At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan....
DICE Corporation is proud to announce and welcome Avi Lupo as the company’s Executive Vice President. Lupo will play a leading role in the company, contributing to high-level organizational decisions, product development and new business opportunities. He will also be integral in establishing new sales and marketing expansion strategies for the company’s growing cloud video recording technology, CloudEye. “We are very happy to have Avi on our team,” said President and CE...
Trackforce Valiant announced its acquisition of Silvertrac Software. Silvertrac - Capterra’s highest-rated security guard management software - joins forces with the recent acquisition of Valiant Solutions by Trackforce to expand its portfolio in the security guard market. With over 2,500 customers, 300,000 users and 30,000 customer sites in 45 countries, Trackforce Valiant is recognized as a workforce management solution in the physical security industry. Trackforce Valiant is an all-in-...
Avigilon Corporation, a Motorola Solutions company, announced the newest version of its video management software, Avigilon Control Center (ACC) 7.4, which incorporates artificial intelligence-powered facial recognition technology. The new “appearance alerts” capability will help commercial organizations, such as educational institutions and hospitals, accelerate response times by identifying people of interest in enterprise settings. For example, the technology can alert the securi...
The physical security industry is moving fast. Evolving risks, new technologies and business changes all converged and had a profound impact on the industry in 2019. Looking back at our top articles of the year – as measured by those that received the most “clicks” at our website – provides a decent summary of how the industry evolved this year. Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2019. In the world o...
Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A s...
Security companies provide a type of service that tends to go unnoticed except when it’s missed. Businesses, banks, stores, event organizers and VIPs are their main clients. Their demand is increasing, mostly due to the expansion that Southern California has experienced in the latest years. Small cities and towns are increasingly growing every day, mostly due to internal migration and the high prices of rent in Los Angeles County. Veteran Los Angeles security company HillQuest Security knows about this growth and the demand for services like the ones they provide. That’s why they’ve decided to expand their already wide range of services (which included more than 60 cities by 2018) to the entirety of Orange and Riverside counties. Security options for businesses HillQuest Security has started to provide security guard services in Orange County and Riverside since early 2019. What was initially a test venture that turned out to be really successful for the company became a full-service activity. Now, HillQuest has started to offer its full range of security options for businesses and individuals in those areas. Our trained, licensed expert security officers can handle any and all of your security needs" Businesses and other entities in the OC and Riverside can now hire HillQuest Security mobile patrols, bodyguards, security systems, loss prevention, and other security services for banks, construction areas, health care facilities, hotels, apartment complexes, movie sets, parking lots, schools and event venues. Security services “We provide security services that are perfectly tailored for you,” says John Bouzy, HillQuest Security owner. "Our trained, licensed expert security officers can handle any and all of your security needs. Moreover, we can do that any time of day as well." According to its website, the company is insured with a $5 million dollar policy and all officers “meet the standards set by the Bureau of Security and Investigative Services".
While Cobalt robots have been patrolling the hallways at Slack offices for some time now, the recent trip to Chicago for GSX came with some exciting news about the next phase of the company’s relationship with Slack. The company’s new integration with this industry-leading enterprise collaboration platform will help keep safety and security a priority for you and your entire office. “Slack is one of the most ubiquitous communications platforms among modern enterprises, and we see this integration as a way to bridge your digital and physical offices. The ability to communicate issues through Slack allows our Cobalt Security Service to create a more effective, productive working environment for both security and facilities management teams and the employees they serve. Real-time collaboration and issues management are key factors in mitigating risks for a more safe and secure workplace, and we’re excited to work with Slack to bring this integration to life,” said Cobalt CTO and co-founder Erik Schluntz. Safe and secure in times of emergency Accidents and threats to safety and security in a business setting can occur at a moment’s notice—with the Cobalt and Slack integration, workplaces are armed with another tool to keep employees alert, safe and secure in times of emergency. With this in mind, we’re proud to announce the launch of a new public alert integration for enterprises to identify and notify employees of safety risks as well as mitigate issues in the workplace in real-time. This integration brings all of a company’s security assets onto a real-time visibility dashboard and communication service Slack’s VP of Global Workplace and Real Estate, Deano Roberts, said, “With this new integration, security teams add the Cobalt Security Service to a shared channel within a corporate Slack workspace. Anomalies identified by Cobalt needing further analysis or review from the company populate the channel in real-time, extending the visibility of the Cobalt Dashboard into a collaborative space.” Real-time alert When Cobalt detects anything that needs escalation or further review—from an unauthorized visitor to CO emissions to a water leak—it triggers a real-time alert in a designated Slack channel. Cobalt follows all company post orders to determine which anomalies and detected events require escalation and review. If the event requires further discussion or action, companies can create new temporary channels in a workspace from the alert. Onsite security personnel can use the new channel to collaborate with each other and with the Cobalt Specialist Command Center to determine courses of action, including potential new patrol paths or public announcements and broadcasts through the robot. In the case of an emergency, such as a fire or carbon monoxide leak, security teams can activate Cobalt’s PA system and siren through the Slack integration and send Cobalt on a new patrol to monitor an evacuation. Real-time visibility dashboard This integration uniquely brings all of a company’s security assets onto a real-time visibility dashboard and communication service. Hardware, software and people — now in one place to help collaboratively monitor issues and mitigate risks onsite or remotely. This is an exciting next step on our journey, and we look forward to helping keep more company workspaces more safe and secure and furthering our mission of using robotics to be maximally helpful to the benefit of all.
The 22nd edition of inter airport Europe, the International Exhibition for airport equipment, technology, design & services, ended with a record visitor number. During the four exhibition days, a total of 14,962 trade visitors from 108 countries came to the Munich Trade Fair Centre in Germany to discover the latest trends in the airport industry and source innovative equipment and systems. This represents an 8% increase in visitor numbers compared to the previous show in 2017. With a total of 659 exhibitors from 40 countries and a net exhibition space of 33,550m2, inter airport Europe 2019 could also increase its floor space by 5.5% compared to the previous event and was therefore bigger than ever. Development of the airport industry The most important exhibitor countries after Germany were France, Great Britain, the USA, Italy, the Netherlands, China, Spain, Sweden and Austria. Of the exhibitors, 74% came to Munich from outside Germany. Event once more reflects the dynamic development of the airport industry, which is currently driven by trends" “This very successful event once more reflects the dynamic development of the airport industry, which is currently driven by trends such as the reduction of CO2 emissions, cost efficiency, enhanced passenger experience as well as digitalization and automation. Driverless vehicles, automated baggage handling, highly developed systems and zero emission ramp vehicles – all these latest developments were presented by the exhibitors at this year’s show”, says Ulika Tosner, Exhibition Director of the organizers of inter airport Europe, Mack Brooks Exhibitions. Digitalization seminar The new digitalization seminar also put a focus on these recent topics of the airport industry and was well received by the visitors of inter airport Europe 2019. Each day of the show was dedicated to a particular topic of the airport industry: Tuesday was all about airport IT and the systems and innovations for day-to-day operations. On Wednesday, the speakers discussed airport development and design and on Thursday IT developments in airside technology. On Friday, the main focus was on drones and unmanned vehicles for airport operations. High quality of trade visitors A first analysis of the exhibitor feedback shows that participating companies were extremely satisfied with the outcome of inter airport Europe 2019. A vast majority of exhibitors were able to reach their target groups and they praised the high quality of trade visitors. The new indoor demonstration area as well as the outdoor demonstration area were also popular Exhibitors also reported a large number of new business contacts and positive sales figures. Many exhibitors had presented themselves this year with even more impressive stands. They showcased an enormous variety of new products and innovative solutions, and many of these were demonstrated live at the exhibition stands. The new indoor demonstration area as well as the outdoor demonstration area were also popular with visitors and very well received. International event inter airport Europe 2019 was once again a highly international event. More than 75% of visitors traveled to Munich from abroad to visit the world’s leading airport exhibition. The most important visitor countries, besides Germany, were Italy, the United Kingdom, France, the USA, Austria, China, Russia, the Netherlands and Japan. A first analysis of the visitor survey indicated that there was an increased interest in new IT solutions for the airport of the future at this year’s show. inter airport Europe Excellence Awards During the opening ceremony on the first show day, five exhibiting companies received the inter airport Europe Excellence Awards. Award winner 2019 for the interTERMINAL category was Daifuku Airport Technologies from the United Kingdom. Daifuku was awarded for their Sym3 Operator to visualise a 3D render of the Baggage Handling System. State-of-the-art features allow users to accurately track bags. Innovative and cutting-edge technology solution brings a more responsive and reliable equipment The award in the interDATA category went to Alpha-CIM from France. They were awarded for ISAC, a stop bar & lead-on control system with fiber optic. This innovative and cutting-edge technology solution brings a more responsive and reliable equipment to airport's operators than most current basic powerline products. Linde Safety Guard, Air5 and BAGFLOW Award winner 2019 for the interRAMP category was Linde Material Handling GmbH from Germany for Linde Safety Guard. The Linde Safety Guard detects other vehicles or pedestrians before they recognize each other. VRR from the Netherlands received the award in the category interDESIGN, the inflatable Air5. The inflatable Air5, which weighs approximately 68kg (150 lbs), folds out automatically and takes shape in just 30 seconds using air pressure. The fifth award in the new category interFUTURE went to Vanderlande from the Netherlands. The BAGFLOW end-to-end baggage logistics encompasses the complete bag journey from the moment it is handed over by the passenger to the point where it is loaded on to an aircraft. The next inter airport Europe, the 23rd International Exhibition for Airport Equipment, Technology, Design & Services, will take place from 5 - 8 October 2021 at the Munich Trade Fair Centre in Germany.
CentralSquare, which holds a market position in public safety software, announced that it has entered into a partnership with Genetec Inc., the global provider of video surveillance software and a provider of technology for unified security, public safety and operations. The partnership brings together CentralSquare’s broad and unified Public Safety Enterprise and Pro suites and flagship products from Genetec, including Genetec Citigraf™ and Genetec Clearance™. Combining these two leading technologies will enable public safety agencies across North America to smartly use existing public and private video cameras to reduce the number of victims of crimes and disasters while ensuring the safety of police officers and first responders. Gunshot detection systems There are more than 30 million cameras across the United States that generate 4 billion hours of footage a week. Unfortunately, the footage from these cameras and other sensors such as gunshot detection systems is captured by various systems and is often unavailable to first responders who can use that real-time data and video to save lives. With the increase in digital evidence captured by these systems, investigations are becoming increasingly complex Further, when a citizen calls 911, the dispatcher often has to rely on the caller’s description of the incident instead of quickly pulling-up the video feed from the nearest cameras and sensors. Additionally, with the increase in digital evidence captured by these systems, investigations are becoming increasingly complex and time-consuming. These disconnects prevent first responders from quickly assessing, understanding and safely responding to life-threatening emergencies. Integrated public safety suite CentralSquare provides an integrated public safety suite that manages everything from receiving a 911 call, dispatching responders, managing the records of the incident and providing tools for corrective actions. Genetec provides a powerful software backbone that not only allows cities to manage video surveillance for hundreds to thousands of cameras, but also provides the ability to gain strategic, data-driven insights pulled from a range of critical data sources. This partnership is a first in the public safety sector and marks a critical shift away from siloed and ineffective video surveillance towards a smarter future that unifies critical, lifesaving data into a single pane of glass. Real-time data As public safety concerns such as active-shooter incidents have increased by over 30 times since 2000, and natural disasters such as wildfires have destroyed more than 8 million acres in 2018 alone, the need for powerful tools to aid rapid and meaningful response is urgent. This new partnership between CentralSquare and Genetec delivers proven technology for police officers and emergency responders so that they can make effective decisions, based on real-time data, when and where it is most needed. When a citizen calls 911, dispatchers will be able to seamlessly see what is happening at the caller’s location" “As a result of this partnership, when a citizen calls 911, dispatchers will be able to seamlessly see what is happening at the caller’s location, ensure the right type of emergency response is dispatched, improve the situational awareness and safety of the responding officer, and have an integrated video record of the incident for future investigations,” said CentralSquare CEO Simon Angove. “We’re excited to see the benefits this partnership will bring to our 5,000-plus public safety partner agencies as they respond to emergencies much more efficiently and with real-time view into a situation.” Advanced data-driven policing software “Cities today rely on disparate, often disconnected, systems and information to make critical, life-saving decisions,” said Guy Chenard, Chief Commercial Officer of Genetec. “By working closely with a leader in public safety software like CentralSquare, we are able to bring the most advanced data-driven policing software and digital evidence management systems to an even broader array of customers. "Together, we are delivering a powerful solution that will better equip our country’s police officers and first responders and ultimately make our cities safer, smarter, and more livable.” Additional information about the partnership, including product demonstrations, is available at the annual IACP Conference in Chicago, October 26-29, CentralSquare booth 3018 and Genetec booth 5218.
NSI has announced it will be exhibiting for the first time at CONSEC, taking place on 3rd October 2019 at the Radisson Edwardian Heathrow, where the NSI team will be spotlighting its Associate Consultancy Programme (ACP) – an independent referral listing. CONSEC is the Association of Security Consultant’s (ASC) annual event for security consultants and the broad spectrum of people responsible for organizational security and safety. The NSI Associate Consultancy Programme enables Consultants to utilize the NSI ACP logo once successfully completing their application for membership of the program, and signals to organizations seeking consultancy the professionalism of the Consultancy. NSI conducts, due diligence on each consultancy prior to its acceptance onto the program and thereafter annually. “For any business in the sector considering an external consultancy service, the Associate Consultancy Programme is a good starting point with participating consultancies covering a wide range of security and fire safety related services.” said Richard Jenkins, Chief Executive, NSI.
Boon Edam Inc., a global pioneer in security entrances and architectural revolving doors, announced the results of a survey regarding the risks and security threats associated with tailgating. A majority of the respondents, made up of security professionals, believe that tailgating remains a critical threat and does not seem to be abating. Risk of a breach More than 185 end users and security advisors (consultants and integrators) within the U.S. and Canada responded to eight multiple-choice questions. All respondents shared the same three questions to begin the survey about their general perspective on the risk of a breach from tailgating. Unmanned barriers that prevent tailgating” are effective methods to curtail tailgating End users and the security advisors were then posed different questions to gain more insight into their perceptions about tailgating vulnerability within a facility versus across various industries. Participants were volunteers that responded to social media ads or were in Boon Edam’s contact database. Guards and barriers Based on what participants have seen in the media the past decade, 69% of all the respondents believe that security breaches resulting from tailgating either are holding at the same levels or are increasing. End-user perception of an increasing trend was greater with more than 43% saying they thought it was increasing, while only 35% of security advisors echoed that opinion. In response to this perceived threat, a strong majority of all respondents (77%) say that “guards and barriers” and “unmanned barriers that prevent tailgating” are effective methods to curtail tailgating, but only 18% of end-user respondents indicated they were using either option. There is also a sharp divide between end users and security advisors when it comes to the impact of a tailgate breach. Physical attack on the IT environment Eight percent of end-user respondents believe the cost of violent crime or theft due to tailgating is insignificant, while none (0%) of the security advisors agree. However, 54% of end users and 72% of security advisors believe the cost of a breach would be $500,000 up to “too high to measure.” Meaning that 46% of end users see the potential cost as lower than $500,000 while only 28% of security advisors believe the same. “The risk of tailgating (or the impact) depends on the nature of the business, the type of area and the risk scenarios to be expected. Theft of company goods, valuables, unauthorized entry of press, eavesdropping for espionage or a physical attack on the IT environment,” says one respondent. Turnstiles, security doors Most end user respondents realize that their facilities are vulnerable to physical infiltrationThe survey also highlights the fact that most end user respondents realize that their facilities are vulnerable to physical infiltration. The majority (78%) are taking a reactionary stance to deal with tailgating (using an access control system, guards, cameras and video management software). At the same time, the majority (74%) fail to track tailgating, yet they believe they are vulnerable to a physical breach from tailgating (71%). Only 18% of end users say they are currently using some kind of security entrance (turnstiles, security doors), in addition to other options to physically control access into their facilities. Four percent say they are not using any security technologies at all to curtail tailgating and only 54% say they must comply with government regulations. Potential impact of tailgating The survey demonstrates that security advisors seem to grasp the potential impact of tailgating better than their end-user clients in many cases. A solid majority of security advisors say they discuss the use of security entrances with their clients, with 63% saying they discuss with them ways to mitigate the risk of tailgating and another 68% add that they discuss means to comply with industry regulations. “Our survey shows that security end users and advisors in the Americas see tailgating as a threat that is growing and more needs to be done to address it,” comments Valerie Anderson, President of Boon Edam Inc. “Also, the cost of tailgating breaches is seen as potentially very expensive to priceless -- this indicates there will be continued investments in tailgating prevention at facilities in the coming years.” Prevent physical intrusion While both end users and security advisors agree on the threat posed by tailgating this survey also demonstrates that their perceptions differ. Both end users and security advisors overall see tailgating as a serious issue and there is a high level of perceived vulnerability. A strong majority believes that what they have is not enough to prevent physical intrusion and they understand that physical barriers are the best approach (with guards when applicable). Security advisors see the potential costs of a breach as more expensive than end users – likely because of their exposure to more data concerning breaches and the impact on organizations. They may need to find a way to convince end users the cost of a breach is more expensive than perceived. A majority of security advisors understand and recommend security entrances to mitigate tailgating, but a minority of end users have invested in them even when a majority of them believe they are vulnerable. This implies there are justification and/or budget and approval hurdles to overcome. A majority of end users and security advisors are aware of industry regulations and the need to comply with them. However, a solid majority of end users use reactive, forensic strategies for addressing tailgating (alarming and responding after the fact), which may put them at additional risk of incurring hefty fines.
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be highly functional, flexible, and convenient for organizations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The Role of the Cloud The cloud has proven to be a highly functional, flexible, and convenient method for organizations to leverage as part of their strategies to protect and modernize their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalizing on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing An Effective Action Plan When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilizing doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organize a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing Public Areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install Guard Booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
The basic principles of access control are well established: only authorized people should have access to secure areas, only at times that can be defined in advance, and only within a system that can identify exactly who went where, and when. Traditional mechanical lock-and-key systems cannot accomplish this — at least, not without loading a huge admin burden onto security staff. But modern, electronic wireless access control has the flexibility to achieve it. What criteria determine the right sort of access control for your organization? It makes sense to assess what is desirable against what is affordable or available in the electronic access control market today. Asking yourself these 5 questions will lead to a wise investment in the right technology: Wireless locks like Aperio work seamlessly with existing systems from over 100 different access control providersDo you want to extend your existing system, or begin from scratch? You are not stuck with locks chosen by a previous management team. Security needs change. Wireless locks like Aperio, for example, work seamlessly with existing systems from over 100 different access control providers, integrated online or offline. You will save time and money extending your current system with a technology like Aperio and users can continue with their existing credentials. Going forward, it makes sense to choose locks built using open architecture, for added flexibility and to future-proof your next investment. Who are the site users and what kind of credentials suit their needs? In many industries, access to premises is required by permanent staff and short-term contractors: your access system needs to be flexible. Different systems offer credentials stored on cards and fobs, or on programmable, battery-powered keys. For example, the new Openow app for SMARTair wireless locking converts a user’s smartphone into a virtual key. You issue and revoke user keys using the intuitive software, an efficient, flexible mobile management solution. What is the structure of the site (or sites) you protect? You will need different locks for high-traffic and low-traffic doors, indoor and outdoor use. Almost everywhere, wireless locks are much easier to install and to maintain than traditional wired magnetic locks — and more cost-effective to run. Certified wireless security locks provide extra protection for sensitive areas needing stringent standards. If you have a mobile workforce or manage dispersed sites, consider the credential management practicalities. For example, programmable keys that are easy to update with a Bluetooth-enabled smartphone app — like ASSA ABLOY’s CLIQ Connect solution — will save your staff time and money. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions Do you want to secure more than just doors? Some wireless systems have locks for cabinets, machines, windows and even server racks (handy if you want an extra layer of control over co-located servers). There will be workflow advantages in monitoring these ‘non-doors’ — medicine stores, for example, or car parks or lifts — from the same admin interface as your doors. Site users will appreciate the convenience of carrying one credential for every access need. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions. For example, CLIQ mechatronic padlocks are currently deployed outdoors at utility sites in Scandinavia and supermarkets in East Africa. Do you need real-time capabilities? Choose an Online system and you can manage and amend access control doors at any time and from anywhere, using the admin software. You can monitor sensitive areas like medicine stores remotely and in real time, and can revoke access rights if a user credential gets lost. In an emergency, remote locking or unlocking of an entrance could be critical. Aperio wireless locks, for example, are integrated with online electronic access and real-time monitoring systems in hospitals, manufacturing plants and student halls of residence. With some systems, including SMARTair, you can combine ‘Update on Card’ and Online updating for different doors within the same installation. The CLIQ Connect app and programmable keys make real-time control over remote sites or teams possible. Wireless access control offers a compelling mix of audit compliance, easy installation, cost efficiency, and seamless integration. It makes life easier for security managers, and is deployed in premises as diverse as power plants and co-working spaces; museums and care homes; banks, schools and skyscrapers.
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behavior. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behavior analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioral Analysis. Q: What are the elements of behavior analysis? Torres: They include things like changes in appearance and behavior, including social media behavior, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training should hold people responsible and set standards for acceptable behavior. Training is critical regarding emergency situations in schoolsThere should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioral change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioral indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviors or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organization’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
Many exhibitors at GSX 2019 saw the show as a success, despite slower booth traffic on the second and third days. According to show sponsor ASIS International, there were more than 20,000 registrants from 125 countries around the world, including those who attended the conference as well as the exhibition. Exhibitors definitely put their best feet forward, enthusiastically promoting their technology breakthroughs, but how convincing were they? The comments from at least one attendee – a large corporate end user who represents a key demographic for show organizers – bluntly suggest that healthy skepticism was on display side-by-side with the promotional energy in play.On this floor, there are some lies being given out. Ask the tough questions, make the exhibitors show you" “On this floor, there are some lies being given out,” said Rudy A. Wolter, CTO, Security and Investigative Services for Citigroup, a financial services corporation. He advised fellow attendees to “listen for them, ferret them out, ask the tough questions. Make [the exhibitors] show you.” “Don’t be afraid to ask these men and women questions,” added Wolter. “Don’t be afraid to challenge them. If you don’t challenge them, they’re not getting any better which means we aren’t getting any better. At the end of the day, they’re the leaders; they’re the ones making change; they’re the ones touching systems; they’re the ones helping integration.” Banking security with Verint At Citigroup, Wolter oversees 1,300 bank branches in North America that use Verint systems, including 23,000 cameras tied into a single command center. Skepticism aside, Wolter also provided evidence that even tough customers can be brought around. Specifically, he is sold on Verint: “When you have a problem, this company listens,” he told attendees at a Verint gathering on the show floor. New at GSX 2019 is the Verint Video Investigator, which is software that empowers investigators to quickly find the data they need to identify security threats in near real-time. In all, Verint serves in excess of 2,300 individual financial institutions, with tens of thousands of branches. Wolter was one of several end users willing to sing their praises publicly. Other GSX exhibitors were also proud to have their own real-world success stories. Placing the emphasis on outcomes At GSX, I heard more than once that outcomes are more important than technologies. Customers don’t want to hear about technologies, but rather about what those technologies can do for them. Avigilon, now a subsidiary of Motorola Solutions, is another company that is focused on outcomes rather than technology per se. “Instead of focusing on megapixels and terabytes, the end user is focused on perimeter security, loss prevention and risk management,” says John Kedzierski, Sr. VP of Video Solutions at Motorola Solutions. “We are working to provide that outcome." The end user is focused on perimeter security, loss prevention and risk management" How operators work to ensure outcomes is another aspect that is changing, says Kedzierski. “Watching video is obsolete,” he says. Using Avigilon’s new system, the operator instead is looking at color-coded hexagons; one color means motion, another means an analytic event. Operators click on various hexagons to view video. Also at GSX 2019, Avigilon featured its new H5A camera line, with expanded object classification analytics, detailed object detection, and tracking in crowded scenes; and focused on the Avigilon Blue cloud system. They are working to make every camera capable of detecting faces, which can be matched to a watch list. How technology addresses marketplace changes Addressing the changing marketplace was another GSX theme. As the workplace changes, ASSA ABLOY Americas is adapting its technology to address new employment practices such as "hot-desking," and remote and mobile workers, says Peter Boriskin, Chief Technology Officer. Systems have to be able both to protect assets and also to provide flexibility to accommodate the changing workforce, he said. Corporate acquisitions are directly expanding the capabilities that ASSA ABLOY brings to the market. For example, they recently acquired Luxer One, a locker company that enables secure delivery of packages without customers needing to stand in line or wait for service. Deliveries can be made in seconds. Peter Boriskin of ASSA ABLOY Americas led a booth tour, including new power capabilities gained in the acquisition of LifeSafety Power Another recent ASSA ABLOY acquisition is LifeSafety Power, which is expanding the company’s capability to provide proactive data on wired systems by tracking power usage. For example, a spike in current might mean a problem with a component. Compiling “intelligent triggers” enables creation of a dashboard to provide analytics of wired systems. ASSA ABLOY has also been devising predictive analytics of wireless locks to predict battery life, for instance, and to address other maintenance challenges. “We want to know what’s going on at a door without visiting it,” says Boriskin. New exhibitors make their mark New exhibitors were part of the GSX mix. One new exhibitor was Vaion. It’s their first trade show after launching at IFSEC in London in June. Vaion combines a small camera portfolio with on-premise servers and software managed through the cloud for an end-to-end solution. Tormod Ree, co-founder and CEO, calls it a “hybrid cloud delivery model”. Vaion is also a “more proactive security model,” said Ree. Video is analyzed for anomalies, and the server “learns” what is normal and not normal. The system provides alerts and notifications, occupancy counting and traffic control, among other features. And “overlays” are employed to present information on a map. Vaion can highlight video that is more likely to be relevant and prioritize feeds that have more activity. Vaion designs the hardware, which is manufactured in Taiwan. Vaion was a first-time exhibitor at GSX 2019 with their end-to-end video system; Tomod Ree is co-founder and CEO Gunshot detection technology EAGL Technology displayed their “Firefly” gunshot detection technology at GSX 2019. Based on technology originally developed for use in the military for sniper detection, the U.S. Department of Energy adapted it to civilian uses after the Sandy Hook School shooting. Boaz Raz, CEO, said the technology is the “most advanced and affordable, wireless for use indoors or outdoors, and it can control doors and cameras”. It doesn’t “listen” for gunshots like some competitors; rather it measures energy for “6 sigma” accuracy (almost 100%). Defining, and redefining, end-to-end solutions End-to-end solutions were all the rage at GSX 2019, but Allied Universal was one exhibitor that pondered what, exactly, is an end-to-end solution? It means different things to different people. For example, a video company’s end-to-end solution would not include access control. When Allied Universal claims to offer an end-to-end solution, they mean it in the broadest definition of the term, including all security systems deployed for a customer as well as the important human element (i.e., manguarding). “The industry’s emphasis on ‘end-to-end’ doesn’t encompass a full solution,” says Mike Mullison, Allied Universal’s Chief Information Officer. “When somebody uses the term end-to-end, you have to ask: What’s at both ends?” The lines between cyber and physical threats are blurring. Clients want full-service solutions" “The lines between cyber and physical threats are blurring,” adds Mullison. “Clients want full-service solutions.” Allied Universal is adding new technology elements to its offering, and Mullison says “the next phase of growth will be fueled by technology.” Allied Universal recently introduced the Heliaus product, a smart phone app that accesses an analytics engine to predict outcomes and prescribe optimum responses. It literally puts technology in a security guard’s hand. One customer has found that use of the technology resulted in a 20% reduction in safety and security incidents. The latest in access control among exhibitors In addition to video, access control had a big profile at GSX 2019, as evidenced by ASSA ABLOY America and many other companies. Another example is SALTO Systems, featuring its new NEO cylinder for wireless access control and the SALTO Virtual Network (SVN); the SVN-Flex extends and increases the number of updating points directly to the door. The SVN-Flex extends and increases the number of updating points directly to the door The compact SALTO NEO Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, or sliding doors. Low energy consumption results in 110,000 cycles with just one set of batteries. Other SALTO products are SALTO KS (Keys as a Service); SALTO BLUEnet Wireless for Bluetooth RF-driven real-time control of doors; the XS4 One Deadlatch stand-alone electronic lock; and JustIN Mobile, which replaces the need for an access card by securely sending a mobile key Over the Air (OTA) to an iOS or Android device from SALTO’s ProAccess SPACE management software. The next step in integration A new company reflecting the GSX emphasis on integration is Security and Safety Things (SAST), which is still in launch mode but expects to have its first pilot customers in the Q4. The first camera vendors embracing the SAST platform will have cameras for sale at ISC West in the spring. SAST is creating an Internet of Things (IoT) platform for the next generation of security cameras. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphones.SAST is creating an IoT platform for the next generation of security cameras “SAST is a technology platform, but it is also a business platform and a relationship platform,” said Emmanuel Ventadour, VP Sales and Marketing. For app developers, SAST also provides non-technical commercial services (i.e., easing their route to market.) Hartmut Schaper, CEO, emphasizes the “openness” of the company. Even though they are a spinoff of Bosch, they are treating every camera manufacturer equally, he says. For integrators, the use of apps can expand their field of play. Apps will empower integrators to use video for more business processes – not just security – and expand their reach with customers, says Schaper. From skepticism to sales There were plenty of product claims at GSX to feed the skepticism of even the toughest of potential customers. Fortunately, product claims were only the beginning of conversations with attendees at this year’s show. No doubt manufacturers were put through their paces more than once, and a few of them even came out on the other side with potential new business to show for their efforts. That’s the true measure of success at GSX 2019, or any trade show. Click here to read our reviews from Day One and Day Two of the show.
During the Parkland, Florida, school shooting in 2018, the shooter was caught on a security camera pulling his rifle out of a duffle bag in the staircase 15 seconds before discharging the first round. However, the School Resource Officer didn’t enter the building because he wasn’t confident about the situation, and the Coral Springs Police Department had no idea what the shooter even looked like until 7 minutes and 30 seconds after the first round was fired. If the video system had included technology to recognize the gun threat in real time, alerts could have been sent to the security team. An announcement could have been made right away for all students and faculty in Building 12 to barricade their doors, and law enforcement could have responded a lot faster to a real-time feed of timely and accurate information. Automatically recognizing gun threats Actuate offers such a technology, which the company says enables existing security cameras to automatically recognize gun threats and notify security in real-time. The technology is centred around a convolutional neural network (CNN) that aims to replicate how a human brain would process information. This neural network is trained to recognize what hands holding a firearm look like from hundreds of thousands of images in a proprietary data set. Over time, the system is able to mathematically calculate what a gun threat in a security camera feed looks like with a high degree of accuracy (well over 99% detection accuracy within the first 5 seconds), according to Actuate. “Active shooter situations are often marred by chaos and confusion,” says Sonny Tai, Chief Executive Officer of Actuate. “People are in fight-or-flight response and prioritize immediate survival instead of reaching for their phones and calling 911. When the 911 calls are made, callers often provide delayed, conflicting, and inaccurate information, inhibiting law enforcement’s ability to respond.” Enhances law enforcement response Tai says Actuate helps to clear up that chaos and confusion. “It provides visual intelligence of the location of the shooter, what they look like, what direction they’re heading, and what they’re armed with,” he says. “This real-time information enhances law enforcement response and enables building occupants to make critical decisions that maximize survivability." AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage Tai is a Marine Corps veteran and a social entrepreneur who co-founded Actuate with the mission of addressing America’s gun violence epidemic. The start of the company stems from Tai’s upbringing in South Africa, where gun violence rates are some of the highest in the world. Growing up, several of his family friends were personally impacted, resulting in a lifelong passion for the issue of gun violence. In early 2018, Tai interviewed dozens of law enforcement leaders across the country and found that their biggest challenge in gun violence response was the lack of timely and accurate information. Actuate mitigates that challenge and enables both first responders and security staff to respond more rapidly, he says. More than 99% accuracy in detecting weapons Actuate is a software-only solution that plugs into security camera hardware and software, including VMSActuate's solution is completely AI-based, says Ben Ziomek, Chief Product Officer. AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage. “Legacy, non-AI based solutions generally rely on older methods like motion detection, which is not reliable in differentiating between objects such as phones and firearms,” says Ziomek. “Our AI solution lets us achieve more than 99% accuracy in detecting weapons with an exceptionally low false-positive rate.” Ziomek runs engineering, data science, and operations for Actuate. Before joining the firm, he led teams of AI engineers and data scientists at Microsoft, leveraging AI to identify high-potential startups globally. Actuate is a software-only solution that plugs into existing security camera hardware and software, including video management systems (VMS). Existing capabilities of a customer’s VMS does initial, basic analysis and then routes the remaining video to Actuate’s processing units for AI analysis. Alerts can then be sent back however a customer wants, including through a VMS. Actuate can also feed information into a PSIM or command-and-control system if requested by a customer. Equipping customers with AI tools Our current focus for the company is to get our technology into the hands of as many customers as possible"As an early-stage company, Actuate is pursuing customers through multiple routes, including directly to end-users and via security integrators, distributors, and dealers. They are currently deployed at diverse customer sites including schools, office buildings, industrial facilities, and public buildings, says Ziomek. “Our current focus for the company is to get our technology into the hands of as many customers as possible,” says Ziomek. “We are working closely with customers across segments and industries to equip them with the tools they need to make their spaces safer. We’re currently working on educating the market on our offerings, as this technology is very new to many security organizations.” There are no privacy or compliance concerns because Actuate stores no customer data until a weapon is detected, and even then the data is not cross-indexed with any sensitive information, says Ziomek.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Cold winter temperature requires high-performance equipment capable of operating in extreme environments Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Access ANPR Camera The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. Built-in intelligent video analytics When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. IR Mini-Bullet Network Camera The camera uses a set of optical features to balance light throughout the sceneFor both approaching and departing vehicles, the access ANPR camera takes a snapshot of the license plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Smart residential solution Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. "We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases”, said Arman, General Manager of BI Group.
Security companies provide a type of service that tends to go unnoticed except when it’s missed. Small cities and towns are increasingly growing every day mostly due to internal migration and the high prices of rent in Los Angeles county USA. Veteran Los Angeles security services company, Hillquest Security & Patrol plans to meet this growth head-on. For that reason, Hillquest has decided to expand their already wide range of action (which included more than 60 cities by 2018) to all the Orange and Riverside counties. Hillquest’s security mobile patrols Hillquest Security started to provide security guard services in Orange County and Riverside since early 2019 Hillquest Security started to provide security guard services in Orange County and Riverside since early 2019. What was initially a test venture that turned out to be really successful for the company has now became a full-service activity. Furthermore, Hillquest started to offer its full range of security options for businesses and individuals in those areas. Businesses and other entities in the OC and Riverside can now hire Hillquest’s security mobile patrols, bodyguards, security systems, loss prevention and other security services for banks, construction areas, healthcare facilities, hotels, apartment complexes, movie sets, parking lots, schools and event venues. Manned Guarding and security services "We provide security services that are perfectly tailored for our clientele," said John Bouzy, Hillquest Security owner. "Our trained, licensed expert security officers can handle any and all of our customers’ security needs. Moreover, we can do that any time of day as well." According to Hillquest Security & Patrol’s corporate website, the company is insured with a US$ 5 million policy and its officers "meet the standards set by the bureau of security and investigative services."
The Danish Superliga football club Brøndby IF were aware that family attendance had fallen at some of the more high-profile games, such as the local derby with F.C. Copenhagen, due to concerns over hooliganism and safety. With an average attendance of 14,000 people per game, and up to 100 registered persons on the stadium blacklist for causing trouble, the football club wanted to find a way to make genuine fans feel safer by preventing problems before they could occur. Improving security With the use of cameras and facial recognition, blacklisted offenders can now be automatically identified in the crowd before they attempt to enter the stadium. This system identifies any individuals registered on the offenders list and alerts security staff to prevent them from entering. The automated procedure at the stadium entrance also decreases congestion at the gates, so genuine fans can get into the stadium faster. As well as improving security outside, the system allows staff more time to focus their attention on creating a safe and entertaining environment for those inside the stadium. The technology can identify faces that are difficult to recognise with conventional techniques Facial recognition server The Panasonic facial recognition software ensures high levels of accuracy. The technology can identify faces that are difficult to recognize with conventional techniques, such as those taken from an acute angle and even when part of the face is concealed or hidden by sunglasses or scarves. In fact, the National Institute of Standards of Technology (NIST) in independent testing identified the system as the most accurate facial recognition server on the market. And the system is already working. One blacklisted offender was prevented from entering the stadium at the very first home game of the season in mid-July and he will receive a fine and extended ban. Protection of personal data However, some fans were initially sceptical about the scheme. They were worried about the Big Brother concerns of privacy and personal data protection. These fears quickly faded once the club explained the sensitive way that the scheme had been implemented. Security personnel remain in control of the process at every stage. The technology flags potential blacklisted offenders and the security advisers then take over and investigate further before taking action. People-led and technology supported The solution is people-led and technology supported. Personal data privacy is also protected because the facial recognition technology does not store the images or data of any supporters, other than those registered on the blacklist. In addition, all personal data is stored on an internal server, not connected to the internet or to any other system, significantly reducing any cyber risk of data breach. After seeing the results of the technology and receiving reassurances about data protection, both Brøndby management and fans alike have welcomed the new technology. Moving forward there is also the potential to utilize a national hooligan register with the system to help spot traveling troublemakers within Denmark.
He is man’s best friend, but the bad guys’ worst enemy. That is why technology-based security specialist Safer Scotland backed up its state-of-the-art crime prevention precautions at a troublesome site in West Lothian recently with a canine capability which has sent the local predators packing. The Paisley-based company brought in what Safer Scotland Director Ryan Clark said is the ‘last line of defense’ – a trained dog handler and his German Shepherd companion – to police the challenging housebuilding site. And since the guard dog took up station on site, it has enjoyed its first weekend without incursions in two months. Audio warnings to deter intruders Ryan said: “Normally, on an extensive construction site such as this, we would secure everything with closely-monitored CCTV cameras backed up by voice warnings to deter intruders. However, this was a particularly challenging arena. The site was within the bounds of a difficult area which had been widely troubled by anti-social behavior. It was also adjacent to a ‘hang-out’ area for local teenagers. Audio warnings were deployed, with a satisfactory deterrent effect and a significant minimizing of damage" “In the space of one month, we had to call the police out to no fewer than 20 incursions. Audio warnings were deployed, with a satisfactory deterrent effect and a significant minimizing of damage.” However, Safer Scotland, in consultation with its client and the Scottish Police, took the view that, with lighter nights, hotter weather and the school holidays, the number of incursions might well escalate. It took the decision increase the level of presence at the site with a licensed, professional dog handler whose Alsatian dog used to work with the police. Securing high value assets in remote locations Ryan said: “He took up station at 5pm on the Friday and, about 9.45pm, a large group of late teens came on site. The handler escorted them off the site and detailed to them the risks that they were at trespassing onsite. Since then, there has been no trouble.” Safer Scotland has created a niche in a competitive business environment by its emphasis on reliable technology which allows corporate clients to secure high value assets in remote or temporary locations. It is expanding this year into the North of England under the trading name Safer England.
Upon hearing Pablo Picasso’s famous praise of art’s ability to clear ‘the dust of everyday life’, one’s thoughts could easily turn to one of Arizona’s newest landmarks, the Mesa Arts Center. Set proudly amidst the dust of the Sonoran Desert, the Mesa Arts Center is a striking complex of buildings, art installations, and public throughways, offering a rich blend of visual impressions in glass, water, stone, and metal, with splashes of vibrant color and metallic reflection. At more than 21,000 sq. feet, the award-winning $95 million campus is the largest and most comprehensive performing, visual and educational arts complex in Arizona, serving as a gathering point for the citizens of Mesa and region alike, seeking to enjoy the indoor and outdoor spaces, public events, classes, and art exhibitions. Ensuring safe, family friendly environment Ensuring a safe, family friendly environment is essential to fulfilling the role the Center plays as a gathering pointThe presence of an adjacent light rail station and hosting of multiple festivals throughout the year further increase traffic to, from, and through the open planned site at various hours of the day, and on weekends and even holidays. The heart of the Mesa Arts Center complex is a grand promenade that knits together all of its pieces, while providing places for group gatherings, performances, and quiet reflection, comfort and relaxation. Ensuring a safe, family friendly environment is essential to fulfilling the role the Center plays as a gathering point for all walks of life. In addition to welcoming visitors to the Center, the open configuration of the complex invites commuters coming off the nearby light rail line to stroll through on their way to and from the station, and draw loiterers, would-be vandals, and itinerant populations (attracted to the semi-secluded spaces created by outdoor art installations and the complex’s fountains and water elements). Surveillance system for crime prevention Particularly outside of traditional hours of operation, such factors can increase the risk of nuisance crimes, vandalism, and petty theft, and potentially more serious crimes against visitors and staff, without a vigilant and comprehensive security and surveillance operation. Additionally, complex spaces, varied materials, and water elements increase risk for incident and accident without proper prevention and/or prompt response. A technical solution with proven power, performance, and reliability was paramount to ensure protection of property While customary approaches to similar venues have typically relied heavily on a combination of CCTV and human security guards, the size and complexity of the Mesa Arts Center campus makes a traditional manned guarding solution, even when supported by a typical surveillance technology, both cost prohibitive and potentially inadequate. Protection of property and campus safety The Mesa Arts Center is an architectural showpiece and regional destination, requiring comprehensive surveillance at all hours, every day of the year, under highly variable conditions. A comprehensive technical solution with proven power, performance, and reliability was paramount to ensure protection of property and the safety of everyone on campus. The City of Mesa, who operates the Center, in partnership with Scottsdale’s Surveillance Acquisition Response Center (SARC) and IDIS technology, provided a mix of surveillance cameras and network video recorders (NVRs) able to meet the varied requirements of a campus housing multiple art galleries, studios, performance spaces, walkways and cut-throughs, and outdoor gathering spaces; and support SARC’s innovative approach to virtual guarding, which incorporates military, police, and intelligence best practices and personnel to enhance traditional remote monitoring models and outcomes. Using Direct IP NVRs and cameras SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution SuiteThe City of Mesa’s previous successes implementing SARC and IDIS technology at the Mesa Grande Cultural Park made the integration of technology and monitoring selected for the Mesa Arts Center a natural fit. Featuring multiple IDIS DirectIP [model number] network video recorders (NVRs), and IDIS Direct IP [model number] cameras, with [feature set], at the heart of a comprehensive security posture, SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution Suite, and their unique military, law enforcement, and intelligence-derived protocols and best practices to support on-site personnel and cover the campus comprehensively at night and during other off-hours. Additionally, the IDIS solution also seamlessly integrates with, recording and managing footage from other camera installations, demonstrating the IDIS dedication to eliminating the common frustrations and complexities of security systems. SARC’s virtual guard protection The implementation of SARC’s virtual guard protection and protocols to support on-site personnel, and the highly visible, but seamlessly integrated, presence of IDIS surveillance cameras, as part of a total IDIS solution, have contributed to the Mesa Arts Center’s reputation as one of the region’s most welcoming and inviting community spaces among the area’s art lovers, families, and neighborhood’s workers (who regularly use the space without fear or discomfort as a gathering place for lunch or pathway to and from the local light rail station). The integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus 24/7, the integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus and those within it, using innovative surveillance application bringing together IDIS’s highest quality remote viewing and VMS offerings and SARC’s remote ‘voice down’ virtual guarding protocol, which informs those under surveillance, in real time, that they are being watched and should leave the property immediately or face consequences. Keeping people and property safe The successful implementation of this solution has placed the City of Mesa and Mesa Arts Center management at the forefront of innovation in keeping the people, places, and property under their protection safe and secure, and marked them as leaders in responsible stewardship of taxpayer, grant, and donor dollars, through the implementation of a system that provides more comprehensive coverage, measurably better outcomes, and enhanced visitor experiences 24/7, year-round for a fraction of the cost of previous manned guarding solutions.
With its capacity of 32 million tons per year and water frontage of 6 kilometres, Chernomorsk sea port is one of the largest transport terminals in Ukraine, providing trade links with more than 100 countries all over the world. This port is a part of Eurasian transport corridor connecting the Western European countries, Ukraine, Georgia and the Asian countries. Its territory embodies the unique multimodal terminal that serves railway-ferry and auto-ferry lines as well as roll-on/roll-off vessels. The mission was to implement round-the-clock monitoring of the port territory and port waters in order to detect violations and prevent them. Monitoring in challenging light conditions PTZ cameras with integrated Axis Lightfinder are used for monitoring Experts from Inlimited suggested fitting the port with thermal technology platforms using 11 Axis network thermal cameras aboard (including models with two sensors: optic and thermal). PTZ cameras with integrated Axis Lightfinder technology are used, among others, for monitoring in challenging light conditions with low object contrast or difficult light sources. Thermal network cameras support guard tour function that can be used for continuous monitoring of a particular area according to the preset guard tour. In the context of modernization, the existing port security system was extended with the following video surveillance solutions: computer-aided continuous visual monitoring of the water frontage, the adjacent port area and the port waters of Sukhyi Estuary, the area along the port perimeter as well as monitoring of vehicles (license plate recognition) and approaches to the mounting locations of the main cameras. Integrated video surveillance Centralized security service control center offer video analysis capabilities. Video surveillance solutions integrated into a single software and hardware platform provide high-quality digital video real time record and store the archive for a minimum of 30 days. The integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area Integrated video surveillance and alarm system modernization project developed by Inlimited Ltd. for Chernomorsk sea port is of strategic importance for the customer since it is aimed at increasing the reliability of the guard tours and critical infrastructure of the port and its entire water area. When developing the architectural concept, the integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area, such as hurricane hazards, lightning strikes, salt air impact, as well as restricted visibility due to fog, heavy rain, snowfall and direct sunlight. Installation of PTZ network cameras Thermal platforms with Axis PTZ network cameras installed on the top became the ultimate solution for the port. Optical and thermal sensors combined into one system is the specific feature of bispectral modules. With this capability, such a device can substitute a significant number of conventional optical cameras and partially the security alarm system. Hence, the extensive territory of the port was covered by turntables with a total of 11 Axis network cameras: bispectral, optical and outdoor. Due to the intelligent capabilities of Axis network cameras, a real-time detection signal is automatically transferred to operator screen, immediately providing a very clear image of an object and ensuring reliable detection under any visibility and weather conditions. Moreover, the system can also detect suspicious objects even before an intrusion attempt. Recognizing person, car or watercraft We chose to go with Axis cameras because they are flexible and yet can be customized to solve particular problems"Automatic systems facilitate the work of security service operators displaying only actual violations, which helps to minimize the percentage of false responses. With this intelligent system, it is possible to immediately recognize a person, car or small-sized watercraft as well as detect possible smoke spread and other abnormal situations. Thus, the security staff has extra time to provide quick response. The video surveillance and alarm system of Chernomorsk sea port is integrated with IP-video control system Milestone Xprotect and vehicle license plate recognition system VIT AutoCode. “We chose to go with Axis cameras because they are flexible and yet can be customized to solve particular problems. Axis network cameras gained an excellent reputation as a part of the video surveillance system currently operating at the port and for this reason, we selected them again for additional security platforms,” noted the Chernomorsk sea port security service.
Round table discussion
In tidying up after a year of Expert Panel Roundtable questions and answers, we came across some previously unpublished responses from our panel. These interesting responses address some of the hottest topics in the industry, from robots and deep learning to the “race to the bottom.” Taken together, the varied comments offer their own range of insights into the evolving physical security market. This week, we highlight some of these assorted Expert Panellist comments submitted over the last several months.
Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?
As the new school term begins, awareness of security at all levels of educational institutions is higher than ever. Technology plays an important role in protecting educational facilities and their students, faculty, staff and visitors. Specific security challenges drive which technologies and other measures are used, and those challenges are evolving, along with the dynamic institutions security is tasked with protecting. We asked this week’s Expert Panel Roundtable: What are the security challenges for schools and colleges?
Security guards: Manufacturers & Suppliers
3 Reasons To Migrate To A New Access Control SystemDownload
Schooling the Market on Education SecurityDownload
Lawrence, Massachusetts Deploys FLIR Video System For SafetyDownload