Security services are demanded by all sorts of businesses and events. Being that Los Angeles is the entertainment capital of the world and a favorite destination for entrepreneurship at all scales, it’s also listed as one of the cities in the USA with the highest crime rates. For this reason, security companies in Los Angeles have an increasing demand, which Hillquest Security has supplied since 2016. Hillquest Security serves individual and commercial clients with more than 10 different...
Trackforce, the security workforce management platform, announces the appointment of Christophe Kloussing as Vice President of Sales for North America. Kloussing brings 20 years of experience in senior positions in the U. S. and Europe to his new leadership of all Trackforce North America sales initiatives. He intends to identify and develop new business opportunities, implement fresh strategies for customer retention and growth, and uphold the company’s current position as market leader....
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple color and infrared cameras that can detect facial features and confirm an identity. Real-time 3-D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a r...
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 Security Technologies for Security and Public Safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highligh...
ASIS International, the association of security management professionals, released the ASIS Private Security Officer Selection and Training (PSO) Guideline (ASIS PSO-2019) which provides recommendations for establishing and managing a program for the selection and training of private security officers. The new Guideline is critical as the private security industry employs millions of security officers across the nation to protect people, property, information, and other key assets. Applic...
It’s the first quarter of a New Year and businesses are already busy reviewing budgets for ways to save money. One line item that can impact business the most – loss. Employee theft alone is a crime that costs U.S. businesses $50 billion annually*, according to Statistic Brain. So if you aren’t sure who is keeping watch over your property and assets, and how they reduce preventable loss, it might be time for a security audit. According to GuardOne, the security patrol and remo...
Live Earth, an advanced data visualization platform for directing and monitoring complex business and security operations, has partnered with HERE, the Open Location Platform that provides advanced location intelligence, to improve operations and safety measures across indoor venues. Through this partnership, organizations will be able to integrate HERE Venue’s detailed floor plans with a variety of assets that include sensors, door access controls and security cameras. The ability to marry detailed maps and monitoring tools with the Live Earth platform will provide venues and building owners the ability to track resources throughout the premises with far greater accuracy than was previously available. Enhancing Safety Measures For organizations Live Earth and HERE Venue’s integrated system improves outdated surveillance and security systems by providing precise venue mapping“GIS technology has evolved and with the addition of HERE Venues, Live Earth’s platform capabilities now reach the indoors,” explained Craig Johnston, Live Earth’s VP of business development. “HERE Venue’s indoor mapping solution will add a critical layer to Live Earth’s visualization platform, improving safety measures and monitoring for organizations.” Traditionally, venues have relied on surveillance footage and timestamps to monitor facilities. Live Earth and HERE Venue’s integrated system improves outdated surveillance and security systems by providing precise venue mapping layered with data that can be monitored within the context of a larger building. If unauthorized access should arise, for example, security personnel can immediately pinpoint an exact location and map the quickest way to address the threat. The combined technology enables faster response times during critical situations when every second counts. Improving Building Efficiency The integration offers building managers and maintenance teams the opportunity to improve building efficiency“It’s one thing to drop a pin in a map and call it a security camera. It’s quite another to drop that pin, then have the ability to access the asset that pin represents, understand its data and understand the context of what’s going in and around that pin’s space,” Jim Leflar, manager, Venues Marketplace at HERE said. “This is where HERE and Live Earth’s collaboration offers a powerful use case to customers and building owners.” In addition to security and public safety, the integration offers building managers and maintenance teams the opportunity to improve building efficiency. Building managers can set up alerts to a host of data including asset maintenance, grounds keeping, vandalism, Direct Digital Controls and fire alarms. The combined insight provided by Live Earth and HERE has the potential to reduce overall maintenance costs as well as protect valuable investments in the property.
Allied Universal is proud to recognize security officers during the fourth annual National Security Officer Appreciation Week, September 16 – 22, 2018. “National Security Officer Appreciation Week honours the incredible efforts of our nation’s security officers to create safer and more secure environments,” says Steve Jones, CEO, Allied Universal. “The appreciation week is also an opportunity to profile the many roles security officers fill; debunk misconceptions and stereotypes; and raise awareness of the career opportunities that exist within the security services industry.” Security professionals are hard-working, highly trained men and women who are our protectors, guardians and first responders. These individuals deter crime, lead evacuations, provide information, work closely with local law enforcement and are constantly vigilant in their efforts to keep us safe. This annual event is featured in Chase’s Calendar of Events. Join in the celebration on social media using #ThankYouSecurity in your posts.
AMAG Technology announces the release of Symmetry Control Room. Control Room provides a single operational window for situational awareness and managing video, alarms and events. It will integrate with AMAG’s entire Symmetry portfolio, which includes video, visitor, identity, incident management, intrusion and access control, as well as best-of-breed manufacturers that are part of the Symmetry Preferred Partner Program. Monitoring Symmetry’s platforms through Control Room delivers real-time intelligence for better decision making, more efficient operations and quicker responses to incidents. Custom Graphic Interface For Efficient Navigation Control Room comes standard with a powerful graphics engine enabling users to create a custom graphic interface for clear and efficient navigation “In the past three years, AMAG has released video, visitor, identity and incident management platforms. Control Room brings all these solutions into one operational window for optimal efficiency and total situational awareness,” said Jason Schimpf, VP of Product & Partner Programs, AMAG Technology. Control Room comes standard with a powerful graphics engine enabling users to create a custom graphic interface for clear and efficient navigation. Its advanced mapping capabilities support the most popular graphic formats (PNG, JPG, WMF) as well as direct support for Autocad files (DWG or DXF), providing users with flexibility and total graphical freedom. Users can respond to events in real-time using dynamic, multi-layer vector-based maps to better visualise a unified security environment. Control Room integrates with OpenStreetMaps for easy geolocation of events and navigation of all sites. Users can use geo-coordinates to dynamically place and find objects (cameras, card readers, transport vehicles, guards, etc.). From the map, users can view alarms, unlock doors and track events or activity by map location.
CheckPoint Tours is the latest service from the Connect ONE by Connected Technologies cloud-hosted integrated security management platform that bundles Intrusion, Access Control, Video Surveillance, Energy Management and Critical Environmental Monitoring in one single user interface. ScanPass Mobile Credential CheckPoint Tours tracks and documents activities and tasks required at the protected premises. It works with conventional access control readers or ScanPass Mobile Credential to track activities by guards or other personnel required to perform tasks at specific times and locations. As the user scans/swipes each checkpoint their access is logged and can be reviewed. Multiple checkpoints can be added economically by using only ScanPass barcode stickers in place of card readers and additional hardware. CheckPoint Tours is another valuable service that provides real-time recordkeeping that security guards have completed their rounds or employees have performed required routines.
Allied Universal, a facility services company and a security force provider in North America, has announced that Catherine King, Senior Vice President, Recruiting and Staffing, is a featured speaker at a Capitol Hill briefing on employment needs of unemployed older Americans on Friday, January 19 from 1:30 to 2:30 p.m. EST at the U.S. Capitol Visitor Center, Room SVC-203-02. The briefing will provide an introduction to the U.S. Department of Labor’s Senior Community Service Employment Program (SCSEP). “Older Americans, who represent a growing part of the U.S. labor force, struggle to find jobs after becoming unemployed,” says Catherine King. “I am proud that Allied Universal is working with SCSEP to help older adults find jobs and increase their economic self-sufficiency. We benefit from the skills, talents, and experiences of program participants we have hired thus far and look forward to bringing on more.” Opportunities For 11,000 Seniors In 2017, the company hired nearly 11,000 seniors as security professionals and in administrative roles. That’s over 7 percent of Allied Universal’s workforce, and it’s growing. Last year, the company also launched its Partners in Employment Community-Based Organization Program (PIE CBO) to help recruit older adults. Organizations that refer seniors can earn a referral payment of $400 per candidate hired. “We network with a number or groups like AARP to reach this population,” King continued. “They are attractive workers because of their high work ethic and dependability. They are the children of ‘the greatest generation.’” The SCSEP briefing will explore factors driving the conversation for employing older workers, such as an increase in life expectancy and workers prolonging retirement. Hosted by U.S. Senator Patty Murray, the other speakers include Kelly S. Mikelson, Ph.D., Research Associate, Urban Institute, who authored the white paper The Role of SCSEP in Workforce Training for Low-Income Older Workers; Sharron Holquin, a former SCSEP participant who will share how she turned her work-based training into a full-time job; and Joseph McCarley, Project Director, TERRIFIC, Inc., who will discuss his organization’s experience in hosting SCSEP participants.
Western Digital Corp., a global data storage technology and solutions provider, introduced its newest and highest performing industrial- grade and automotive-grade card solutions to date. Newly enhanced SanDisk Industrial and SanDisk Automotive card storage solutions provide superior endurance and reliability for commercial surveillance, intensive “Industrial Internet of Things” (IIoT) applications and “connected automotive” applications under extreme ambient temperatures. With up to quadruple the read speed and more than twice the write speed of the company’s previous generation cards1, they enable OEMs to push the boundaries of applications – from supporting “smart” surveillance systems with fast in-camera analytics, to improving high-definition video capture in surveying commercial drones and automotive dash cameras, to enhancing the responsiveness of automotive 3D mapping navigation systems. SanDisk Industrial SD and microSD Cards New SanDisk Industrial SD and microSD cards, and SanDisk Industrial Extended Temperature SD cards (for trusted performance under extreme temperature conditions of -40oC to 85oC) are built with the high endurance and reliability that is paramount in the industrial and commercial industries, enabling them to consistently manage the challenging workloads of IIoT, commercial surveillance, medical and other intensive “connected” applications over extended periods of time. SanDisk Automotive SD Card New, higher performance SanDisk Automotive SD cards are built to meet the rigorous reliability, quality and temperature demands of the automotive market. Compliant with the automotive AEC-Q100 Grade 3 standard (operating in ambient temperatures of -40oC to 85oC), it enables OEMs to bring intelligent, high-capacity and fast data storage to a wide array of advanced, in-vehicle applications and systems, including navigation mapping systems, data event recorders, infotainment systems and more. Highlights And Features Performance - Delivers sequential reads speeds of up to 80 MBs and sequential write speeds of up to 50 MBs.2 High Capacity - SanDisk Automotive SD cards, SanDisk Industrial SD cards and SanDisk Industrial Extended Temperature SD cards are offered in capacities up to 64GB. SanDisk Industrial is also available in a microSD form factor in a range of capacities, including a new, high-capacity 128GB card. Expanded Intelligent Features for OEMs - The new cards include an enhanced Health Status Monitor with expanded reporting capabilities to enable manufacturers to remotely monitor usage of the card and identify when card upgrades or replacements are needed. An automatic “Read Refresh” feature optimizes the card for compliance with strict OEM data retention specifications. Other intelligent features include OEM customization capabilities, enhanced power protection and “host lock” to help ensure security if the card is removed. Availability - New SanDisk Industrial SD and microSD cards, and SanDisk Automotive SD cards are now sampling to OEMs worldwide. These new SD and microSD cards are part of the company’s suites of industrial-grade and automotive-grade solutions optimized to address the vast data generated at the “edge” by connected commercial and automotive applications. Critical Part Of IoT Systems “The skyrocketing volume of data and the increased need for fast responsiveness for in-device analytics and other real-time event processing has made trusted storage at the “edge” a critical part of IoT systems. Leveraging our vertical integration, we built our newest SanDisk-brand industrial and automotive cards from the ground-up for the intensive demands of IIoT and “connected” automotive applications. These robust, high endurance cards offer up to quadruple the performance of our previous generation cards and an outstanding feature set. In addition, we have expanded our portfolio to include a new 128GB SanDisk Industrial microSD card that provides the capacity that is imperative for capturing advanced video and supporting data-heavy connected applications over extended periods”, said Christopher Bergey, Vice President of embedded and integrated solutions, Western Digital. “The enhanced endurance of SanDisk Industrial microSD cards allow our customers to develop products that capture and store high definition video over long periods of time under a variety of challenging environmental conditions”, said Chan Lee, Vice President of engineering at Ambarella, Inc.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing An Effective Action Plan When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilizing doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organize a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing Public Areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install Guard Booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
The basic principles of access control are well established: only authorized people should have access to secure areas, only at times that can be defined in advance, and only within a system that can identify exactly who went where, and when. Traditional mechanical lock-and-key systems cannot accomplish this — at least, not without loading a huge admin burden onto security staff. But modern, electronic wireless access control has the flexibility to achieve it. What criteria determine the right sort of access control for your organization? It makes sense to assess what is desirable against what is affordable or available in the electronic access control market today. Asking yourself these 5 questions will lead to a wise investment in the right technology: Wireless locks like Aperio work seamlessly with existing systems from over 100 different access control providersDo you want to extend your existing system, or begin from scratch? You are not stuck with locks chosen by a previous management team. Security needs change. Wireless locks like Aperio, for example, work seamlessly with existing systems from over 100 different access control providers, integrated online or offline. You will save time and money extending your current system with a technology like Aperio and users can continue with their existing credentials. Going forward, it makes sense to choose locks built using open architecture, for added flexibility and to future-proof your next investment. Who are the site users and what kind of credentials suit their needs? In many industries, access to premises is required by permanent staff and short-term contractors: your access system needs to be flexible. Different systems offer credentials stored on cards and fobs, or on programmable, battery-powered keys. For example, the new Openow app for SMARTair wireless locking converts a user’s smartphone into a virtual key. You issue and revoke user keys using the intuitive software, an efficient, flexible mobile management solution. What is the structure of the site (or sites) you protect? You will need different locks for high-traffic and low-traffic doors, indoor and outdoor use. Almost everywhere, wireless locks are much easier to install and to maintain than traditional wired magnetic locks — and more cost-effective to run. Certified wireless security locks provide extra protection for sensitive areas needing stringent standards. If you have a mobile workforce or manage dispersed sites, consider the credential management practicalities. For example, programmable keys that are easy to update with a Bluetooth-enabled smartphone app — like ASSA ABLOY’s CLIQ Connect solution — will save your staff time and money. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions Do you want to secure more than just doors? Some wireless systems have locks for cabinets, machines, windows and even server racks (handy if you want an extra layer of control over co-located servers). There will be workflow advantages in monitoring these ‘non-doors’ — medicine stores, for example, or car parks or lifts — from the same admin interface as your doors. Site users will appreciate the convenience of carrying one credential for every access need. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions. For example, CLIQ mechatronic padlocks are currently deployed outdoors at utility sites in Scandinavia and supermarkets in East Africa. Do you need real-time capabilities? Choose an Online system and you can manage and amend access control doors at any time and from anywhere, using the admin software. You can monitor sensitive areas like medicine stores remotely and in real time, and can revoke access rights if a user credential gets lost. In an emergency, remote locking or unlocking of an entrance could be critical. Aperio wireless locks, for example, are integrated with online electronic access and real-time monitoring systems in hospitals, manufacturing plants and student halls of residence. With some systems, including SMARTair, you can combine ‘Update on Card’ and Online updating for different doors within the same installation. The CLIQ Connect app and programmable keys make real-time control over remote sites or teams possible. Wireless access control offers a compelling mix of audit compliance, easy installation, cost efficiency, and seamless integration. It makes life easier for security managers, and is deployed in premises as diverse as power plants and co-working spaces; museums and care homes; banks, schools and skyscrapers.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimize the death toll)? In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective are they at the end of the day? The sad answer – even after dozens of school shootings and even in the wrenching aftermath of the latest one – is that we don’t know. There is a gaping lack of knowledge and research when it comes to measuring the effectiveness of preventative measures as they relate to school shootings. Scarce Resources For Preventative Measures The dearth of knowledge on the subject leaves schools at risk of spending scarce resources on measures that don’t have any real impact, or worse, that have a negative effect on education environments. The natural impulse following a school shooting is to do something – anything – to prevent the tragedy from happening again at any school, but especially at my school. But how is money best spent?Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything Congress has passed the Stop School Violence Act of 2018 to provide $50 million per year to develop programs to train students, teachers and law enforcement to prevent violence, and to create anonymous reporting systems, such as hot lines, for school violence threats. The bill authorizes another $25 million for improvements to school’s physical security infrastructures. Congress also provides $1.1 billion in Title IV block grants, which districts can use to pay for diverse needs such as security systems. Several states are providing additional funding for physical safety measures and campus police, and local districts are also stretching their budgets to address security concerns. But is that money being targeted to measures that will help the situation? What is the role of technology in preventing school violence, and are we as an industry at risk of over-selling our preventative capabilities and diverting money from other measures that might have more impact? Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything. More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process Studies On School Safety And Protection Researchers, advocates and educators gathered this fall at American University to consider the need for better research to inform decision-making on safety, reported Education Week.The field is in desperate need of more evidence on what works, and schools want this information presented to them" A 2016 study by the Rand Corp. points to the problem: Lack of data and research on what works and what doesn’t. “Despite growth in the school safety-technology sector, rigorous research about the effectiveness of these technologies is virtually non-existent,” according to Rand. “The field is in desperate need of more evidence on what works, and schools want this information presented to them in vetted, digestible ways to help them with procurement.” Jeremy Finn, a professor of education at the University of Buffalo, has pointed out the difficulty of assessing the effectiveness of measures designed to deter events that likely won’t occur anyway. “How do you know when you have deterred a school shooting?” he asks. “It didn’t happen.” The Effects On Our Students Might technologies aimed at making schools more secure have an adverse effect on the learning environment? More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process. The physical security industry should freely acknowledge that the technologies we offer are only part of the solution to school violence Do security measures aimed at preventing active shooting incidents absorb resources that might better be used to address a more general and/or likely security threat such as vandalism or student discipline? Theoretically, security measures in general should help to prevent the probability of an active shooter at the same time they are addressing a wider range of concerns and threats. But do they? At the very least, we in the physical security market should be aware, and should freely acknowledge, that the technologies we offer are only part of the solution to school violence. Schools should take the broadest possible approach to the range of security challenges, and technology should be one tool among many. Furthermore, better data to measure what works is sorely needed to illuminate the best path forward.
“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual Devices And Controls In effect, a security guard wearing a HoloLens headset can approach a door in his facility and see the real-time status of that door, provided by an access control system, projected as a hologram alongside his live view of the door. It’s the first implementation of a technology with many possibilities. Related to video surveillance, real-time facial recognition could provide the identity of a person walking past a security officer in a hallway, for example. Basically, the approach extends the interfaces and capabilities available in a control room to a security officer on patrol. The officer can place and interact with a variety of virtual devices and controls as holograms in the 3-D space he or she views through the headset. Augmented Reality For Integrated Electronic Security The security industry technology has been developed by CodeLynx, a software engineering and systems integration company headquartered in North Charleston, S.C. As a systems integrator, CodeLynx specialises in audio-visual and physical security design and installation for A/V, access control and video surveillance systems. A complementary business is software engineering; Darren Cumbie, Director of the Software Engineering Division, and his team provide custom integrations of various technologies. The approach extends the interfaces and capabilities available in a control room toa security officer on patrol CodeLynx has developed software to adapt Microsoft’s HoloLens product for use in the physical security field. They are bringing it to market as ARIES (Augmented Reality for Integrated Electronic Security). The software operates using Microsoft’s HoloLens, introduced in 2016, a powerful, self-contained holographic computer worn as a headset. Specialized components enable holographic computing in lockstep with advanced sensors, including five cameras. Users can move freely throughout an environment and interact with holograms that augment the reality they view through the HoloLens. Cumbie says HoloLens provides the best mixed reality headset currently available: “Nothing else has the power, usability and scalability across an organization.” AMAG Symmetry Access Control Integration In ARIES, CodeLynx has created a certified integration with AMAG’s Symmetry access control system to enable operators to view information from Symmetry as holograms in their field of view through the HoloLens. The integration extends the functioning of Symmetry to operators in the field, thus expanding the control room environment. Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry. Approaching a door, an operator can request a list of the last five people who came through the door, for example; he or she can see a photo ID related to each person who swipes through a turnstile. CodeLynx is looking to expand the market for ARIES using integrations with other OEMs in addition to AMAG. “Instead of being chained to their desk looking at monitors or a display wall, operators can work in the field using the full functionality of their systems as they walk throughout the property,” says Drew Weston, CodeLynx Director of Sales and Marketing. “Meanwhile, I am not sitting at a desk, I am out in public.” Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry At some point, the headsets will likely get lighter and more ergonomically appealing. Right now, all the computing power is inside the headset (which, even so, only weighs only 1.3 lbs). In the future, more of that computing will likely be “offloaded” to a nearby desktop or laptop computer, or even to the cloud, and wirelessly “tethered” to the headset. In addition to making the headsets lighter and more ergonomically appealing, tethering would bring down costs from the current $5,000 per headset (possibly into the “three digit” range). CodeLynx is poised to leverage any Microsoft enhancements to the HoloLens environment. Currently the software is priced at $1,500 per user. Benefits For Systems Integrators For systems integrators, ARIES could be used to simplify installations, given its ability to view camera frames through the headset hands-free rather than needing to view a separate laptop when focusing or positioning a camera. For maintenance or troubleshooting, an operations center could access the field user’s view and direct him or her to correct a problem. In this way it would be a training tool to help integrators, which is a separate value proposition from how the devices may be deployed by end users. The ARIES approach could also eventually change how we think of a control room. Instead of video screens and walls, operators might sit in comfortable chairs in rooms with white walls, viewing all the control room “screens” through their headsets as holograms. Less power consumption would be among the benefits. ARIES plans to offer a “virtual operations center” in 2018, enabling command center operation from anywhere, user-customizable layout views and the ability to push content to specific HoloLens users. This video demonstrates how interaction with holograms can drive security functions: https://www.youtube.com/watch?v=B82oAlxt5_s
I have been unpacking from last week’s ASIS show in Orlando. It was a good show, except if you compare it to last spring’s ISC West in Las Vegas, which was especially well attended and generated a lot of excitement in the market. ASIS was definitely smaller, lower key and less crowded. And there were no big product announcements. But there was still plenty of technology on display. In particular, I saw the show reflecting several ongoing trends in the market. Impact Of M&As Mergers and acquisitions have been big news in the security market for the last year or two, and there was evidence at ASIS of how M&As are changing the market. For example, Axis Communications, now owned by Japanese giant Canon, is taking over the marketing of Canon’s small (by comparison) selection of video surveillance equipment. Thus ends (quietly) one of the big questions in the market: Why would a company like Canon want to compete against itself? Even more reflective of the changing Canon/Axis world is a new 20-megapixel camera highlighted at ASIS. It was developed through cooperation by the two companies, with Canon providing the lenses and Axis providing the rest of the camera, including image processing. It’s being positioned as an opportunity to combine the best capabilities of both companies. Mergers and acquisitions have been big news in the security market for the last year or two, and there was evidence at ASIS M&As changing the market Vanderbilt is expanding its cloud and video management offerings – in addition to access control – with acquisition of Access Control Technology (ACT) in Dublin. A company built on acquisitions, Vanderbilt will be looking to unify their product offerings in coming months – combining technologies from various acquisitions into a unified whole. It’s been a big year for FLIR, which has swallowed up DVTEL and now offers a complete range of video surveillance products. Reaching way beyond FLIR’s historic presence as a thermal imaging company, the new FLIR is looking to educate the market about its versatility. Meeting End User Demands End users demand more integrated systems, and you heard it repeatedly at ASIS. For example, Tyco Security Products says their products are now more connected, reflecting further deterioration of the silos that used to exist. More effective user interfaces are getting attention. One I saw at ASIS was by Honeywell’s Connected Buildings business. A big screen at their booth showed a map with multiple locations in an enterprise; clicking on a location brings up a schematic showing where cameras are located. If you click on a camera icon, you see video from that camera. They also previewed a smart phone app that runs off the same database, which can be used by guards working in the field. Bosch also has a neat integration of their access control, intrusion and video systems, all tied together using their intrusion system to provide intuitive controls. Ameristar, an ASSA ABLOY subsidiary, offers Perimeter InSite software, providing a virtual view of any perimeter security construction project as it is planned and built – stage by stage – with no surprises. Mobile Credentialing, Wireless Locks A leader in mobile credentialing, HID Global is emphasising how the technologies are being implemented in the market – more customer references and case studies are paving the way for broader adoption. Other companies are also onboard with mobile credentialing, including Brivo and Lenel. A leader in mobile credentialing, HID Global is emphasising how the technologies are being implemented in the market Wireless is continuing to evolve. Stanley Security offers the WiQ wireless product line, emphasising that installation of wireless locks is half the cost of wired, but there are downsides (such as slight access delays) compared to wired. Allegion continues to expand its Engage wireless portfolio, too. Paxton Access, a British company, has restructured and is investing in the U.S. market. Their Paxton BLU cloud-based access control system uses Amazon web services and is an opportunity for dealer/integrators to earn more recurring monthly revenue (RMR) Security In The Headlines Violence in the headlines often screams out for security solutions, and there were some at ASIS. Stanley highlighted its Shelter product that enables a wireless lockdown in an active shooter situation in the education environment. It solves a high-profile challenge, but Stanley emphasises that it’s just part of a broader school security program – that’s what’s really needed. A different approach on the active shooter scenario is offered by risk assessment and consultancy company Control Risks, which offers active shooter education programmes for enterprises, including an e-learning module to teach employees how to react in an active shooter situation. New Video Capabilities Video grabbed attention at ASIS. As Hikvision and Dahua continue their energetic push into the U.S. markets, they were among the largest (and most crowded) booths. Several companies – including Bosch and Tyco -- are adding video analytics to their cameras at the factory. Vicon previewed its new Valerus VMS system, based on ONVIF protocols and totally compatible with their legacy ViconNet VMS. They see open systems as a strong selling point, but they will also continue selling hardware and “total systems.” "Suspect search" can search video to deliver additional examples of video involving a subject that has been identified by a single frame “Suspect search” is a new feature showing up on video surveillance systems. The feature can search captured video from throughout a system to deliver additional examples of video involving a subject that has been identified by a single frame of video – find the girl in the blue dress, or the man wearing a red shirt. Searching a whole system, rather than a single camera feed, expands an operator’s ability to investigate an incident. Avigilon introduced its version, called “Appearance Search” at ASIS, and Qognify also highlighted its version, called “Suspect Search,” which I first saw at IFSEC. I notice Exacq also has a flavor of this, and I am sure there are others. Perimeter Security Evolving Perimeter security is changing. Long considered a “low-tech” wing of the security market, there is a lot going on in the area of perimeter security. Visiting a couple of booths at ASIS opened my eyes. For example, Senstar has every kind of sensor, and their Tungsten product is a security appliance that offers cyber-security at the edge of the network, tying together the sensors and other devices. Protech offers solar-powered wireless sensors that don’t require trenching, another money-saver (more to come about them).
The client is a prestigious purpose-built skin, laser and cosmetic surgery clinic based in central Birmingham. In 2018, they relocated to a Georgian building following an expansion of the practice to welcome new professional associates and provide a greater range of patient services. Their upgraded and refurbished building includes a larger operating room with dedicated recovery areas, treatments rooms, consultation rooms and waiting areas. At this clinic, plastic, reconstructive and aesthetic experts carry out surgical and non-surgical procedures for the face and body as well as cosmetic dentistry, IV nutritional therapy and advanced spa treatments. IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham As well as a team of renowned doctors and practitioners and their administration team, the new premise is also accessed by numerous patients and their families visiting the clinic for pre-treatment and post-treatment consultations, as well as for the procedures themselves. Access Control And Intruder Detection System In their new premises, the practice required an access control and intruder detection system that delivered: Hassle-free access for staff with various levels of authority, from surgeons to administrators, for e.g. restricted access to consultation/treatment rooms and post-procedure recovery areas Limited access to patient information, drugs, high value surgical equipment and other high-risk assets Simple and reliable off-site management by permitted personnel, at any time and via their own computer, tablet or smartphone A secure yet serene and private experience for patients and visitors, for e.g. easy entry and exit for visitors to/from the main reception area Safety Of Staff And Visitors IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham. With nearly 100 years of combined experience installing security systems, the IGNIS team delivers on its reputation for quality of service, knowledge, reliability and honesty. An integrated system gives the client reassurance, simplicity and ease of use IGNIS works with integrated access control and intruder detection manufacturer Inner Range to deliver a cost effective, reliable service every time, with safety of staff, customers and visitors of paramount importance. Inner Range provided Inception, the core access control and intruder detection system used by IGNIS Fire Protection Services on this site. Inception was the perfect choice for this customer because it hangs off the same infrastructure with a single user interface. An integrated system gives the client reassurance, simplicity and ease of use. Offers Smart Building Management A pioneer of integrated access control and intruder detection systems, Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award-winning integrated security systems offer smart building management at local, national and global levels. Inception is Inner Range’s powerful yet affordable access control and intruder detection system, now featuring a range of extra reporting functions, anti-pass back protocols and interlocking doors. The system provides this dynamic clinic with the integrated access control they need to run their business with the utmost efficiency, safety and security. Key Features Available With Inception: A web-based interface that can be controlled by authorized staff using existing smartphones, tablets or computers Various entry points starting at 2 or 4 doors and 16 users and can be expanded if required up to 32 doors and 512 users Universal inputs and outputs that can be used independently of each other, to directly control door locks and powered sirens modules Secured alarm communication is using 128Bit AES encryption to ensure data privacy Interactive Commissioning Checklist IGNIS installed the Inception system using its interactive Commissioning Checklist that ensures no steps are missedIGNIS installed the Inception system using its industry-first interactive Commissioning Checklist that ensures no steps are missed. That process includes core programming, custom automation, changing default credentials, backing up the database and downloading commissioning reports. Inception’s wireless adaptability not only gives users flexibility, it means technicians don’t need to find an IP address or connect to the user’s local network. They can also use an adaptor as a service tool to perform maintenance on site. Benefits For Client: Peace of mind – 24/7/365 access and intruder detection solutions to keep patients, staff, visitors and assets safe and secure Convenience – the system can be controlled at all times via any mobile device No forgotten codes to interrupt the sensitive day to day running of the business or cause issues out of hours Value for money - no costly additional hardware and no need for a set on-site administrator or security guard Easy access and security means reception and support staff can focus on other responsibilities such as patient care
Three leading Australian universities are introducing SafeZone technology from CriticalArc in a drive to improve safety, increase their security teams’ capabilities and provide better care for students and staff. With 30% of Australian universities now using SafeZone, this latest wave of roll-outs confirms CriticalArc’s position as the most comprehensive safety and security management solution provider in the Australian market. Adding to CriticalArc’s growing network of customers, the University of Tasmania (UTAS), the University of Southern Queensland (USQ) and the University of the Sunshine Coast (USC) have more than 75,000 students and staff working in 33 campuses and associated facilities across four States, meaning that SafeZone now serves the needs of 1.5 million students and staff at more than 500 locations across the world. Ensuring Best Safety Standards SafeZone is a key tool in enabling campus security to be more effective, more relevant and more approachable"“UTAS, USQ and USC each have their own unique character and particular priorities but ensuring the best standards of care for students and staff is top of the list for all of them,” says Robert Christie, CriticalArc’s Customer Success Manager, Asia Pacific. “Preventing crime, managing public safety and handling emergencies are still the top concerns of university security teams, yet SafeZone is also enabling those teams do much more to address issues that are increasingly important. "From improving support around mental well-being to tackling sexual harassment and making campuses inclusive environments where everyone can feel safe and welcome, security and response teams are playing a much bigger role than they traditionally did. SafeZone is a key tool in enabling campus security to be more effective, more relevant and more approachable.” Notifications In The Event Of Emergencies SafeZone puts individuals directly in touch with response teams at universities, hospitals, government departments and similar large organizations, making it easy for them to use their mobile phones to request help, trigger an emergency response, receive rapid notifications in the event of emergencies and benefit from a wide range of customer-care services. With the ability to ‘geo-fence’ any location, each of the universities’ security teams can now monitor care and safety of users wherever they areThe technology also lets students and staff share their situation with response team members by checking-in when working alone outside hours or in higher-risk environments such as laboratories and workshops. With the ability to ‘geo-fence’ any location, each of the universities’ security teams can now monitor care and safety of users wherever they are – including those working out-of-hours on campus, those traveling between campuses locally or on field projects, or traveling overseas for study or research placements. Precise Location Of Vulnerable Individuals With its global reach combined with its ability to precisely locate vulnerable individuals, SafeZone is helping universities around the world to better meet their duty of care obligations, says Darren Chalmers-Stevens, CriticalArc, Managing Director. “SafeZone offers all the functions that university teams want, in one easy package. It is not only helping them to deliver better care, it is letting them demonstrate this fact in an accountable way.”
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorized access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling Access Areas Within Hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single Access Card System Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilizing a single accesscard system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilizing a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the center of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-Down System Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional license feature. Streamlined Parking Processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being rechargedThe program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilizing another Gallagher license feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
It took six years to remodel the interior of the ‘Palace of Culture’, a monument to socialism built in the 1960s under East German communist rule. Now Bosch is contributing intelligent solutions to make sure that visitors feel safe there, without detracting from its historic charm. It takes the right setting for culture to flourish. Various things are essential: an ambiance in which visitors feel at ease, excellent acoustics, and flawless organization. Now that the Palace of Culture has been completely renovated to ensure all of this, the city of Dresden boasts a new, modern venue for promoting the arts. Sophisticated Security Solutions The main auditorium seats 1,700 people, and the building as a whole can accommodate up to 2,800 A completely new, state-of-the-art auditorium is the heart of the building. It meets international standards with its striking architecture and top-notch acoustics, providing ideal conditions for the Dresden Philharmonic Orchestra and all kinds of other musicians to give concerts. There is also a new municipal library branch, emphasizing the Palace of Culture’s new, open character. Spacious lobbies containing a restaurant and ticket sales link all of the facilities and rooms with one another. Many of the events held here in central Dresden are sold out. The main auditorium seats 1,700 people, and the building as a whole can accommodate up to 2,800. Crowds like these call for sophisticated security solutions that can be smoothly integrated into the overall design. Cleverly Integrated Components “We wanted a cost-effective overall solution that would do justice to the Palace of Culture and its unique architecture,” says Steffen Meyer, the building’s manager. “We published an invitation to bid for the project and of all the applications we received, Bosch convinced us that they were right for the job.” The building experts from Bosch implemented a customized solution for the Palace of Culture with a host of cleverly integrated components for fire protection, evacuation, access control, video surveillance and building management. The result is a harmonious overall system that meets the entire range of security needs. “As a public facility where people gather, we have to comply with very strict fire protection rules,” explains Meyer. Invisible Smoke Detectors “We also had to meet some special requirements.” Since the Palace of Culture has protected status as a historic landmark, the appearance of the walls, ceilings and floors may not be noticeably altered. Security staff can also tell whether anyone is still in the building, an important piece of information in case it is ever necessary to evacuate it Now virtually invisible smoke detectors preserve the ambiance of the concert hall. Special calculations were even carried out to avoid impairing its acoustics. Advanced video technology automatically counts visitors to prevent the building’s capacity from being exceeded. Security staff can also tell whether anyone is still in the building, an important piece of information in case it is ever necessary to evacuate it. Building Integration System In critical situations, special speakers powerful enough to be heard over the orchestra or even a rock concert are lowered from the ceiling to make sure that everyone hears important announcements. All of the individual components are networked via the Building Integration System from Bosch. It makes it easy for the well-trained security guards to monitor and control everything. And to ensure that everything functions reliably in the long term, experts from the Bosch center in Dresden will regularly check and service the system. Meyer stresses that “we don’t want our culture fans to run any risks.”
Unlike private sectors, the government-run offices or buildings are the places where people constantly visit for specific purposes, making these official institutions easily become a target for tempted malicious attack by people who might possess strong and negative emotions toward the governments. Despite the fact that these buildings are often guarded with more security staff with arms, it is even more than necessary to set up a solid surveillance system to proactively safeguard the public and its assets. Surveon provides government solutions with product lines including weatherproof cameras with excellent image quality, patent RAID NVRs with spare drive protection, and feature-rich VMS with post VA search. These powerful solutions enable the governments to protect people from most of the threats. Weatherproof Cameras With Smart WDR Surveon cameras secure the outer spaces of government building with IK10 vandal proof and IP66-rated weatherproof housingTo build a reliable security system for governments, SIs might encounter some challenges such as harsh outdoor conditions and data protection of recorded video. Under these circumstances, Surveon cameras secure the outer spaces of government building like parking lot with IK10 vandal proof and IP66-rated weatherproof housing, giving partners the most reliable outdoor-use option. Moreover, all of Surveon cameras provide excellent image quality with smart WDR, allowing the security guards to recognize crucial details such as license plates even under lighting contrast and prevent any suspicious vehicle from entering. Patent RAID NVR With Data Protection To avoid the loss of confidential data from surveillance system, the data protection of recorded video is particularly important in terms of planning for government security. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video loss. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video lossBesides, its client-server architecture can offer high I/O, large capacities, and overall system stability. To quickly identify useful information and relative footage from hundreds of hours of video recording, Surveon designs Post VA Search, an efficient management tool, reducing the time and efforts of management staff, making the surveillance system more efficient. Enhancing Security System Surveon government solutions have been successfully safeguarded the customs building in Bolivia, the post offices in Cairo, and the border checkpoint in Turkey. “Surveon provides the best C/P value solutions for the customs and improves its whole security system with high-reliability products. We are satisfied with the result and I’m sure we will keep choosing Surveon’s solutions in the future projects,” said VisionLine, Surveon’s major partner in Bolivia. Surveon is dedicated to offering a variety of end-to-end video surveillance solutions catering to different vertical applications, giving partners reliable options for their projects.
Property is one of the biggest targets for crime in the UK, especially open land. There are thousands of acres worth of property across the UK which aren’t effectively secured, as a result of which they have become hot-beds for crime, anti-social behavior, and not least fly-tipping. Security therefore must be a top priority for property owners, too many of whom tend to favor traditional methods such as fencing or hiring security guards. But, these methods come with a premium budget, with manned security running at a cost typically of some £300 per day. Nor is it possible to guarantee that every inch of a property is monitored. An increasingly adopted solution is Ad Hoc Property Management’s Smart Tower Security System and Smart Alarm System. Ad Hoc’s Smart Camera Security Tower sits six metres tall with a 36x optical zoom magnifying distances of up to 150 yards Ad Hoc Smart Camera Security Haringey Council contacted Ad Hoc Property Management after one of its industrial sites, Rosebery Industrial Estate in London, was repeatedly being targeted by fly-tippers over the course of many years. Every time the property was dumped with waste, it was costing the council hundreds of pounds to have their waste contractor called out to clean-up. By November 2017, they had expensed literally hundreds of thousands of pounds. By the end of the month the first Ad Hoc Smart Camera Security Tower was deployed, since then costs and incidents have plummeted. In fact, there have been no major incidents and local residents and tenants alike are delighted, welcoming the improved local environment. Ad Hoc’s Smart Camera Security Tower sits six meters tall with a 36x optical zoom magnifying distances of up to 150 yards, and a 12x digital zoom to enhance optical performance. Using state-of-the-art SMART technology (the same technology used in monitoring US Defense Center, The Pentagon), the tower boasts a 360 degree camera which can be programmed to move zones at set intervals for 24/7 monitoring. Utilizing wireless technology, the camera is able to filter large objects from those that are small, ensuring the alarm is only triggered when there is a clear threat. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK" Ad Hoc's Property Security Solutions “Open land is one of the biggest targets for waste dumping, but it doesn’t have to be. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK, preventing anti-social behavior and, more importantly, reducing opportunity for property-related crime,” said Darren Tubb, General Manager, Ad Hoc Security UK Limited. Land owners aren’t the only ones who can benefit from Ad Hoc’s security solutions; property owners of retail spaces, industrial buildings and homes who traditionally look at hiring in security guards, can benefit too, deterring fly-tipping and other anti-social crimes. As it stands, if a property is fly-tipped and no one is caught, it is the responsibility of the property owner to remove the waste legally at their own expense, which means hiring in a company licensed to remove these materials. However, as more property owners become aware of the technology available to them through Ad Hoc, not just in protecting the property but in helping police to identify the culprits, we could see property damage and fly-tipping become a thing of the past.
Round table discussion
In tidying up after a year of Expert Panel Roundtable questions and answers, we came across some previously unpublished responses from our panel. These interesting responses address some of the hottest topics in the industry, from robots and deep learning to the “race to the bottom.” Taken together, the varied comments offer their own range of insights into the evolving physical security market. This week, we highlight some of these assorted Expert Panellist comments submitted over the last several months.
Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?
As the new school term begins, awareness of security at all levels of educational institutions is higher than ever. Technology plays an important role in protecting educational facilities and their students, faculty, staff and visitors. Specific security challenges drive which technologies and other measures are used, and those challenges are evolving, along with the dynamic institutions security is tasked with protecting. We asked this week’s Expert Panel Roundtable: What are the security challenges for schools and colleges?