School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimize the death toll)? In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective ar...
The basic principles of access control are well established: only authorized people should have access to secure areas, only at times that can be defined in advance, and only within a system that can identify exactly who went where, and when. Traditional mechanical lock-and-key systems cannot accomplish this — at least, not without loading a huge admin burden onto security staff. But modern, electronic wireless access control has the flexibility to achieve it. What criteria determine the...
Live Earth, an advanced data visualization platform for directing and monitoring complex business and security operations, has partnered with HERE, the Open Location Platform that provides advanced location intelligence, to improve operations and safety measures across indoor venues. Through this partnership, organizations will be able to integrate HERE Venue’s detailed floor plans with a variety of assets that include sensors, door access controls and security cameras. The ability to mar...
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to...
Allied Universal is proud to recognize security officers during the fourth annual National Security Officer Appreciation Week, September 16 – 22, 2018. “National Security Officer Appreciation Week honours the incredible efforts of our nation’s security officers to create safer and more secure environments,” says Steve Jones, CEO, Allied Universal. “The appreciation week is also an opportunity to profile the many roles security officers fill; debunk misconceptions a...
AMAG Technology announces the release of Symmetry Control Room. Control Room provides a single operational window for situational awareness and managing video, alarms and events. It will integrate with AMAG’s entire Symmetry portfolio, which includes video, visitor, identity, incident management, intrusion and access control, as well as best-of-breed manufacturers that are part of the Symmetry Preferred Partner Program. Monitoring Symmetry’s platforms through Control Room delivers r...
CheckPoint Tours is the latest service from the Connect ONE by Connected Technologies cloud-hosted integrated security management platform that bundles Intrusion, Access Control, Video Surveillance, Energy Management and Critical Environmental Monitoring in one single user interface. ScanPass Mobile Credential CheckPoint Tours tracks and documents activities and tasks required at the protected premises. It works with conventional access control readers or ScanPass Mobile Credential to track activities by guards or other personnel required to perform tasks at specific times and locations. As the user scans/swipes each checkpoint their access is logged and can be reviewed. Multiple checkpoints can be added economically by using only ScanPass barcode stickers in place of card readers and additional hardware. CheckPoint Tours is another valuable service that provides real-time recordkeeping that security guards have completed their rounds or employees have performed required routines.
Allied Universal, a facility services company and a security force provider in North America, has announced that Catherine King, Senior Vice President, Recruiting and Staffing, is a featured speaker at a Capitol Hill briefing on employment needs of unemployed older Americans on Friday, January 19 from 1:30 to 2:30 p.m. EST at the U.S. Capitol Visitor Center, Room SVC-203-02. The briefing will provide an introduction to the U.S. Department of Labor’s Senior Community Service Employment Program (SCSEP). “Older Americans, who represent a growing part of the U.S. labor force, struggle to find jobs after becoming unemployed,” says Catherine King. “I am proud that Allied Universal is working with SCSEP to help older adults find jobs and increase their economic self-sufficiency. We benefit from the skills, talents, and experiences of program participants we have hired thus far and look forward to bringing on more.” Opportunities For 11,000 Seniors In 2017, the company hired nearly 11,000 seniors as security professionals and in administrative roles. That’s over 7 percent of Allied Universal’s workforce, and it’s growing. Last year, the company also launched its Partners in Employment Community-Based Organization Program (PIE CBO) to help recruit older adults. Organizations that refer seniors can earn a referral payment of $400 per candidate hired. “We network with a number or groups like AARP to reach this population,” King continued. “They are attractive workers because of their high work ethic and dependability. They are the children of ‘the greatest generation.’” The SCSEP briefing will explore factors driving the conversation for employing older workers, such as an increase in life expectancy and workers prolonging retirement. Hosted by U.S. Senator Patty Murray, the other speakers include Kelly S. Mikelson, Ph.D., Research Associate, Urban Institute, who authored the white paper The Role of SCSEP in Workforce Training for Low-Income Older Workers; Sharron Holquin, a former SCSEP participant who will share how she turned her work-based training into a full-time job; and Joseph McCarley, Project Director, TERRIFIC, Inc., who will discuss his organization’s experience in hosting SCSEP participants.
Western Digital Corp., a global data storage technology and solutions provider, introduced its newest and highest performing industrial- grade and automotive-grade card solutions to date. Newly enhanced SanDisk Industrial and SanDisk Automotive card storage solutions provide superior endurance and reliability for commercial surveillance, intensive “Industrial Internet of Things” (IIoT) applications and “connected automotive” applications under extreme ambient temperatures. With up to quadruple the read speed and more than twice the write speed of the company’s previous generation cards1, they enable OEMs to push the boundaries of applications – from supporting “smart” surveillance systems with fast in-camera analytics, to improving high-definition video capture in surveying commercial drones and automotive dash cameras, to enhancing the responsiveness of automotive 3D mapping navigation systems. SanDisk Industrial SD and microSD Cards New SanDisk Industrial SD and microSD cards, and SanDisk Industrial Extended Temperature SD cards (for trusted performance under extreme temperature conditions of -40oC to 85oC) are built with the high endurance and reliability that is paramount in the industrial and commercial industries, enabling them to consistently manage the challenging workloads of IIoT, commercial surveillance, medical and other intensive “connected” applications over extended periods of time. SanDisk Automotive SD Card New, higher performance SanDisk Automotive SD cards are built to meet the rigorous reliability, quality and temperature demands of the automotive market. Compliant with the automotive AEC-Q100 Grade 3 standard (operating in ambient temperatures of -40oC to 85oC), it enables OEMs to bring intelligent, high-capacity and fast data storage to a wide array of advanced, in-vehicle applications and systems, including navigation mapping systems, data event recorders, infotainment systems and more. Highlights And Features Performance - Delivers sequential reads speeds of up to 80 MBs and sequential write speeds of up to 50 MBs.2 High Capacity - SanDisk Automotive SD cards, SanDisk Industrial SD cards and SanDisk Industrial Extended Temperature SD cards are offered in capacities up to 64GB. SanDisk Industrial is also available in a microSD form factor in a range of capacities, including a new, high-capacity 128GB card. Expanded Intelligent Features for OEMs - The new cards include an enhanced Health Status Monitor with expanded reporting capabilities to enable manufacturers to remotely monitor usage of the card and identify when card upgrades or replacements are needed. An automatic “Read Refresh” feature optimizes the card for compliance with strict OEM data retention specifications. Other intelligent features include OEM customization capabilities, enhanced power protection and “host lock” to help ensure security if the card is removed. Availability - New SanDisk Industrial SD and microSD cards, and SanDisk Automotive SD cards are now sampling to OEMs worldwide. These new SD and microSD cards are part of the company’s suites of industrial-grade and automotive-grade solutions optimized to address the vast data generated at the “edge” by connected commercial and automotive applications. Critical Part Of IoT Systems “The skyrocketing volume of data and the increased need for fast responsiveness for in-device analytics and other real-time event processing has made trusted storage at the “edge” a critical part of IoT systems. Leveraging our vertical integration, we built our newest SanDisk-brand industrial and automotive cards from the ground-up for the intensive demands of IIoT and “connected” automotive applications. These robust, high endurance cards offer up to quadruple the performance of our previous generation cards and an outstanding feature set. In addition, we have expanded our portfolio to include a new 128GB SanDisk Industrial microSD card that provides the capacity that is imperative for capturing advanced video and supporting data-heavy connected applications over extended periods”, said Christopher Bergey, Vice President of embedded and integrated solutions, Western Digital. “The enhanced endurance of SanDisk Industrial microSD cards allow our customers to develop products that capture and store high definition video over long periods of time under a variety of challenging environmental conditions”, said Chan Lee, Vice President of engineering at Ambarella, Inc.
Building upon its leadership in integrator-focused solutions for the commercial and residential markets, Middle Atlantic Products has reorganized its electrical engineering and power product management teams into a single department. The combined unit will increase its focus on solving integration and specification challenges with innovative and market-leading solutions. The new department will be led by Scott Lowder, director of product management — power. Solving Customer Problems "Solving customer problems is the primary focus of the Middle Atlantic power team, and we are fortunate to work with the most talented consultants, engineers, and integrators in the world," said Lowder. "With the pace of technology and the time it takes to develop complex products, it is critical for a development organization to operate as leanly as possible to get the best solutions to our partners quickly. This is an opportunity to create a seamless link between our customers and the talented engineers that are working to develop our next innovations that will reliably deliver the expected end-user experience." Scott Lowder Lowder is an expert in converting market problems into powerful solutions that have been awarded multiple patents and serve the integration community. Prior to joining Middle Atlantic, he worked for ASSA ABLOY in the security solutions industry for more than 10 years. He holds a bachelor's degree in liberal arts from Fairfield University, a bachelor's degree in mechanical engineering from the University of Connecticut, and an MBA in finance and marketing intelligence from the University of Connecticut.
On the Move Systems has announced that its wholly-owned subsidiary Robotic Assistance Devices (RAD) will make its S5 Security Guard Robot available to members of PSA Security Network, the world's largest systems integrator cooperative made up of the most progressive security and audio-visual integration firms in North America. Robotics: The Wave Of The Future PSA Security Network encompasses more than 400 branch locations, employing more than 7,500 industry professionals, with more than $4.5 billion annually in security, fire, life safety and pro audio-visual installations. By leveraging the power of the PSA Security Network, RAD will expand the geographic reach of the innovative S5 Security Guard Robot solution while allowing PSA members to gain access to the rapidly growing artificial intelligence market. “Robotics is the wave of the future, and PSA strives to be a leader in the delivery of cutting-edge technologies,” said Bill Bozeman, President and CEO, PSA. “RAD enables PSA integrators to deliver advanced solutions that streamline efficiency, are cost effective and strengthen overall security. We are excited to have the opportunity to add RAD to our rich portfolio of technology partners.” High-tech Robotic Guards RAD robotics redefines the security services market, allowing organizations to augment the value of traditional manned guarding services with high-tech robotics. Through the incorporation of advanced analytics and strategic technology integrations, the artificial intelligence solutions created by RAD accelerate deep learning, automate the security patrol process and build situational awareness for leaders and first responders in the event of an incident. "We're excited to offer our robotic solution through another channel as part of PSA's expansive integrator network, allowing us to expand our market reach and educate more end users on how these solutions can solve today's most complex security problems," said Steve Reinharz, President and CEO of RAD. "PSA members will now have the ability to not only offer a cutting-edge technology to their customers, but also add additional revenue to their business through our robots-as-a-service model." RAD currently has a sales pipeline of over 50 Fortune 500 companies and over 25 qualified dealers and distributors that have a combined customer base of more than 35,000 end-user corporations.
On the Move Systems is pleased to announce that Robotic Assistance Devices (RAD), its wholly owned subsidiary, has deployed its first security guard robot at the headquarters of Romeo Power Technology in Vernon, California. The 113,000-square-foot facility will benefit from the addition of RAD robotic personnel, and will augment the existing security, safety and operational processes in place at the site. Artificial Intelligence Data “RAD is the perfect partner to help us increase safety, enhance productivity and control access to our facility,” said Michael Patterson, Romeo, CEO and Co-Founder. “In addition, our partnership allows us to gather data from the artificial intelligence market, which we know will play an ever growing role in our business.” Romeo is the exclusive battery pack technology partner to RAD. Romeo lithium-ion battery packs power RAD’s fleet of security guard robots, providing 12 hours of continuous operation regardless of terrain or climate. Additionally, these advanced battery packs enable RAD robotics to experience four continuous years of use without replacement. Romeo, founded by engineers and designers from SpaceX, Tesla, Samsung, Apple and Amazon, is an energy storage technology company leading the charge in battery pack innovation, safety and reliability for vehicles and stationary storage. Combining Human Personnel With Robotics “We are pleased to deploy the first robot at Romeo Power Technology — part of our robot-as-a-service delivery model that differentiates us from other robotic and artificial intelligence providers,” said Steve Reinharz, President, RAD. “As we move toward exceeding our 2017 delivery targets, we continue to experience significant and growing market interest on our solutions, which are designed to augment existing security teams.” The Security Guard robots, which are optimized with RAD’s customized services and solutions, deliver a cost-effective solution to augment traditional manned guard services. The robots serve as force multipliers and remove security personnel from potentially dangerous situations, reducing liability. The combination of human personnel with robotic technologies creates a strong value proposition that results in new levels of security and streamlined operations.
There’s a lot of excitement around artificial intelligence (AI) today – and rightly so. AI is shifting the modern landscape of security and surveillance and dramatically changing the way users interact with their security systems. But with all the talk of AI’s potential, you might be wondering: what problems does AI help solve today? The Need For AI The fact is, today there are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyze more video data than humans ever possibly could.AI is a technology that doesn’t get bored and can analyze more video data than humans ever possibly could It is designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. There are two areas where AI can have a significant impact on video surveillance today: search and focus of attention. Faster Search Imagine using the internet today without a search engine. You would have to search through one webpage at a time, combing through all its contents, line-by-line, to hopefully find what you’re looking for. That is what most video surveillance search is like today: security operators scan hours of video from one camera at a time in the hope that they’ll find the critical event they need to investigate further. That’s where artificial intelligence comes in. The ability of AI to reduce hours of work to mere minutes is especially significant when we think about the gradual decline in human attention spans With AI, companies such as Avigilon are developing technologies that are designed to make video search as easy as searching the internet. Tools like Avigilon Appearance Search™ technology – a sophisticated deep learning AI video search engine – help operators quickly locate a specific person or vehicle of interest across all cameras within a site. When a security operator is provided with physical descriptions of a person involved in an event, this technology allows them to initiate a search by simply selecting certain descriptors, such as gender or clothing color. During critical investigations, such as in the case of a missing or suspicious person, this technology is particularly helpful as it can use those descriptions to search for a person and, within seconds, find them across an entire site. Focused Attention The ability of AI to reduce hours of work to mere minutes is especially significant when we think about the gradual decline in human attention spans. Consider all the information a person is presented with on a given day. They don’t necessarily pay attention to everything because most of that information is irrelevant. Instead, they prioritise what is and is not important, often focusing only on information or events that are surprising or unusual. Security operators scan hours of video from one camera at a time in the hope that they’ll find the critical event they need to investigate further Now, consider how much information a security operator who watches tens, if not hundreds or thousands of surveillance cameras, is presented with daily. After just twenty minutes, their attention span significantly decreases, meaning most of that video is never watched and critical information may go undetected. By taking over the task of "watching" security video, AI technology can help focus operators’ attention on events that may need further investigation. As AI technology evolves, the rich metadata captured in surveillance video will add even more relevance to what operators are seeing For instance, technology like Avigilon™ Unusual Motion (UMD) uses AI to continuously learn what typical activity in a scene looks like and then detect and flag unusual events, adding a new level of automation to surveillance. This helps save time during an investigation by allowing operators to quickly search through large amounts of recorded video faster, automatically focusing their attention on the atypical events that may need further investigation, enabling them to more effectively answer the critical questions of who, what, where and when. As AI technology evolves, the rich metadata captured in surveillance video – like clothing color, age or gender – will add even more relevance to what operators are seeing. This means that in addition to detecting unusual activities based on motion, this technology has the potential to guide operators’ attention to other “unusual” data that will help them more accurately verify and respond to a security event. The Key To Advanced Security When integrated throughout a security system, AI technology has the potential to dramatically change security operations There’s no denying it, the role of AI in security today is transformative. AI-powered video management software is helping to reduce the amount of time spent on surveillance, making security operators more efficient and effective at their jobs. By removing the need to constantly watch video screens and automating the “detection” function of surveillance, AI technology allows operators to focus on what they do best: verifying and acting on critical events. This not only expedites forensic investigations but enables real-time event response, as well. When integrated throughout a security system, AI technology has the potential to dramatically change security operations. Just as high-definition imaging has become a quintessential feature of today’s surveillance cameras, the tremendous value of AI technology has positioned it as a core component of security systems today, and in the future.
There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country. Regardless of the size of the retailer, there are many different technologies that can be used within a retail store to improve security and loss prevention, yet none should be used in a silo. There are tremendous benefits to integrating security technologies and communications systems together, including enhancing overall safety and security, reducing shrink, and improving operations. There are many different technologies that can be used within a retail store to improve security and loss prevention As the existing security infrastructure is evaluated and plans for the future are developed, the team responsible should consider some of the following questions. Are there areas of the store that require greater security? Are there notifications or other technologies that could improve the efficiency of personnel and the safety of shoppers? Are there other departments within the organization that could benefit from the data gathered by the security technology? Understanding current pain points within the stores and how integrated security solutions can address these is the key to implementing the best solution. Here are a few “hot spots” within a typical retail store that easily demonstrate the power of integrated solutions. Point Of Sale Terminals Whether it’s loss through sweet hearting or other fraud, point of sale terminals present a significant shrink risk for retailers. Integrated systems enhance security at these locations. Video recording of HD or megapixel cameras integrated with point of sale data makes it easy to locate video associated with transactions and exception reporting. This allows for visual verification of each transaction when needed.There are tremendous benefits to integrating security technologies and communications systems together Other risks like robbery not only result in loss, but also impact the safety of employees and shoppers alike. Panic buttons or bill trap sensors connected to the intrusion detection system ensure silent alarms are issued when employees are at risk. When the intrusion detection system is integrated with the video system, pressing a panic button or pulling the bill from the sensor can automatically trigger a video snapshot to be sent to the monitoring station to provide verification of the alarm and more information for law enforcement when they are dispatched. Adding audio integration to the intrusion system can also result in a message sent to the store security personnel’s two-way radio when a panic button is pushed, or a bill trap sensor is activated. If no security guard is onsite, video monitoring services can allow the monitoring center to intervene through audio, alerting the perpetrator that his or her actions are being monitored and that the authorities have been contacted. This may cause the offender to flee the area, helping to mitigate the safety risk as well as the potential for loss. Panic buttons or bill trap sensors connected to the intrusion detection system ensure silent alarms are issued when employees are at risk High Value Displays Protect high-value or frequently-stolen items such as electronics, using video analytics integrated with audio communications Protect high-value or frequently-stolen items such as electronics, using video analytics integrated with audio communications. For example, a person standing at a display for longer than a pre-defined time or touching items on display can trigger a video snapshot to be sent to the store manager and an audio message to play through a nearby loudspeaker, such as: “Thank you for your interest in our smartphone selection; an associate will be there soon to assist you.” This not only alerts potential offenders that their actions are being watched, it also serves to improve customer service for legitimate shoppers – as a retail floor associate is notified that a customer may need assistance. Cash Office An access control reader at the door to the cash office restricts access to only authorized individuals. Integrating video can automatically capture an image of the person requesting access for verifying an employee’s identification prior to granting access or for retrospective analysis in the event of a theft. Exit Doors If an employee props open a back door – either for easy re-entry after a break or to allow access to another person with intentions of theft – integration of the intrusion detection system to the video and audio system can significantly reduce risk of loss. For example, the intrusion detection system can monitor doors for abnormal conditions, even when the system is disarmed.Loss can also occur when a cooler or freezer malfunctions or when the door is accidentally left open A door left open for longer than a pre-defined time can cause an alarm on the intrusion panel, which can trigger a nearby camera to send a snapshot of the open door to the store manager and trigger the public address system to play a pre-recorded message through a nearby speaker. This prompts the employee to close the door, reducing risk of theft. Coolers And Freezers Loss isn’t just about theft. Loss can also occur when a cooler or freezer malfunctions or when the door of one of these units is accidentally left open. The same concept for monitoring exit doors can also apply to doors for coolers and freezers to prevent spoilage. A cooler or freezer door monitored by the intrusion detection system can trigger an alert or chime to play in the area to remind an employee to close the door or to alert the store manager to the issue. While providing surveillance of the cash register area, the camera's video analytics can be used to trigger an alert in case the queue exceeds the pre-defined threshold Serving A Dual Purpose Retailers can use the metadata from the cameras to gather business statistics like counts of people entering the store While the technology solutions described above positively impact loss prevention in a retail store, they can also extend beyond security to improve health and safety and enhance customer service as well as customer engagement and sales. For example, while securing a store’s main entrance with IP cameras featuring on-board video analytics, retailers can use the metadata from the cameras to gather business statistics like counts of people entering the store. This data can help them understand peak days and times when making decisions about staffing. Or while providing surveillance of the cash register area, the camera's video analytics can also be used to trigger an alert in case the number of people in a queue exceeds the pre-defined threshold. At this point, the same public address system and loudspeakers used to play background music to enhance the shopping experience could be activated to broadcast a message to request another cash register to be opened, improving store operations. For security and loss prevention purposes, video analytics can also be used to ensure that no one enters or leaves the retail shop using the emergency exit. To address health and safety issues, these same cameras can also trigger an alarm if that emergency exit is blocked by an object – improving the safety of customers and employees. When systems are used to deliver data for purposes beyond security, other departments may be willing to contribute toward the cost Metadata generated by the cameras can also be used to gather information that when processed with sophisticated algorithms in the cloud can show trajectories of the paths that shoppers take as they travel throughout a store as well as heat maps indicating where they walk, stop and dwell – all while protecting the privacy of individual shoppers. This information can be used by merchandisers to evaluate the success of displays and store layouts, which directly impacts customer engagement and sales. When systems are used for and deliver data for purposes beyond security, other departments may be willing to contribute toward the cost of the system. This provides an added benefit by relieving some of the cost burden from security or other operational budgets. Product Selection Integration is becoming easier using standards and expanding industry partnerships. However, in some cases, choosing systems from a single vendor that are designed to work together can help to speed and simplify installation, while also reducing system costs for both the integrator and the user. Regardless of the products chosen, it will be important for a retailer with many locations to have consistency in the type of equipment installed at each site. This makes support easier and enables a more uniform response to incidents that happen at various stores. As many retailers already understand, there is no silver bullet to reducing loss. However, a combination of the right technologies working together to prevent shrink and improve investigative capabilities can result in smarter and more effective loss prevention.
It had been a particularly slow night. The plant security guard had just made his rounds on this Sunday evening shift. As soon as he passed the weighing scales, he could enter the guard shack and get off his feet. Challenging A Curious Incident However, on this night, he noticed the waste vendor’s truck sitting half on and half off the scale. He stopped dead in his tracks to see if the truck would back up and completely sit on the scale. It never did. The observant guard walked up to the truck and challenged the driver who seemed surprised. “Hey, you’re not weighing your truck properly.” The driver fumbled for a response before replying, “Sorry, I was on the phone with a friend. I didn’t notice it.” But this security guard had the presence of mind to demand the driver’s phone. The driver was caught off guard and surrendered the phone. The guard then pulled up the most recent incoming/outgoing calls and saw no calls during the last 30 minutes. “I don’t think so.” “You don’t think so what?” The security guard was frank, “You haven’t used this phone in over half an hour.” The truck driver sheepishly acknowledged the fact. It was decided to install video surveillance covering the weighing area and scales – no easy feat due to poor lighting Preventing Crime As It Happens Knowing the driver was lying, the security guard ordered the truck back on the scale for a correct weighing and advised the driver that he would report the incident. The security guard wrote up his report and handed it off to his supervisor who, in turn, contacted the local corporate investigator. This investigator was soon on the phone with his boss at corporate headquarters on the other side of the world. Together with Security, they decided to install video surveillance covering the weighing area and scales – no easy feat due to poor lighting. However, once completed, they waited. They would not have to wait long. For the next two months, the waste vendor trucks, filled to the brim with production waste, black-and-white paper and other waste products from the plant, would stop on the scale only for a moment and then drive the front half of the truck off the scale for weighing. It was obvious that the vendor was cheating the company by only paying for half the waste. After two months, it was decided to catch the next cheating driver “en flagrante.” Sure enough, the next truck went half on and half off the scale and was weighed. Security then asked the unsuspecting driver to park his truck and invited him inside the building to talk to a supervisor. The driver signed an incriminating statement about the scheme and his role therein. They sent him on his way asking him to keep it quiet Waiting for the driver in a large office was the local investigator and his close friend, the Head of Security. After a difficult interview, the driver admitted to cheating on the scales over a two-year period—he claimed that some of the scale cheating was done at the direction of the vendor’s management, while some of it he did himself by “ripping off” the vendor—which he acknowledged was dangerous. Working With Authorities The driver signed an incriminating statement about the scheme and his role therein. They sent him on his way asking him to keep it quiet—they would see what they could do for him later on. In the meantime, Corporate Investigations had received a due diligence report on the vendor company which contained disturbing news—the company and its managers were associated with a countrywide waste management mafia. The report suggested that the vendor had a reputation for thefts and involvement in numerous lawsuits regarding thefts and embezzlement. Shockingly, no prior due diligence had ever been conducted on the vendor. Fortunately, the plant’s finance and audit team had maintained good records over the past 5 years and were able to re-construct the amount of waste going out the plant door and the amounts being claimed and paid for by the vendor. The discrepancy and loss stood at a multi-million dollar figure. After consulting with the local police authorities and company lawyers, it was decided to pursue a civil case against the vendor. Pursuing Legal Action The regional lawyer, the Head of Investigations, the Head of Security and the CFO invited the vendor to discuss the problem. Some of the evidence was shown to the vendor’s CEO who became indignant and, in order to save face, promised to fire the truck drivers and to repay any losses for the last two months. Inter-dependent entities - security, investigations, finance/audit and legal - combined their resources and agendas to form a unified front That was not enough for the company and a protracted legal battle ensued which lasted several years and resulted in the vendor’s paying almost the entire amount in instalments. The vendor was dropped from the contract and internal controls strengthened—the only plant employee dealing with the waste issue left the company and was replaced by two individuals. The plant also began paying more attention to the waste process and less to the production side. Several “lessons learned” come to mind. First, the tripwire came in the person of an astute and well-trained security guard who exhibited some of the best characteristics you want to see from men and women in that profession. The Security Department was also adept at installing the surveillance system and capturing the fraud live on videotape. But a far greater lesson was learned—of what can happen when inter-dependent entities (security, investigations, finance/audit and legal) within a company combine their resources and agendas to form a unified front. The results speak for themselves.
“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual Devices And Controls In effect, a security guard wearing a HoloLens headset can approach a door in his facility and see the real-time status of that door, provided by an access control system, projected as a hologram alongside his live view of the door. It’s the first implementation of a technology with many possibilities. Related to video surveillance, real-time facial recognition could provide the identity of a person walking past a security officer in a hallway, for example. Basically, the approach extends the interfaces and capabilities available in a control room to a security officer on patrol. The officer can place and interact with a variety of virtual devices and controls as holograms in the 3-D space he or she views through the headset. Augmented Reality For Integrated Electronic Security The security industry technology has been developed by CodeLynx, a software engineering and systems integration company headquartered in North Charleston, S.C. As a systems integrator, CodeLynx specialises in audio-visual and physical security design and installation for A/V, access control and video surveillance systems. A complementary business is software engineering; Darren Cumbie, Director of the Software Engineering Division, and his team provide custom integrations of various technologies. The approach extends the interfaces and capabilities available in a control room toa security officer on patrol CodeLynx has developed software to adapt Microsoft’s HoloLens product for use in the physical security field. They are bringing it to market as ARIES (Augmented Reality for Integrated Electronic Security). The software operates using Microsoft’s HoloLens, introduced in 2016, a powerful, self-contained holographic computer worn as a headset. Specialized components enable holographic computing in lockstep with advanced sensors, including five cameras. Users can move freely throughout an environment and interact with holograms that augment the reality they view through the HoloLens. Cumbie says HoloLens provides the best mixed reality headset currently available: “Nothing else has the power, usability and scalability across an organization.” AMAG Symmetry Access Control Integration In ARIES, CodeLynx has created a certified integration with AMAG’s Symmetry access control system to enable operators to view information from Symmetry as holograms in their field of view through the HoloLens. The integration extends the functioning of Symmetry to operators in the field, thus expanding the control room environment. Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry. Approaching a door, an operator can request a list of the last five people who came through the door, for example; he or she can see a photo ID related to each person who swipes through a turnstile. CodeLynx is looking to expand the market for ARIES using integrations with other OEMs in addition to AMAG. “Instead of being chained to their desk looking at monitors or a display wall, operators can work in the field using the full functionality of their systems as they walk throughout the property,” says Drew Weston, CodeLynx Director of Sales and Marketing. “Meanwhile, I am not sitting at a desk, I am out in public.” Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry At some point, the headsets will likely get lighter and more ergonomically appealing. Right now, all the computing power is inside the headset (which, even so, only weighs only 1.3 lbs). In the future, more of that computing will likely be “offloaded” to a nearby desktop or laptop computer, or even to the cloud, and wirelessly “tethered” to the headset. In addition to making the headsets lighter and more ergonomically appealing, tethering would bring down costs from the current $5,000 per headset (possibly into the “three digit” range). CodeLynx is poised to leverage any Microsoft enhancements to the HoloLens environment. Currently the software is priced at $1,500 per user. Benefits For Systems Integrators For systems integrators, ARIES could be used to simplify installations, given its ability to view camera frames through the headset hands-free rather than needing to view a separate laptop when focusing or positioning a camera. For maintenance or troubleshooting, an operations center could access the field user’s view and direct him or her to correct a problem. In this way it would be a training tool to help integrators, which is a separate value proposition from how the devices may be deployed by end users. The ARIES approach could also eventually change how we think of a control room. Instead of video screens and walls, operators might sit in comfortable chairs in rooms with white walls, viewing all the control room “screens” through their headsets as holograms. Less power consumption would be among the benefits. ARIES plans to offer a “virtual operations center” in 2018, enabling command center operation from anywhere, user-customizable layout views and the ability to push content to specific HoloLens users. This video demonstrates how interaction with holograms can drive security functions: https://www.youtube.com/watch?v=B82oAlxt5_s
I have been unpacking from last week’s ASIS show in Orlando. It was a good show, except if you compare it to last spring’s ISC West in Las Vegas, which was especially well attended and generated a lot of excitement in the market. ASIS was definitely smaller, lower key and less crowded. And there were no big product announcements. But there was still plenty of technology on display. In particular, I saw the show reflecting several ongoing trends in the market. Impact Of M&As Mergers and acquisitions have been big news in the security market for the last year or two, and there was evidence at ASIS of how M&As are changing the market. For example, Axis Communications, now owned by Japanese giant Canon, is taking over the marketing of Canon’s small (by comparison) selection of video surveillance equipment. Thus ends (quietly) one of the big questions in the market: Why would a company like Canon want to compete against itself? Even more reflective of the changing Canon/Axis world is a new 20-megapixel camera highlighted at ASIS. It was developed through cooperation by the two companies, with Canon providing the lenses and Axis providing the rest of the camera, including image processing. It’s being positioned as an opportunity to combine the best capabilities of both companies. Mergers and acquisitions have been big news in the security market for the last year or two, and there was evidence at ASIS M&As changing the market Vanderbilt is expanding its cloud and video management offerings – in addition to access control – with acquisition of Access Control Technology (ACT) in Dublin. A company built on acquisitions, Vanderbilt will be looking to unify their product offerings in coming months – combining technologies from various acquisitions into a unified whole. It’s been a big year for FLIR, which has swallowed up DVTEL and now offers a complete range of video surveillance products. Reaching way beyond FLIR’s historic presence as a thermal imaging company, the new FLIR is looking to educate the market about its versatility. Meeting End User Demands End users demand more integrated systems, and you heard it repeatedly at ASIS. For example, Tyco Security Products says their products are now more connected, reflecting further deterioration of the silos that used to exist. More effective user interfaces are getting attention. One I saw at ASIS was by Honeywell’s Connected Buildings business. A big screen at their booth showed a map with multiple locations in an enterprise; clicking on a location brings up a schematic showing where cameras are located. If you click on a camera icon, you see video from that camera. They also previewed a smart phone app that runs off the same database, which can be used by guards working in the field. Bosch also has a neat integration of their access control, intrusion and video systems, all tied together using their intrusion system to provide intuitive controls. Ameristar, an ASSA ABLOY subsidiary, offers Perimeter InSite software, providing a virtual view of any perimeter security construction project as it is planned and built – stage by stage – with no surprises. Mobile Credentialing, Wireless Locks A leader in mobile credentialing, HID Global is emphasising how the technologies are being implemented in the market – more customer references and case studies are paving the way for broader adoption. Other companies are also onboard with mobile credentialing, including Brivo and Lenel. A leader in mobile credentialing, HID Global is emphasising how the technologies are being implemented in the market Wireless is continuing to evolve. Stanley Security offers the WiQ wireless product line, emphasising that installation of wireless locks is half the cost of wired, but there are downsides (such as slight access delays) compared to wired. Allegion continues to expand its Engage wireless portfolio, too. Paxton Access, a British company, has restructured and is investing in the U.S. market. Their Paxton BLU cloud-based access control system uses Amazon web services and is an opportunity for dealer/integrators to earn more recurring monthly revenue (RMR) Security In The Headlines Violence in the headlines often screams out for security solutions, and there were some at ASIS. Stanley highlighted its Shelter product that enables a wireless lockdown in an active shooter situation in the education environment. It solves a high-profile challenge, but Stanley emphasises that it’s just part of a broader school security program – that’s what’s really needed. A different approach on the active shooter scenario is offered by risk assessment and consultancy company Control Risks, which offers active shooter education programmes for enterprises, including an e-learning module to teach employees how to react in an active shooter situation. New Video Capabilities Video grabbed attention at ASIS. As Hikvision and Dahua continue their energetic push into the U.S. markets, they were among the largest (and most crowded) booths. Several companies – including Bosch and Tyco -- are adding video analytics to their cameras at the factory. Vicon previewed its new Valerus VMS system, based on ONVIF protocols and totally compatible with their legacy ViconNet VMS. They see open systems as a strong selling point, but they will also continue selling hardware and “total systems.” "Suspect search" can search video to deliver additional examples of video involving a subject that has been identified by a single frame “Suspect search” is a new feature showing up on video surveillance systems. The feature can search captured video from throughout a system to deliver additional examples of video involving a subject that has been identified by a single frame of video – find the girl in the blue dress, or the man wearing a red shirt. Searching a whole system, rather than a single camera feed, expands an operator’s ability to investigate an incident. Avigilon introduced its version, called “Appearance Search” at ASIS, and Qognify also highlighted its version, called “Suspect Search,” which I first saw at IFSEC. I notice Exacq also has a flavor of this, and I am sure there are others. Perimeter Security Evolving Perimeter security is changing. Long considered a “low-tech” wing of the security market, there is a lot going on in the area of perimeter security. Visiting a couple of booths at ASIS opened my eyes. For example, Senstar has every kind of sensor, and their Tungsten product is a security appliance that offers cyber-security at the edge of the network, tying together the sensors and other devices. Protech offers solar-powered wireless sensors that don’t require trenching, another money-saver (more to come about them).
A mass shooting tragedy over the weekend in a nightclub in Orlando, Florida. – 50 dead and 53 wounded –highlights the random nature of violence even as it points to a number of issues for discussion in the security community. Early Sunday morning, Omar Mateen entered the Pulse nightclub in Orlando and opened fire with an assault rifle and a pistol. Three hours later, during which the 29-year-old Mateen held hostages and called 911 to declare his allegiance to the Islamic State, he died in a shootout with police. It was the deadliest mass shooting in U.S. history. Here are some aspects of the shooting that will be driving conversations among the security community in the coming days and weeks. How To Protect Soft Targets Protecting public places is a tradeoff between implementing extreme security measures and encroaching on individual freedom of movement. Would metal detectors, for example, help avoid such calamities? After a shooting at a movie theater in 2012, high costs were cited as an argument against the measures – the equipment costs about $2,500, and it would cost thousands more to implement a proper checkpoint. How many businesses are likely to go such a route? How might the calculus change in the wake of the most recent tragedy? How To Respond To An Active Shooter More organizations will be looking to perform active shooter drills; in effect, to prepare themselves for such an eventuality. Update: 18 #Orlando shooting victims have been identified so far https://t.co/BdnwKONYfw pic.twitter.com/N0zf1eedob — CNN (@CNN) 13 June 2016 More And Better Background Checks For Security Officers Security officers have historically struggled with perception problems (such as a stereotype as “mall cops”), and the Orlando shooter’s job as an armed security guard at G4S, working at a South Florida residential community, will likely contribute to negative perceptions, at a minimum. The situation could also prompt a more serious reevaluation of how security officers are vetted. Mateen was subject to a detailed company screening when he was recruited in 2007 and re-screened in 2013 with no adverse findings, according to G4S. He was also subject to checks by a U.S. law enforcement agency with no findings reported to G4S (although he was reportedly on the FBI’s “radar,” according to press reports.) The unanswered question is: How did it happen? G4S says they are providing their full support to all law enforcement authorities as they conduct their investigations. Encouraging more professionalism among security staff is an ongoing concern. A Lingering Shadow Of Tragedy At ASIS International 2016 After 9/11, there was a greater sense of purpose just days later when ASIS International held its annual Seminar and Exhibits. The show this year will be in Orlando – and it’s likely the recent tragedy will inform much of what is discussed at the show. Undoubtedly, security professionals will be looking for new and better ways to keep such tragedies from happening in the future. Infograhpic: How To Prepare For Active Shooter Incidents
It took six years to remodel the interior of the ‘Palace of Culture’, a monument to socialism built in the 1960s under East German communist rule. Now Bosch is contributing intelligent solutions to make sure that visitors feel safe there, without detracting from its historic charm. It takes the right setting for culture to flourish. Various things are essential: an ambiance in which visitors feel at ease, excellent acoustics, and flawless organization. Now that the Palace of Culture has been completely renovated to ensure all of this, the city of Dresden boasts a new, modern venue for promoting the arts. Sophisticated Security Solutions The main auditorium seats 1,700 people, and the building as a whole can accommodate up to 2,800 A completely new, state-of-the-art auditorium is the heart of the building. It meets international standards with its striking architecture and top-notch acoustics, providing ideal conditions for the Dresden Philharmonic Orchestra and all kinds of other musicians to give concerts. There is also a new municipal library branch, emphasizing the Palace of Culture’s new, open character. Spacious lobbies containing a restaurant and ticket sales link all of the facilities and rooms with one another. Many of the events held here in central Dresden are sold out. The main auditorium seats 1,700 people, and the building as a whole can accommodate up to 2,800. Crowds like these call for sophisticated security solutions that can be smoothly integrated into the overall design. Cleverly Integrated Components “We wanted a cost-effective overall solution that would do justice to the Palace of Culture and its unique architecture,” says Steffen Meyer, the building’s manager. “We published an invitation to bid for the project and of all the applications we received, Bosch convinced us that they were right for the job.” The building experts from Bosch implemented a customized solution for the Palace of Culture with a host of cleverly integrated components for fire protection, evacuation, access control, video surveillance and building management. The result is a harmonious overall system that meets the entire range of security needs. “As a public facility where people gather, we have to comply with very strict fire protection rules,” explains Meyer. Invisible Smoke Detectors “We also had to meet some special requirements.” Since the Palace of Culture has protected status as a historic landmark, the appearance of the walls, ceilings and floors may not be noticeably altered. Security staff can also tell whether anyone is still in the building, an important piece of information in case it is ever necessary to evacuate it Now virtually invisible smoke detectors preserve the ambiance of the concert hall. Special calculations were even carried out to avoid impairing its acoustics. Advanced video technology automatically counts visitors to prevent the building’s capacity from being exceeded. Security staff can also tell whether anyone is still in the building, an important piece of information in case it is ever necessary to evacuate it. Building Integration System In critical situations, special speakers powerful enough to be heard over the orchestra or even a rock concert are lowered from the ceiling to make sure that everyone hears important announcements. All of the individual components are networked via the Building Integration System from Bosch. It makes it easy for the well-trained security guards to monitor and control everything. And to ensure that everything functions reliably in the long term, experts from the Bosch center in Dresden will regularly check and service the system. Meyer stresses that “we don’t want our culture fans to run any risks.”
Unlike private sectors, the government-run offices or buildings are the places where people constantly visit for specific purposes, making these official institutions easily become a target for tempted malicious attack by people who might possess strong and negative emotions toward the governments. Despite the fact that these buildings are often guarded with more security staff with arms, it is even more than necessary to set up a solid surveillance system to proactively safeguard the public and its assets. Surveon provides government solutions with product lines including weatherproof cameras with excellent image quality, patent RAID NVRs with spare drive protection, and feature-rich VMS with post VA search. These powerful solutions enable the governments to protect people from most of the threats. Weatherproof Cameras With Smart WDR Surveon cameras secure the outer spaces of government building with IK10 vandal proof and IP66-rated weatherproof housingTo build a reliable security system for governments, SIs might encounter some challenges such as harsh outdoor conditions and data protection of recorded video. Under these circumstances, Surveon cameras secure the outer spaces of government building like parking lot with IK10 vandal proof and IP66-rated weatherproof housing, giving partners the most reliable outdoor-use option. Moreover, all of Surveon cameras provide excellent image quality with smart WDR, allowing the security guards to recognize crucial details such as license plates even under lighting contrast and prevent any suspicious vehicle from entering. Patent RAID NVR With Data Protection To avoid the loss of confidential data from surveillance system, the data protection of recorded video is particularly important in terms of planning for government security. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video loss. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video lossBesides, its client-server architecture can offer high I/O, large capacities, and overall system stability. To quickly identify useful information and relative footage from hundreds of hours of video recording, Surveon designs Post VA Search, an efficient management tool, reducing the time and efforts of management staff, making the surveillance system more efficient. Enhancing Security System Surveon government solutions have been successfully safeguarded the customs building in Bolivia, the post offices in Cairo, and the border checkpoint in Turkey. “Surveon provides the best C/P value solutions for the customs and improves its whole security system with high-reliability products. We are satisfied with the result and I’m sure we will keep choosing Surveon’s solutions in the future projects,” said VisionLine, Surveon’s major partner in Bolivia. Surveon is dedicated to offering a variety of end-to-end video surveillance solutions catering to different vertical applications, giving partners reliable options for their projects.
Property is one of the biggest targets for crime in the UK, especially open land. There are thousands of acres worth of property across the UK which aren’t effectively secured, as a result of which they have become hot-beds for crime, anti-social behavior, and not least fly-tipping. Security therefore must be a top priority for property owners, too many of whom tend to favor traditional methods such as fencing or hiring security guards. But, these methods come with a premium budget, with manned security running at a cost typically of some £300 per day. Nor is it possible to guarantee that every inch of a property is monitored. An increasingly adopted solution is Ad Hoc Property Management’s Smart Tower Security System and Smart Alarm System. Ad Hoc’s Smart Camera Security Tower sits six metres tall with a 36x optical zoom magnifying distances of up to 150 yards Ad Hoc Smart Camera Security Haringey Council contacted Ad Hoc Property Management after one of its industrial sites, Rosebery Industrial Estate in London, was repeatedly being targeted by fly-tippers over the course of many years. Every time the property was dumped with waste, it was costing the council hundreds of pounds to have their waste contractor called out to clean-up. By November 2017, they had expensed literally hundreds of thousands of pounds. By the end of the month the first Ad Hoc Smart Camera Security Tower was deployed, since then costs and incidents have plummeted. In fact, there have been no major incidents and local residents and tenants alike are delighted, welcoming the improved local environment. Ad Hoc’s Smart Camera Security Tower sits six meters tall with a 36x optical zoom magnifying distances of up to 150 yards, and a 12x digital zoom to enhance optical performance. Using state-of-the-art SMART technology (the same technology used in monitoring US Defense Center, The Pentagon), the tower boasts a 360 degree camera which can be programmed to move zones at set intervals for 24/7 monitoring. Utilizing wireless technology, the camera is able to filter large objects from those that are small, ensuring the alarm is only triggered when there is a clear threat. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK" Ad Hoc's Property Security Solutions “Open land is one of the biggest targets for waste dumping, but it doesn’t have to be. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK, preventing anti-social behavior and, more importantly, reducing opportunity for property-related crime,” said Darren Tubb, General Manager, Ad Hoc Security UK Limited. Land owners aren’t the only ones who can benefit from Ad Hoc’s security solutions; property owners of retail spaces, industrial buildings and homes who traditionally look at hiring in security guards, can benefit too, deterring fly-tipping and other anti-social crimes. As it stands, if a property is fly-tipped and no one is caught, it is the responsibility of the property owner to remove the waste legally at their own expense, which means hiring in a company licensed to remove these materials. However, as more property owners become aware of the technology available to them through Ad Hoc, not just in protecting the property but in helping police to identify the culprits, we could see property damage and fly-tipping become a thing of the past.
Government regulations continue to step up security demands at federal agencies, requiring identity cards to support multiple identity assurance factors and be validated at entries into a building or location. Because of the cost and infrastructure that goes along with many security upgrades, federal agencies must wait months or, in many cases, years to implement changes. The Federal Aviation Administration—an operating mode of the U.S. Department of Transportation—is no different. The FAA is tasked with the colossal mission of regulating and overseeing all aspects of civil aviation in the United States. With offices around the world, including its headquarters in Washington, D.C., the FAA has a large number of employees and buildings to oversee. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials Need Of Tools For Validating Employee Credentials As part of its security requirements, the FAA must validate Personal Identity Verification (PIV) cards at checkpoints within its facilities. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials. As recently as a year ago, FAA security personnel were conducting visual inspection of PIV cards at the gates into facilities that did not have PIV card readers. They had no way of telling if the card was authentic, revoked, or if the employee had access rights to a checkpoint at a particular time. At the FAA headquarters, which employs just under 6,000 permanent employees, and another FAA facility, the Minneapolis Air Route Traffic Control Center, which is the organization’s 11th busiest airport traffic control tower, visual verification just wasn’t enough. Automating The Verification Process In order to comply with HSPD-12 and the Office of Management and Budget (OMB) Memorandum 11-11, the FAA needed a process beyond visual verification that allowed security personnel to quickly check the authenticity and revocation status of a card, as well as access rights to a particular area of the facility. With as many as 5,000 people coming into the FAA headquarters facility daily, the organization’s primary goal was to automate the verification process. “The project needed to provide guards the ability to validate PIV cards at FAA facilities where the gates did not have PIV card readers,” said Craig Auguston, HSPD-12 Program Manager at the Federal Aviation Administration. “We also wanted a mobile solution for backup and for roaming guards to be able to validate secure areas, such as parking garages.” Codebench’s OMNICheck Plus Software OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000 The FAA began looking at products that could not only meet its requirements for mobile validation, but also integrate seamlessly with its P2000 security management database from Johnson Controls (JCI), according to Auguston. “This upgrade was important to meet the FAA’s requirement to validate PIV cards at all check points,” Auguston said. The FAA’s former process of visual verification was not allowing security guards to check the status of a PIV card, such as revocation status and specific access rights, both of which the organization needed to meet its security goals. After testing a couple of mobile software validation programs, the organization chose OMNICheck Plus software from Codebench, a HID Global Company. OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000, and it is listed on the GSA’s FIPS 201 Approved Products List as a CAK authentication system when running on an ARM-based mobile device such as the DAP CE3240B, which both FAA facilities use. Giving Mobile Access To The Security Guards “They really needed something that was going to allow their security guards to be mobile in certain parts of a facility,” said Botio Mandov of Johnson Controls. Johnson Controls, the integrator for the project, helped the FAA implement a larger security upgrade, which included the security management database and mobile validation software. Together, the FAA’s mobile DAP devices and OMNICheck Plus software enabled roaming security guards to use the mobile handheld devices in FAA parking garages and other entry points that needed to be secured, but do not have stationary PIV card readers. One of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers Checking Access Rights On Mobile Card Readers In addition to mobility, one of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers—something only their organization’s P2000 physical access control system could do previously. With an OMNICheck module called Data Import, certain cardholder information housed in the FAA’s P2000 database, such as access rights, was pushed down into the DAP mobile devices used by security personnel. “Access rights allow FAA security guards to make sure employees’ cards are not only valid, but that they are allowed to be in a certain area at a certain time,” Mandov said. In addition, FAA security administrators can run audit reports that show which cards were checked and when. The implementation took about five months, including testing the interface with the access control system and coming up with a training guide for the security guards, according to Auguston. The FAA is currently using 31 DAP CE3240B mobile readers with OMNICheck Plus. Saving Money By Eliminating Physical Parking Passes Prior to the OMNICheck Plus installation, FAA security personnel had an unreliable way of authenticating PIV cards and access rights. Now, security personnel are able to verify digital certificates, revocation status and access rights, all while having an audit trail of the cards checked in the system. An additional, unexpected benefit for the FAA has been the cost savings of eliminating physical parking passes at its two facilities. “We are able to positively identify cardholders’ status when they try to enter the facility. We were able to save money by eliminating the physical parking pass by using OMNICheck to validate cardholder’s status for parking in FAA-controlled facilities,” Auguston explained.
The 9th BRICS Summit was successfully held in Xiamen, China from September 3rd-5th, 2017, where leaders of the five member-countries were in attendance. Building on its success in providing a comprehensive security solution for the G20 Hangzhou Summit in 2016, the 9th BRICS Summit was yet another accomplishment for Dahua. The 2017 BRICS Xiamen Summit demanded high-level protection for national leaders from Brazil, Russia, India, China, and South Africa. As Xiamen’s city center is located on an island, the security system required comprehensive surveillance of all roads leading into the area, also known as the “Four Bridges and One Tunnel” network.Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras Protection Through Dahua Technology In addition to roads leading into the city, routes to and from the airport, hotels, and the Xiamen International Conference & Exhibition Center needed to be protected as well. A solution of this proportion would also require an advanced, automated, and centralized system to ensure efficient, coordinated responses. With its cutting-edge IP camera, video cloud, network storage, and transmission technologies, Dahua was up to the task of securing Xiamen and the BRICS venues. In total, Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras, and many other advanced Dahua products and services used in various areas of the city. The BRICS security command center, administered by the Public Security Department of the Xiamen, was fitted with a Dahua visual emergency dispatch and command system. The center’s large display wall was stitched together with Dahua edgeless HD LED panels, enabling a complete picture of all units under command center control during the meeting, greatly simplifying control and responses. The security system surrounding the Xiamen International Conference & Exhibition Center as well as the visual emergency dispatch and command system in the security command center both adopted a full range of Dahua video surveillance and display solutions. Dahua employed advanced technologies such as intelligent analysis and big data, to increase the efficiency of emergency command and management capabilities Live Video Security On The Road A customized Dahua Mobile Solution with GPS positioning and in-vehicle wireless image transmission system was installed on 228 patrol cars and 72 special cars from the Xiamen Public Security Bureau, which was used to clear the way for Summit leaders. This provided the command center with a continuous live overview of all areas while providing support for the handling of various emergencies. Dahua contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints In order to secure “Four Bridges and One Tunnel” access points, Dahua employed advanced technologies such as intelligent analysis, big data, and video analytics to significantly increase the efficiency of emergency command and information technology management capabilities, providing uninterrupted HD video surveillance and smart road event monitoring on bridges and tunnels. In addition, Dahua also contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints. In surrounding Haicang and Jimei districts, Dahua constructed video surveillance on routes and sites which held key activities in the city, achieving full coverage of places such as guarded routes, main roads, key sites, as well as surrounding areas and regions of elevated risk. Dahua Securing Public Safety Dahua also played a role in safeguarding conference-related affairs such as catering, accommodation, and travel. The hotels in which leaders stayed in and surrounding areas were upgraded to HD systems in a short amount of time, making sure the leaders were secure while they rested during the Summit. The mobile law enforcement surveillance system assisted the Xiamen Market Supervision Commission in guaranteeing the provision of safe food during the Summit. The three day BRICS Summit concluded without a hitch. National leaders and their delegations were able to smoothly move about the city and attend the conference while Dahua products prevented threats through a vast network of smart video technologies. In addition, the large-scale project significantly upgraded Xiamen’s city surveillance system and provided a long-term foundation for not only public security-related operations, but also broader public projects such as the Xiamen Wireless Image Transmission System.
Ward Security has been appointed as the security provider for British Arab Commercial Bank following a competitive tender process. The appointment will see the team manage the security at BACB’s Mansion House premises in London, supplying both concierge and security guarding personnel. The British Arab Commercial Bank is a UK regulated bank that has operated for more than 40 years with an expertise in international finance and a focus on helping companies to develop and grow trade in new markets with confidence. Kevin Ward, Managing Director of Ward Security said, “We are delighted to have been awarded such a prestigious contract by the bank. We believe our philosophy of providing people who are both professional and dedicated to delivering high quality standards closely matches the principles of the bank. All our clients need bespoke solutions that consider the key security needs both today and, in the future, and our tender clearly communicated that to the bank. We look forward to working with them.”A key speciality of Wards Security is the provision of search and guard dogs Dog Guarding Projects Steve Cook, Director of Facilities at British Arab Commercial Bank said, “We have been impressed with the high standards and accreditations that Ward Security work to and maintain but mostly this company is clearly very passionate about what they do." "Not only have they identified efficiencies and new ways to work they have delivered a proposal to us with fresh enthusiasm. The team at Ward Security are already integrating well into our team and we are pleased with the appointment of them as our new security provider.” From its headquarters in London Ward Security provides a full range of security services to high profile companies nationwide and it has regional offices covering Kent, The Midlands and South East England regions employing a team of over 900 security personnel. A key speciality of the company is the provision of search and guard dogs. It works closely with the City of London Police and both Bromley and Bexley Borough Councils on a number of specialist dog guarding projects.