectrum of topics including cyber-physical integration, converged security for smart cities buildings, the impact of IT and AI on video surveillance/intelligence, critical incidents prevention and mitigation, plus drones, drone-detection, drone-regulations and policies, and more. The present and future is bright for ISC East and we are committed to providing great solutions and education for this community.” Over the past 4 years, the ISC East Show Floor has grown by over 60% in square footage and has come to be known as ‘the highlight of the year,’ stated by Linda Esposito, Security Specialist of US Postal Inspection Service. “The extensive variety of vendors and professionalism of the ISC staff make it one of the best shows out there. In addition, Alex Pachikov of Sunflower Labs, a first-time exhibitor at Unmanned Security Expo, commented, “This was the perfect venue for us to introduce the Sunflower Labs drone-based security system. We had the perfect audience and fantastic exposure to potential customers, installation partners and system integrators.” Unmanned Security Expo Additionally, while Unmanned Security Expo presented 15+ sessions dedicated to the in-depth issues, policies and opportunities for UASs and UGVs, the SIA Education@ISC East program offered 25+ complimentary education courses and highlighted two distinct Keynote Speakers for the first time at ISC East - Philip Halpin, Senior Vice President & Head of Global Security for Brown Brothers Harriman, and James A. Gagliano, Retired FBI Supervisory Special Agent, CNN Law Enforcement Analyst, and Adjunct Assistant Professor at St. John’s University. SIA Education@ISC East 2018 SIA Education@ISC East 2018 was a great success, with hundreds of conference attendees participating in education sessions, engaging keynotes and hands-on workshops" “SIA Education@ISC East 2018 was a great success, with hundreds of conference attendees participating in our education sessions, engaging keynotes and hands-on workshops,” said Don Erickson, CEO of the Security Industry Association. “This year’s sessions highlighted cutting-edge topics like the move to smart cities, convergence in the security industry, the use of artificial intelligence in video analytics, and how some legacy connections leave modern access control data vulnerable to hacking.” With so much learning and knowledge-sharing happening on the show floor, security professionals still found time to participate and engage at the numerous special events that ISC East had to offer, including: the first-ever SIA Women in Security Forum Breakfast, the new Mission 500 Hygiene Kit Building, the ever-popular ASTORS Homeland Security Awards, ISC East’s Featured Product showcase featuring some of the most innovative product technologies, a high-profile celebrity appearance of former NY Yankees player Tino Martinez , the signature ISC East Grand Opening Ceremony, the Crack the Tap Cocktail Reception, and so much more. ISC Security Events As ISC East comes to a close, the ISC Security Events portfolio continues to provide comprehensive security for a safer, connected world through ISC West and Unmanned Security Expo, and Connected Security Expo taking place on April 9-12, 2019 (SIA Education@ISC: April 9-11 | Exhibit Hall: April 10-12) in Las Vegas.
Security-Net, Inc., a global provider of security system services, is celebrating its 25th Anniversary this year, a testament to the strength of the organization that today brings together the best independent security systems integrators to collaborate on enterprise-level projects, technology acumen and business practices. Security Systems Integrators Group Since its founding in 1993, Security-Net has been recognized as the top group of security systems integrators within the industry Since its founding in 1993, Security-Net has been recognized as the top group of security systems integrators within the industry. Its members are regularly included in the SDM 100 Top Systems Integrators list, an annual listing of the top security systems integrators in North America, and the Security Systems News 20 Under 40, an annual award that recognizes the top up and coming security systems integrators. “The idea for Security-Net originated during a manufacturer’s award trip when several security systems integrators expressed a desire to discuss common problems and business best practices with industry peers,” said Bill Savage, President of Security Control Systems of Houston and one of the four original founders of Security-Net. “A year later we had an organization formed.” Security-Net Project Management Platform Over the past 25 years, Security-Net has evolved into an organization that now collaborates on national projects, helps its members stay up to date on the latest technology issues and trends, and provides sales and project management training to its members. The group has also launched its own project management platform. “We’re proud of how Security-Net has grown dynamically over the years,” said J. Matthew Ladd, a member of the Security-Net Board of Directors. “Within the past 10 years we’ve added numerous sub-committees, including Tech-Net, Ops-Net and Sales-Net, and provided member companies with access to programs to strengthen their sales and project management skills.” Global Security Services Today, Security-Net members regularly collaborate with other member companies on projects that expand beyond their geographic areas of business, providing customers with global security services through its network of security systems integrators. Security-Net’s membership based currently includes 21 members a combined 50 offices in North American, Brazil, the Dominican Republic, the United Kingdom and Europe.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban On Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes A Splash With Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact Of Data-Driven Smart Cities On Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing The Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends For 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How To Prevent ATM Jackpotting With Physical And Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need To Look Beyond Technology For Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organization. 10. The Evolution Of Facial Recognition From Body-Cams To Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
As the world continues to become more connected, it’s becoming increasingly important to adjust security and safety procedures in the workplace. But today’s ever-evolving office environment can present unique safety and preparedness challenges. No two businesses are exactly alike, with some located in numerous buildings or spread out across campuses, while others have employees that frequently journey from different locations, work remotely or travel internationally. With this shifting environment, Rave Mobile Safety’s recent Workplace Safety and Preparedness survey asked over 500 full-time employees in various industries across the United States about their views on safety at work and emergency preparedness. Preferred Safety Measures Only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situationsThe survey looked at how employees and companies respond to various workplace emergencies: workplace violence, active shooter, medical emergency, fire, hazmat incidents, weather events and cyberattacks/system outages. Respondents provided insight on the current state of safety in their workplace, as well as how they want to be contacted when an emergency occurs. Though opinions on the preferred safety measures differed between generations and also between on-site and offsite workers, one fact remains consistent: there is much to be done to instill a better sense of safety in the workplace. While the findings show that employees feel safe in their workplace, only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situations. Quick Thinking Of the plans currently in place, excluding fire, 57 percent of the other major emergency plans were rarely or never tested. With so few drills in place, employees are left not knowing the best ways to respond to emergencies like weather events or hazmat incidents or if their employer recommends a certain response to situations like medical emergencies. Testing these plans is essential so that all employees, whether they are new to the company or not Even if plans are in place to begin with, not ensuring your employees understand and are comfortable with how to react to certain situations, can put the organization in harm’s way. Testing these plans is essential so that all employees, whether they are new to the company or not, have the appropriate response top of mind and their actions become second nature during a situation that will likely require quick thinking. Workplace Violence Instilling regular practices will only further ensure that responses will happen seamlessly, regardless of the emergency. Beyond the general awareness of drills and practices, most surprising in the responses was the fact that 34 percent of female respondents were unaware of workplace violence emergency plans. This is particularly shocking because workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labor Statistics. This shows an obvious lack of preparedness from organizations. It’s immensely important that employees to understand the relevant dangers of the workplace, especially when alternative could have a fatal result. The differences between baby boomers and millennials in the workplace is a common barometer showing how the workplace is continuing to change. Emergency Plans Workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labour StatisticsWhat may have worked for previous generations must be reworked and adjusted so every generation is made aware of and understands the plans and procedures in place. These changes can help make workplace safety plans fresh and continuously relevant. With that in mind, millennials currently represent the largest segment of employees unaware of emergency plans for major workplace emergencies. 38 percent of this age group are unaware of existing emergency plans, compared to just a 28 percent average of employees over the age of 35. This could be associated with the fact that some organizations are not communicating plans with newer employees or even that organizations that employ a significant number of millennials might not have plans in place at all. Affecting Everyday Work If the newest generation is unaware of these plans, then it is only a matter of time before Generation Z enters the workforce and is in even worse position when it comes to emergency awareness. The survey results showed that on average, workplaces use two methods of communication for emergencies Feeling safe and secure at work should not be something that workers need to focus on, however more than a quarter of respondents that work remotely said that worrying about safety is exactly what is affecting their everyday work. With that in mind, it’s even more concerning to see that there seems to be a clear divide between current methods and preferred methods of communication during an emergency. The survey results showed that on average, workplaces use two methods of communication for emergencies, with the top two being intercom system announcement/building alarm (27 percent) and email (22 percent). Mass Text Messages At first, these methods seem to cover both remote and in-office employees, but survey results actually showed that both groups preferred and would be better reached during other methods. While email is the second most common emergency method currently in place by organizations, it actually ranks as the fourth most preferred method at a mere 11 percent. Even with a clear preference towards communication via mass text messages by respondents (39 percent of remote workers prefer this method), less than 20 percent of companies actually take advantage of this technology. This clear disconnect shows that organizations must find what works best for their employees instead of using methods that were previously established or that are just currently being used. Preparedness Plans What remains important for organizations, regardless of size or industry, is to keep emergency preparedness plans ever evolving Communication can not only be essential to alert employees to everyday situations, like office closures, but it is also imperative in preventing emergencies to escalate when they do occur. Although this survey discusses the current state of safety in the workplace, it’s that the disconnect between employee perceptions and employer polices that’s the most concerning. Companies need to take steps to understand how their employees would like to be reached during an emergency, as well as how employees would also like to reach out to management to report their own concerns. What remains important for organizations, regardless of size or industry, is to keep emergency preparedness plans ever evolving and well communicated, so your employees are confident in the emergency plans in place. By proactively planning and practicing for emergency events through table top exercises and drills, employers can demonstrate their commitment to employee safety and preparedness and build employee confidence.
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-Device Artificial Intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent Automotive Solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualization. Based on 10nm ultra-low power processing technology, the CV25 chip is optimized for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual Security Guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-Integrated Devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber Security Standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorized access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT Device Security Management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyzes data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyze more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified Vendor Agnostic Software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing Connected Devices From Cyber Threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
CNL Software, a provider of Physical Security Information Management (PSIM) software, is pleased to announce that its award-winning PSIM technology was used to support a multiagency security program for Super Bowl LIII. The company’s IPSecurityCenter PSIM solution is installed in the Atlanta Police Department’s Video Integration Center (VIC) and helps secure the city and surrounding metro area, keep the metro area’s transportation networks and systems safe, and to help law enforcement personnel make sense of the huge volume of video intelligence that is generated day-to-day and during large-scale events like Super Bowl. Provide Law Enforcement Atlanta is no stranger to hosting large-scale events, which includes a previous Super Bowl, and has invested in a multitude of surveillance, analytic, data fusion, and communications systems and technologies in recent years. The City has also established an innovative public-private partnership, known as Operation Shield, that effectively leverages the surveillance assets and infrastructure of other participating Atlanta metro area departments and agencies, including the City’s Metro Atlanta Rail and Transit Authority (MARTA) and Hartsfield Jackson International Airport, and the City’s business community, while also bridging communication gaps between and across them. IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement and other public safety professionals with the data and video intelligence they need to effectively respond to incidents before they arrive on scene. Crowd Size Monitoring “Estimates are that nearly one million people traveled to Atlanta for Super Bowl Week. As with all major events, ensuring public safety and security is a big job and huge concern,” comments Mike Mostow, General Manager – Americas at CNL Software. “IPSecurityCenter was installed in the VIC by the Atlanta Police Department to provide the real-time situational awareness and decision support they need to ensure public safety and security during large-scale special security events like Super Bowl LIII.” IPSecurityCenter PSIM is installed in some of the largest public safety and security programs in some of the world’s largest cities. The platform enables the most intelligent integration of the widest range of disparate public safety, security, emergency management, and homeland defense system and sensor technologies, including video and video analytics, facial recognition, license plate recognition, crowd size monitoring, gunshot detection, chemical, biological, radiological/nuclear and explosives detection, geospatial mapping, and asset tracking.
The Polizei Bayern successfully opened its first operations centre in mid-September at its Police Headquarters in Central Franconia in Nuremberg. At the heart of the communication system was the Frequentis 3020 LifeX platform including digital radio connections and the newly developed AudioHub. The headquarters in Nuremberg is the second largest operations centre in the German state of Bavaria. It comprises 21 operator working positions that receive and process between 800 and 1,200 police calls per day. In the event of an emergency, an additional 13 operator working positions can be activated. Dispatch Calls Successfully Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours. The system proved its stability and operators were able to dispatch calls successfully without issue. "The professionalism of Frequentis during the preparation, implementation and follow-up commissioning of the system gave us confidence in their abilities. All of the aspects important to us as customers were immediately considered and processed by the Frequentis team. Above all, the usability of the system was well received by the operators.", said Anton Beierweck, Head of State-wide IT Procedures at the Police Headquarters Upper Bavaria South. Provides Highest Protection LifeX was first deployed for Bavarian Police Force in 2015, ahead of the G7 summit. The system was adapted to the needs of the event which required 18,000 emergency services personal to protect government leaders and control demonstrations. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020 "What has been clear from the start of the project is the willingness of the Polizei Bayern to innovate. We are very proud to have met their high requirements in terms of technology and services and appreciate the professional cooperation with the organization who provides the highest protection and security in Bavaria.", Robert Nitsch, Frequentis Vice President Public Safety. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020. Two more operational centres are planned to be brought on line before the end of 2018.
From 2019, Airbus will embark on the modernization of the PMR (Professional Mobile Radio) network of the Berliner Verkehrsbetriebe (BVG) public transport company. By 2020, the PMR provider will have overhauled the network infrastructure and converted the system to Internet protocol (IP). Airbus has also concluded a service agreement with the BVG until 2025. Airbus will provide the Berlin-based company with advice and support over the course of the modernization process. The entire contractual package also comprises, alongside the technical retrofitting, the supply of the latest technology, such as an IP-based switch and an in-service maintenance and service provision. Communicate More Securely The partners have also agreed to the possibility of progressively expanding the network with other base stations and to run these using the simulcast technology. Simulcast, also called Single Frequency Network, allows all base stations to transmit on the same frequency. This means that signals can be propagated very well over large areas. With the upgraded Tetrapol network, drivers and the control centre will be able to react more efficiently to all kinds of situations Since the network was rolled out in 2001, Airbus has partnered with BVG and, with its modern radio technology, it will make a further important contribution to the efficient running of Berlin's bus traffic. With the upgraded Tetrapol network, drivers and the control centre will be able to react more efficiently to all kinds of situations and to communicate more securely. Safe Transport System The modernization also implies an increase in the system’s capacity so that it can transmit even greater volumes of data. For approximately 2,100 radio users at the BVG, the Tetrapol network was made even more robust and user-friendly. A total of around 14,600 people work for the BVG and its subsidiaries to provide an environmentally friendly, reliable and safe transport system for more than a billion travellers each year. To coordinate the complex bus traffic in Berlin, the company built the Airbus Tetrapol network around nine base stations. Buses run on more than 150 lines over a catchment area of approximately 1000 km². The BVG also operates night buses on more than 60 lines, along with 22 tramway lines.
Maxxess, the innovative security management and communications solutions, partnered with the Santa Ana Unified School District (SAUSD) to deploy a powerful new security and operations solution that leverages the power of smart mobile devices to maintain comprehensive communications and emergency management operations. Maxxess Ambit, which provides private, two-way, managed messaging and intel on a more personal and intuitive level, received its first wide-scale test during the SAUSD’s annual earthquake preparedness drill called the Great Southern California ShakeOut. SAUSD used Maxxess Ambit as their primary communications solution during the Great Southern California ShakeOut drill “The 2018 Great Shakeout drill was more realistic than in years past,” said Camille Boden, Executive Director or Risk Management for the Santa Ana Unified School District. She further added, “With Maxxess Ambit, our Emergency Operation Center (EOC) was able to receive simulated eyewitness accounts and requests for assistance from multiple staff members at schools across the District. The information with GPS locations provided by Maxxess Ambit came into the EOC rapidly, providing first responders with the specific details they would need if we really had experienced a disaster. The drill tempo was accelerated and provided real-world insight as to what the District could possibly experience in the event of a massive earthquake.” Maxxess Ambit’s “see it, say it” SAUSD used Maxxess Ambit as their primary communications solution during the Great Southern California ShakeOut drill. Maxxess Ambit’s “see it, say it” application kept SAUSD’s EOC fully informed of missing people, dangerous situations, property damage and more during the emergency simulation. This allowed the EOC’s staff to instantly generate various reports and assign the appropriate personnel to respond. One report that came in during the drill was from a school needing to be evacuated, which was immediately assigned to SAUSD’s logistics personnel. Logistics then called the school transportation service and directed them to the correct pick-up spots. The EOC at SAUSD not only took action on reports that came in but was able to anticipate issues resulting from the information collected with Maxxess Ambit. All EOC’s actions were captured for reporting and future audits within Maxxess Ambit. Mass Notification During an earthquake scenario, Maxxess Ambit can broadcast a mass notification that will be sent to all users of the organization During an earthquake scenario, Maxxess Ambit can broadcast a mass notification that will be sent to all users of the organization, by site, by department or even by selected user groups. This allows emergency personnel to quickly monitor staff status, communicate with staff members using an organized interface, and help first responders act efficiently. As end users respond to the mass alert broadcast, a geo-tag is placed on a map to correspond with each mobile user’s location. Unlike systems that handle only one aspect of communications like a mass texting tool, Maxxess Ambit also addresses longstanding security challenges by transforming the way organizations operate on a daily basis. In a school environment, for example, a staff member can activate a duress report via Maxxess Ambit in the event a meeting is becoming emotional or tense. Real-time Chat Session The report would appear on the mobile devices of the school’s security team, enabling a real-time chat session while continuously tracking the staff member’s location. This unique combination of features empowers total awareness by making administrators, teachers, staff and students an integral part of the security solution. Maxxess Ambit is a cloud-based solution that does not require a capital investment in any hardware or servers and is deployed like a mobile app with all information logged into the system for compliance and audit purposes.
With a mission to provide and maintain good quality homes for Blackpool Council’s tenants and leaseholders, BCH has won a number of awards and accreditations for housing, repairs, customer services and community projects. The safety and security of residents is a high priority for BCH, which is why it has used products from STANLEY Products & Solutions for many years. During this time the primary system was made up of a GDX5 door entry system, along with an Indigo 1000 access control system, which were fully integrated. “We have a policy of continual improvement in the service we provide,” explains Anthony Walker, Mechanical & Electrical Officer at BCH. “Although the previous configuration performed well, I was convinced that the business and operational benefits of remote monitoring and the cloud could be utilised by upgrading the Indigo 1000 with a PAC 512 access control system.” Innovative Remote Monitoring Platform The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each doorAn upgraded system was specified for a BCH site comprising 80 blocks. It utilizes the existing GDX5 front panels, which have been integrated with the PAC 512 controllers to create a highly innovative remote monitoring platform that can be accessed via a PC, tablet or smartphone. This is achieved using a general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network. It provides an enhanced service over traditional mobile/landline telephone connections and makes administration of the system more flexible. The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each door. Each door also has a programmable auxiliary input that may be used for alarm system integration, and an auxiliary output that enables a buzzer or strobe to activate when security is breached or a door is left open. Email Alerts During Equipment Failure In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restored, while the system features an auto-dial or email alert program that, in the event of an equipment failure at one of the locations, sends a notification so that the issue can be quickly rectified. In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restored Explaining the benefits of using PAC 512, Andrew Burton, area sales manager at STANLEY Products & Solutions, says, “The cloud revolution has had a dramatic effect on the physical security equipment industry. Its development into access control technology means that not only can a system be managed remotely, specific personnel can even be granted or denied access to certain areas at different times, making it not only good for security but also for health and safety. “Furthermore, in the event of a theft or antisocial behavior, it is possible to pinpoint exactly who was where and initiate appropriate action, using the live events and reporting.” Remote Diagnostics And Servicing BCH can also access information via the PAC Residential Cloud – helping to further enhance its remote monitoring operation. Remote diagnostics, technical issues and servicing can be carried out, and it’s also possible to remotely view status, set and unset a system and access an event log. For instance, if someone loses a key fob, BCH can access their information, carry out an authorization check, let them into their abode and, if necessary, deactivate the missing device. It also allows the incumbent installer to remotely access the system’s software to physically input any special information such as extended door release times for specific residents. Programming Key Fobs Remotely BCH worked with STANLEY to generate reports which show when a key fob hasn't been used for a specific period of timeWith a number of vulnerable residents, BCH worked with STANLEY Products & Solutions to generate reports which show when a key fob hasn't been used for a specific period of time. Anthony Walker comments, “If the report indicates non-use of a fob, we can take measures to deactivate it, and/or can send someone over to check on the person concerned and, if necessary, notify next of kin or the relevant authorities. “In extreme circumstances, we can also remotely open doors to allow access to the emergency services. Having the ability to immediately and remotely program fobs has been particularly beneficial to our customers who previously would have had to travel to our offices for this to be completed - saving both time and money and making best use of our resources.” Seamless Migration To Cloud With a large number of residents, each with their own key fobs, Anthony Walker was keen to avoid any disruption during the upgrade and wanted to ensure that the process was achieved as seamlessly as possible. Configuring the physical hardware was helped by the installation team’s existing knowledge of STANLEY Products & Solutions’ technology. On-site training was also provided by experts from STANLEY Products & Solutions and, on the very rare occasion when there was a problem, a full support and advice package was available. The use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforwardInstalling a new access control system can often result in replacing existing key fobs with new ones – not only is this costly and inconvenient but there is also an administrative burden associated with transferring all the information to the new devices. However, all these issues were circumvented, as the use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforward – so much so that tenants didn't even realize any change had taken place. In addition, having access control data in the cloud means that it is always backed up. Enhanced Safety And Security BCH’s Anthony Walker considers the installation a total success and concludes, “I initiated this upgrade project because I firmly believed that it would improve tenant satisfaction and make our overall operation more efficient.” He further added, “I’m delighted that both of these objectives have been achieved and that STANLEY Products & Solutions’ access control technology has improved security, safety and protection across our estate.”
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8.8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometres distribution network and 4,386 kilometres of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management SystemBosch’s Building Integration System Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities All systems and cameras are monitored by security personnel at the company’s control center in Recife. For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.