ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fiber optic transmission and networking equipment, is introducing two hardened PoE power injectors for applications where higher requirements for operating power exist on an Ethernet network. The CNGE1IPS75AC (75 watt) and CNGE1IPS95AC (95 watt) hardened Ethernet PoE power injectors designed to supply PoE operating power to Powered Devices that require greater power than can be provided by IEEE 802.3at for Power...
The Security Industry Association (SIA) announces the 2019 keynote and featured speakers for Securing New Ground (SNG), the security industry’s annual executive conference taking place at the Grand Hyatt New York in Manhattan October 29-30. SNG 2019 will feature keynote remarks from Dr. Steven T. Hunt, chief expert for work and technology at SAP; George Oliver, chairman and CEO of Johnson Controls; and Gary Shapiro, president and CEO of the Consumer Technology Association (CTA). Signific...
ThreatScan® allows bomb technicians to perform rapid and accurate threat assessment in a wide range of operational scenarios. Each system consists of a portable X-ray generator, a detection panel and an operator’s workstation running the Company’s market-leading image processing software, together with a customer-specific range of ancillary equipment. ThreatScan® is lightweight, incredibly thin, has a large imaging area of 600 x 460mm, enabling bags and packages to be scanned...
VuWall, a pioneer in video wall control and AV network management, announced new engineering and sales hires in the United States. Francisco Provencio has been appointed application engineer while Christian Cooper joins as account manager for the East Coast. These new positions will provide additional resources for customers throughout the U.S. as VuWall continues to grow globally. Currently, VuWall has more than 1000 deployments in over 45 countries, with more than 200 in the U.S. alone. As thi...
Panorays, a rapidly growing provider of automated third-party security lifecycle management, unveiled a security intelligence solution known as Dark Web Insights. The new feature enhances Panorays’ award-winning third-party security management solution and serves as an additional layer of cybersecurity protection. Using Panorays’ Dark Web Insights, companies can now become proactive about knowing in advance of in-the-wild threats to their supply chain. The evaluator company automatic...
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full po...
The advances in video analytics – including improved classification, accuracy and speed – were unveiled at a Global Partners Summit of international security and video surveillance professionals, hosted by IDIS in Seoul, South Korea. The three day event, attended by senior executives from security distributors from 23 countries, focused on how IDIS is responding to market trends and needs, developing end-to-end solutions, including specialist technologies for a range of vertical markets, and pushing forward with improvements to the IDIS Deep Learning Engine, the technology which powers the company’s AI in the Box and IDIS Deep Learning Analytics solutions. Reduce false alarms, people counting, fall detection Earlier this year IDLA Version 3.0 was introduced as a service module for up to 80 channels within the IDIS Solution Suite VMS and it set new performance benchmarks by achieving an accuracy of 97% - 98% and dramatically reduces false alarms. Responding to customer demand for easier, more affordable analytics for smaller applications, IDIS also launched its DV-2116 AI in the Box solution. Delegates learned of future enhancements in meta-data searching by class, color and number Delegates learned of future enhancements in meta-data searching by class, color and number, plus the ability to search a specific area of interest. People counting, fall detection and the ability to search by the direction of an object’s movement were also previewed and delegates got advanced notice of a new range of AI-ready 5MP cameras, featuring deep learning on-the-edge analytics, due for release next year. Growing importance of cyber security The global summit also previewed IDIS’s ambitious video product and technology roadmap for 2020, further building out its end-to-end solutions for core vertical market sectors. Innovations in recording and camera technology, and the growing importance of cyber security, extended warranties and the advantages of delivering lower Total Cost of Ownership (TCO) and lower Total Cost to Serve for systems integrators and installers were among key topics discussed at the event. Strategies for product development IDIS works closely with its partners and hosts the annual summit as an opportunity to exchange market insights and steer its strategies for product development, technical support and marketing. Partners shared best practice implementations and case studies in core vertical markets including retail, education, logistics and distribution, and hotels. Joon Jun, President of the IDIS Global Business Division, recognized outstanding project implementations and presented special awards for best practice to Alarm Automatika from Croatia and BTCO from Chile. Video surveillance manufacturer This collaborative approach, focusing on long term partnerships is a key element in the company’s success. It’s a customer-focused model that has seen IDIS grow continuously since 1997 to become Korea’s pioneer in-country video surveillance manufacturer, with regional operations now expanding across over 50 countries. Together we are giving our customers the most advanced video surveillance solutions" Concluding the summit, special partner awards were presented by Y. D. Kim, CEO of IDIS, recognizing outstanding collaboration and sales growth over the last year. These were given to Alarm Automatica of Croatia, CCTV Center of Spain, EPCOM of Mexico, JES CQTEC of Thailand and Secure Inc of Japan Protection against cyber-security risks “The expertise, energy and commitment from all our partners at this year’s summit demonstrates, again, that collaboration is that the best route to success,” said Joon Jun, President of the IDIS Global Business Division. “Together we are giving our customers the most advanced video surveillance solutions, offering industry-best TCO value, ease-of-use and installation, scalability and protection against cyber-security risks.”
Aiphone, an international manufacturer of intercom and security communication products, has updated its popular QuikSpec™ online design tool making it easier for specifiers and installers to find product information required to accurately design and assemble intercom products. The free tool includes all available wiring and other documentation, instructions and product specifications to make an Aiphone system bid quick and easy to prepare and submit. Revamped pages are designed to run faster and smoother. New tab-style navigation makes it easier to find information and more clearly defines when to choose one system over another. Among many other changes, refreshed system images and terminology more accurately reflect current products, style and color updates better replicate the Aiphone website experience and discontinued products have been removed from the site. Right equipment for every intercom, tower component A QuikSpec-generated parts list can be shared with a distributor within Aiphone’s wide network for pricing and availability. And site users can still work on their own schedules as QuikSpec is available 24/7/365. Live assistance from Aiphone’s award-winning technical support and customer service teams are available during standard business hours. “QuikSpec is designed to ensure the right equipment is provided each time for every intercom, tower component, mounting bolt, power supply and accessories,” said Brad Kamcheff, web marketing analyst, Aiphone. “This eliminates the worry of lost profits resulting from equipment being left out of a bid.”
PerpetuityARC Training, part of Linx International Group announces that security management professionals operating in Dubai and the wider UAE, will have the opportunity to train for the internationally recognized ASIS Certified Protection Professional (CPP®) accreditation, when it runs its renowned five-day intensive bootcamp from 3rd to 7th November 2019. ASIS International is an organization for security professionals and its CPP® qualification is widely acknowledged at the ‘gold standard’ for security management professionals. Exam preparation courses PerpetuityARC Training’s five-day bootcamp provides those with nine or more years’ experience (seven with a bachelor’s degree or higher) and three of which have been spent in a security management function, with a fast track to attaining the coveted qualification. 98% of learners who took one of its CPP® or PSP® courses went on to pass their ASIS exam at the first attempt PerpetuityARC Training is proud that in 2018, 98% of learners who took one of its CPP® or PSP® exam preparation courses went on to pass their ASIS exam at the first attempt. Sarah Hayward-Turton, Sales & Marketing Director at the Linx International Group comments: “It is our experience that employers who are recruiting for senior security roles are increasingly mandating that candidates have the CPP® post-nominal.” Security principles and practices Sarah adds: “The PerpetuityARC Training five-day bootcamp is the best way for those aspiring to take the next big career step, to pass this challenging test of their security management knowledge, hopefully at the first attempt, and prove their competency.” Through a process of mock examinations, discussions and feedback sessions with expert tutor, Colin Myers (who himself has successfully completed the CPP®), bootcamp participants will be ready to take the CPP® exam, which comprises up to 225 multiple-choice questions on seven broad domains of security management - security principles and practices; business principles and practices; investigations; personnel security; physical security; information security and crisis management.
Custom Electronic Supply, a wholesale distributor of security electronics based in San Jose, California, was acquired on August 30th, 2019 by security distribution veterans Jason Dennis, Lannie Green, Matthew Green, and Danny Cranford. Dennis, along with Matt and Lannie Green, has deep distribution roots. They are the former owners of San Antonio-based Security General International, a privately-held solutions provider specializing in the distribution of emerging technology products and connectivity solutions, established in 1984. They sold Security General International to Tri-Ed in 2012. Cranford also brings to the venture very extensive industry experience and has worked in security distribution since 1987. Access Control and Integrated Systems He also served as co-owner of Security Data & Cable (SD&C) since its inception in 2001 before selling to Tri-Ed in 2010. The acquisition of Custom Electronic Supply was an amicable one, catalyzed by the retirement of one of its two owners, Charlie Cohen. Dave Kelly, its other previous co-owner, will continue to oversee all California operations and the company will continue to do business as Custom Electronic Supply. Wholesale security distribution has undergone many changes over recent years" All employees will also remain on-board, making the transition a seamless one for loyal customers who have come to rely on Customer Electronic Supply as their distribution partner for many years. Product lines span Access Control, Burg, Fire, Video Surveillance, Integrated Systems, Low Voltage Residential Systems, and Installation Tools and Supplies. Personalized service For the new owners – Jason Dennis, Lannie Green, Matthew Green, and Danny Cranford – the time to return to their distribution roots seemed spot on. “Wholesale security distribution has undergone many changes over recent years,” notes Jason Dennis. “My partners and I were not actively looking to get back into distribution. But, we’ve been hearing a lot of dissatisfaction from people in the industry recently." "Customers, employees and vendors have all been voicing their desire for a new alternative. We felt the time was right to offer one and provide the good, old-fashioned personalized service that should never stop being synonymous with a trusted distribution partner,” he adds. “Acquiring Custom Electronic Supply was the right decision that came along at the right time.” The four partners who, together own Custom Electronic Supply under the name Lone Star Systems Supply LLC, look forward to announcing additional new branch openings in the near future.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it will unveil new headquarters in the City of London, in the autumn of 2019. The announcement follows a period of accelerated growth for Genetec in the United Kingdom, with a significant and sustained increase in EMEA revenues over the last five years. Some of the company’s flagship customers in the UK include the Royal Borough of Windsor and Maidenhead, Twickenham Stadium and the University of Hull. Paul Dodds, Country Manager, UK & Ireland, commented: “At a time when Brexit has seen many organizations reconsider their presence, Genetec is unequivocal about the role of the United Kingdom as a critically important part of the global economy. As such, we’re delighted to be opening a central London headquarters to better meet the needs of our channel partners, end users, and prospects.” Public safety applications We work with local partners to provide training, compelling educational experiences, and state-of-the-art support The new headquarters will incorporate an expanded state-of-the-art training facility, and a new ‘Genetec Experience Center’ housing innovative solutions from Genetec and its large ecosystem of technology partners. Furthermore, the office will house a dedicated research and development team focused on justice and public safety applications for law enforcement, emergency responders and local government. Michel Chalouhi, VP of Global Sales, added: “The new London headquarters will give us the perfect platform to continue to execute our UK strategy and sustain the excellent year-on-year growth that we’ve achieved globally over the past years. The security market is growing and changing rapidly. We are constantly facing new challenges, so we need to ensure we work with our local partners to provide up-to-date training, compelling educational experiences, and state-of-the-art support. Our base in London will help us do that, thanks to its fantastic location, facilities, and links.”
RS2 Technologies, a provider of access control systems, announced the addition of the ACT365 Cloud-based Access Control and Video Management Solution to its comprehensive line of access control solutions. The ACT365 solution allows RS2 to deliver enhanced value to integrator partners and empowers end customers that look to streamline security and business operations through a cloud-based, intuitive platform. As a cloud-based solution, the ACT365 remote diagnostics and servicing capabilities provide RS2’s reseller channel with the convenience of troubleshooting issues from their cellphone device or web browser to determine whether a site visit is necessary, streamlining operations. The ACT365 solution also benefits their bottom line by offering an additional revenue stream based on a recurring monthly revenue (RMR) service-based business model, which is growing in popularity across the industry. Access control and video management solutions ACT365 provides partners with innovation, flexibility, reliability and powerful, friendly software ACT365 delivers a solution providing both access control and video management in a web-based platform that allows users to quickly update or remove user permissions, view cameras or open a door directly from a cellphone phone, tablet or PC. The scalable solution offers management of multiple sites from a single, unified, and user-friendly interface without the added expense of local servers and IT resources. There is no software to install and updates are automatic, which ensures delivery of the most up-to-date, secure version of the system. “Bringing ACT365 into the fold allows us to deliver a unique cloud-based product offering to our integrator partners that can add an additional revenue stream through RMR,” said David Barnard, VP of Sales and Marketing, RS2 Technologies. “We’re excited to offer the solution as another option for our partners to add a service-based cloud software technology that’s supported by our trusted team across a variety of markets." "ACT365 provides our partners and their customers with innovation, flexibility, reliability and powerful, friendly software — in line with our mission as an organization” he adds. RS2 Technologies, an ACRE company, highlighted ACT365 during the ASIS International Global Security Exchange (GSX) last week in Chicago resulting in a very positive response from both existing customers and end users.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Hikvision and Dahua have been added to a U.S. government list of entities “reasonably believed to be involved, or to pose significant risk of being or becoming involved, in activities contrary to the national security or foreign policy interests of the United States.” In effect, inclusion on the list restricts the export of equipment to the two companies because of their alleged involvement in “human rights violations and abuses” related to a Chinese government campaign of repression, mass arbitrary detention, and high-technology surveillance against minority groups. Equipment from the two companies is used to provide video surveillance capabilities in the Xinjiang Uighur Autonomous Region (XUAR) of China. The minority groups targeted are Uighurs, Kazakhs and other Muslim minorities. Equipment from the two companies is used to provide video surveillance capabilities in the Xinjiang Uighur Autonomous Region (XUAR) of China The decision to add Hikvision and Dahua, among 26 other “entities,” to the list was made by the United States End-User Review Committee (ERC), composed of representatives of the Departments of Commerce, State, Defense, Energy and (where appropriate) Treasury. A majority vote of the panel is required to add an entity to the list, and a unanimous vote is required to remove or modify an entity. The 26 other entities include the Chinese government’s bureau in XUAR, 18 subordinate municipal and county public security bureaus and one other subordinate institute. Specific licenses (government approval) are required for any transaction in which items are exported, reexported, or transferred (in country) to any of the entities on the list; or in which the entities act as purchaser, consignee or end user. Loosely speaking, inclusion on the list prevents Hikvision and/or Dahua from buying any component parts from U.S. manufacturers. Indirectly and more broadly speaking, the measure affords a new downside to the Dahua and Hikvision brands in the U.S. market. Anyone concerned about human rights abuses might hesitate to buy from the two companies, although the entity list does nothing to prohibit sales of the company’s products. Dahua and Hikvision statements In a company statement, Dahua has “express[ed] strong protest to such decision, which lacks any factual basis, and call[ed] on the U.S. government to reconsider on it.”’ Indirectly and more broadly speaking, the measure affords a new downside to the Dahua and Hikvision brands in the U.S. marketThe Dahua statement continues: “As a global business entity, Dahua adheres to the business code of conduct, and follows market rules as well as international rules. Dahua is actively working to ensure our investment and business operations around the world comply with all applicable laws and regulations. Regarding the decision of U.S. government, we have actively taken various measures, and we will continue providing outstanding products and services to our customers.” Hikvision has released the following statement: “Hikvision strongly opposes [the] decision by the U.S. Government and it will hamper efforts by global companies to improve human rights around the world. Hikvision, as the security industry’s global leader, respects human rights and takes our responsibility to protect people in the U.S. and the world seriously. Anyone concerned about human rights abuses might hesitate to buy from the two companies "Hikvision has been engaging with Administration officials over the past 12 months to clarify misunderstandings about the company and address their concerns. In January 2019, Hikvision retained human rights expert and former U.S. Ambassador Pierre-Richard Prosper to advise the company on human rights compliance. Punishing Hikvision, despite these engagements, will deter global companies from communicating with the U.S. Government, hurt Hikvision’s U.S. businesses partners and negatively impact the U.S. economy.” “The U.S. Government and Department of Commerce cannot and will not tolerate the brutal suppression of ethnic minorities within China,” said Secretary of Commerce Wilbur Ross in making the announcement. “This action will ensure that our technologies, fostered in an environment of individual liberty and free enterprise, are not used to repress defenseless minority populations.”
GSX 2019 got off to a jaunty start Tuesday. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their booths. There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side), while the trend toward system sales is continuing. Here's a review of Day 1 from the show floor. Dahua continues to educate market “Traffic-wise, the show is better than last year,” observed Tim Shen, Director of Marketing at Dahua Technology USA, at midday on Tuesday. “We met more people from Latin America,” he added. Shen theorized that Chicago is at the center of a larger territory of customers than last year’s location (Las Vegas).Dahua’s presence at the show makes a statement: “We’re still here" Dahua has faced some negative publicity in the last year since they were banned from procurement by U.S. government customers by the National Defense Authorization Act (NDAA). Dahua’s presence at the show makes a statement, says Shen. The statement is “We’re still here.” Shen said only one visitor to the Dahua booth even mentioned the NDAA on the first day of the show, and the visitor was misinformed about the provisions and implications of the law. “There is a lot of misinformation,” he says. “We need to continue to educate the market.” Facial recognition, video metadata, and people counting New at the show is the Dahua Analytics+ line of cameras that feature more in-depth analysis of data such as facial attributes, video metadata, and people counting. For example, the cameras can identify 128 points in a face, with an additional 256 attributes analyzed by the back-end recorder. Analysis can provide information such as age and gender, which can help a retailer analyze the demographics of their customers, for instance. Dahua is also adopting some of its consumer line of products for sale through the commercial channel. These include a flood light camera, a 2-megapixel WiFi camera and a doorbell camera. The products might be used outside of a retail store, for example, to complement Dahua commercial cameras that are used inside the store, says Shen. Dahua previewed a new multi-sensor camera that also includes a speed dome. The multi-sensor component combines eight views, each 2 megapixels, for a total of 16 megapixels. Below the multi-sensor camera is mounted a speed dome that can zoom in on regions of interest in the larger multisensor view. The camera will be launched in the fourth quarter. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their exhibits ACRE reports continued North American growth “The industry’s momentum will continue to grow,” predicted Joe Grillo, Principal of ACRE. New areas such as cloud and mobile credentialing have the fastest growth rate, but are starting from a much smaller base, he said, so momentum in those categories will take time.ACRE sees continued rapid growth with no slowdown in the North American market Grillo noticed the first morning of GSX was busy, although there was a bit of a lull at midday. In terms of the business outlook, Grillo sees continued rapid growth with no slowdown in the North American market, although there have been some negative elements creeping into the outlook in Europe. Cybersecurity concerns in access control I caught up with Grillo at the booth promoting RS2, a Munster, Ind., access control company that Acre acquired last May. It is the only Acre company that is exhibiting at GSX. RS2 is one of two access control companies acquired by Acre in the last year — the other was Open Options, Addison, Texas. Grillo said the two acquired companies are complementary, especially in terms of their sales channels and geographic strengths. Although both are national companies, RS2 tends to be stronger in the Midwest, while Open Options sales emphasis is centered in Texas and emanates to the rest of the country. Concerns about vulnerabilities are a growing issue in access control, said Grillo, and more large endusers are conducting penetration testing of systems. The industry should welcome the scrutiny, he added. Cybersecurity also represents an business opportunity in access control, noted Grillo. Concerns about the vulnerabilities of legacy technologies such as 125Khz proximity cards and the Wiegand protocol will likely accelerate the pace of companies upgrading their access control systems There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side) Eagle Eye Networks and cloud-based VMS Ken Francis of Eagle Eye Networks had already realized some new client opportunities during the first day of the show, although he was not optimistic at the outset. In contacting potential clients to meet at the show, he had heard that many were not attending. Among Eagle Eye Networks’ news at the show is full integration of body-cams into their cloud-based video management system. “It’s the most unique thing happening from a video management perspective,” Francis said. Previously, if someone needed a video clip from a body cam, they had to use a separate software system. Five years from now, at least 80 percent of all VMS systems will be cloud-managed" Francis continues to be bullish on the subject of cloud adoption of video management and made a bold prediction: “Five years from now, at least 80 percent of all VMS systems will be cloud-managed.” Eagle Eye Networks is doing its part with “rocket growth” that is reflected in an increase of company employees from 27 to 165 or so. Economies of scale have enabled Eagle Eye Networks to lower subscription prices by up to 45 percent. Genetec's release self-service PIAM system Many of the “new” products at GSX 2019 are slight variations on what was introduced at ISC West last spring. An exception is Genetec’s introduction of ClearID, a self-service physical identity and access management (PIAM) system that enforces security policies while improving the flow of people within the organization. The new system is integrated with the Genetec's Security Center Synergis access control system. PIAM systems have historically been customizable, complex to install and costly, which is why a lot of companies have not used a system. Genetec’s differentiator is that it is an off-the-shelf, out-of-the-box solution for a broader base of customers. “We scanned the market and found a lack of off-the-shelf identity management systems,” said Derek Arcuri, Product Marketing Manager, Genetec. “Targeting the mid-market, we are providing an accessible, ready-to-go cloud-based system that is ‘baked’ for the average company but can be integrated and expanded to include other systems.” The trend toward system sales at the show is continuing ClearID will simplify operation for the security department, which was previously tasked with a lot of administrative work in response to various departments. ClearID “pushes down” the authority to use the system to stakeholders (such as IT and/or facilities directors) and provides a system they can use themselves without involving security. “It empowers stakeholders and employees to work directly through the system rather than going through security,” says Arcuri. “It gives employees access based on stakeholder policies and improves the flow of people through an organization. The security director is relieved of administrative work and can work on ‘real’ security.” I saw some other things today, too, which I will share in a future GSX article... And more about the show tomorrow.
Ethics is a particularly important subject in an industry such as fire and security because the result of unethical actions might make the difference in life and death. For example, if an employee acts unethically when servicing a fire extinguisher, the result could be to burn down the building. Although ethics is not a common topic of discussion in the fire and security industry, perhaps it should be. Chubb Fire and Security is a company that provides an example of how an emphasis on ethics can benefit a company, their employees, their customers and the whole world. Fire safety and security risks “The fire and security industry is different than others because lives and people’s safety are on the line,” says Harv Dulay, Director of Ethics and Compliance at Chubb Fire and Security. “Our purpose is to protect clients from fire safety and security risks. This is a business where no one should take short cuts. It is important to do the right thing all the time, every time, and it’s about protecting lives and property.” At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start" “At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start,” says Dulay. “Within the bible are core fundamental rules about what’s acceptable and not acceptable. We lay it out for employees very specifically. They understand and embrace the code of ethics, which is based on trust, integrity, respect, innovation and excellence.” “If you get those right, the business moves in the right direction. A key piece of our ethics policy is based on trust. We relate to others with openness, transparency, and empathy. It makes Chubb a better place to work and enables us to provide better service to customers.” Fire audit For Chubb, ethics is not just theoretical, but ethical concepts play out every day in practical ways. An example might be an engineer who goes to a customer’s site and is asked to do a task that is outside his or her duties and/or not allowed under the ethics policy. The pressure might be even greater if the employee is struggling to meet a sales figure. The code of ethics addresses specific situations and outlines the behavior that is expected. In another example, a customer asked a Chubb technician to forge a certificate saying the customer had previously passed a fire audit in order to validate his previous year’s insurance. Showing ethical integrity, the technician was able to cite the company’s Code of Ethics and refuse to do it. The technician also reported the situation to his Ethics and Compliance Officer. Customers benefit, too. Delivering ethics excellence It’s a message heard from the top down, from everyone in the company" One of Chubb’s sales associates immediately reporting a situation in which all the tenders and competitors’ prices were visible as they prepared a tender for upload to a customer portal. Not only did the sales associate deliver ethics excellence by reporting the issue, he also helped a grateful customer who thereby avoided anti-trust issues, says Dulay. “Ethics is not just a current issue,” says Dulay. “It’s embedded in our values and has been since the beginning. Ethics is making sure people do the right things.” Ethics is integrated into the Chubb business model, and everyone knows what is expected of them. “It’s a message heard from the top down, from everyone in the company.” On-Line training modules Ethics discussions begin for employees at Chubb when they join the company; clear instructions about ethics are included as part of employee induction. There are nine modules of ethics training during employee orientation, and a discussion with an Ethics and Compliance Officer is part of the onboarding process. The training program includes information about ethics, company expectations around ethics, where to go for questions about ethical issues, and details of the anonymous ombudsman program. Additionally, field staff are trained by their supervisors via regular face-to-face ethics toolbox talks. Office staff complete a series of on-line ethics training modules regularly. A series of supervisor-led trainings encourage managers to deliver face-to-face ethics training to their team, citing real-life examples. Healthy discussions are encouraged to deal with any ‘gray areas.’ Worldwide implementation of data security Some 14,000 employees globally have multiple options when it comes to reporting an issue Dulay estimates that ethics and compliance officers spend about half their time answering questions and clarifying for employees what’s expected in the code of ethics. Some 14,000 employees globally have multiple options when it comes to reporting an issue, and there are full-time Ethics and Compliances Officers in every country where Chubb does business. A reflection of Chubb’s global approach to compliance is their worldwide implementation of data security requirements of Europe’s General Data Protection Regulation (GDPR); the company saw the benefits of the program for any jurisdiction. Training and education are part of Chubb’s investment in ethics. For example, a recent module on ‘respect in the workplace’ covered the need to create a company culture in which everyone feels respected. “Training and continuous communication are embedded in the organization,” says Dulay. Managing potential conflicts proactively “We invest in the process,” says Dulay. “We have had employees who left the company and then come back. They realized the importance of ethics and rejoined us. We start with the foundation that we would rather lose business than give up our ethical standards,” says Dulay. Some business is not worth getting if you don’t adhere to your values" “We won’t abandon our policies even if there is money at stake. Some business is not worth getting if you don’t adhere to your values. We manage potential conflicts proactively by creating and instituting methods in which employees have access to tools they can use to be successful and adaptable in times of change,” says Dulay. “Also, we will not tolerate retaliation against any employee who reports wrongdoing – regardless of the outcome of the investigation.” Forming good ethics behavior And while there is no specific monetary value assigned to good ethical practices, success can be measured. “We measure it by people’s conduct, the number of cases we have, and awareness,” says Dulay. “It’s good for employee morale, and it’s good for customers and our business. It’s not measurable, but it is fundamental for business and customers.” “The work we do as a company can impact people’s lives so it is important that everyone has an understanding of the importance of their role,” says Dulay. A common misconception about ethics is: “If no one is watching, it must be ok.” However, Dulay says it is the things employees do when no one is watching or checking in on them that form good ethics behavior. During training, Chubb emphasizes that ethics is about doing the right thing, all the time even if no one is watching.
The Danish Superliga football club Brøndby IF were aware that family attendance had fallen at some of the more high-profile games, such as the local derby with F.C. Copenhagen, due to concerns over hooliganism and safety. With an average attendance of 14,000 people per game, and up to 100 registered persons on the stadium blacklist for causing trouble, the football club wanted to find a way to make genuine fans feel safer by preventing problems before they could occur. Improving security With the use of cameras and facial recognition, blacklisted offenders can now be automatically identified in the crowd before they attempt to enter the stadium. This system identifies any individuals registered on the offenders list and alerts security staff to prevent them from entering. The automated procedure at the stadium entrance also decreases congestion at the gates, so genuine fans can get into the stadium faster. As well as improving security outside, the system allows staff more time to focus their attention on creating a safe and entertaining environment for those inside the stadium. The technology can identify faces that are difficult to recognise with conventional techniques Facial recognition server The Panasonic facial recognition software ensures high levels of accuracy. The technology can identify faces that are difficult to recognize with conventional techniques, such as those taken from an acute angle and even when part of the face is concealed or hidden by sunglasses or scarves. In fact, the National Institute of Standards of Technology (NIST) in independent testing identified the system as the most accurate facial recognition server on the market. And the system is already working. One blacklisted offender was prevented from entering the stadium at the very first home game of the season in mid-July and he will receive a fine and extended ban. Protection of personal data However, some fans were initially sceptical about the scheme. They were worried about the Big Brother concerns of privacy and personal data protection. These fears quickly faded once the club explained the sensitive way that the scheme had been implemented. Security personnel remain in control of the process at every stage. The technology flags potential blacklisted offenders and the security advisers then take over and investigate further before taking action. People-led and technology supported The solution is people-led and technology supported. Personal data privacy is also protected because the facial recognition technology does not store the images or data of any supporters, other than those registered on the blacklist. In addition, all personal data is stored on an internal server, not connected to the internet or to any other system, significantly reducing any cyber risk of data breach. After seeing the results of the technology and receiving reassurances about data protection, both Brøndby management and fans alike have welcomed the new technology. Moving forward there is also the potential to utilize a national hooligan register with the system to help spot traveling troublemakers within Denmark.
Bolloré Logistics is one of the top ten transport and logistics companies in the world. Its warehousing and logistics facility near Auckland Airport, New Zealand, has seen significant growth in recent years and often handles in excess of 2,000 items in a day. As a customs bonded warehouse, the location is subject to strict security requirements. All movements and processing in the warehouse must therefore be monitored closely, as the consequences of damage to facilities or loss of stock could be catastrophic. A combination of c25, v25 and i25 hemispheric cameras, along with several MOBOTIX Dual D15 cameras, provides complete coverage of the 6,600-square-meter site. The new system provides full visibility of the warehouse aisles to protect both employees and customers should an incident occur. Tool for risk management A security system that enables monitoring of business processes and guarantees the availability of historical footage can help companies avoid facing expensive compensation claims. As such, the MOBOTIX system is an invaluable tool for risk management, compliance enforcement and dispute resolution. The stream of metadata generated alongside the video feed cannot be manipulated, which ensures that the images will hold up in a court of law. Moreover, this kind of security system even helps save money: Some insurance companies reduce their premiums when this kind of system has been installed.
There are many matters that must be taken into account when organizing a casino. A top priority is the security of the entire workforce and clientele. An access control system that is reliable and easy to operate provides the basis for that. Casino Baden-Baden is open 358 days a year. In addition to various different pay scale groups and work-time models, a variety of bonuses need to be assigned. Pay may therefore be partly exempt of tax or liable to tax, with holiday bonuses and weekend pay. Recording staff work timings Intensive workshops and consultations were conducted to establish the specific requirements of the casino, so that the best possible solution could be developed. The main focus was on recording work times and transmitting that data to the casino's own specially developed shift schedule program. Given the various different work time models and wage types in numerous variants, complex manual procedures must be automated in future. IF-4735, IF-810, and IF-800 access control terminals Employees can use their passes for cashless payment in the cafeteria and at the vending machines In 1991, a solution for physical access control and time recording was implemented in the form of the IF-5020 software. Since 1998, the IF-6020 software solution has been in use. The hardware terminals IF-4735, IF-810, and IF-800 ensure smooth recording of work times and grant authorized employees access to the various separate areas. Also, the employees can use their passes for cashless payment in the cafeteria and at the vending machines. The system solution from Interflex, with its hardware and software components, now brings employees and administrators substantial time savings and a great deal of convenience. Central access control system All access permissions and work times are now recorded and controlled in one central system, eliminating the disruption of transferring from one system to another, such as to the program for pay and shift planning. This has brought considerable improvement in transparency and in the freshness of data, and paper has been completely banished from work time control.
VuWall, the pioneer in video wall control and AV network management, announces that the Canadian Space Agency (CSA) successfully deployed VuWall's VuScape processor to monitor the launch of the satellites and their trajectory for the RADARSAT Constellation Mission (RCM). Installed by Applied Electronics, VuScape video wall controller shares and manages incoming content to the control rooms' video walls. Managing multiple surfaces and streams of information "The RCM will collect information from multiple satellites that is critical to maritime management, disaster management, and ecosystem monitoring in Canada," said Paul Vander Plaetse, CEO at VuWall. The CSA can manage multiple surfaces and streams of information, cutting down on the amount of cabling" "From a single VuScape processor, the CSA can manage multiple surfaces and streams of information, cutting down on the amount of cabling. This is an excellent example of how our affordable visualization solutions can be scaled and tailored to meet the needs of any organization — from the smallest to the largest and most mission-critical deployments — while adding capabilities that further the value of the system." Performing maintenance and control operations For the project, VuWall's VuScape processor shares the incoming information on the video wall in both mission control rooms and meeting rooms. Control room operators can easily configure and update the layouts as needed on each of the video walls, providing them with at-a-glance information that's vital for performing maintenance and control operations on the satellites that they are mandated to monitor. With a single VuScape processor driving multiple video walls in multiple rooms, the CSA is able to manage the access and control of each individual surface with user profile management, limiting access to view and/or manage video wall content only to authorized personnel.
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organize up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardizing security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
SMARTair® Wireless Online access management has proven a simple, school-wide electronic solution for greater control and security at Westbridge. Each staff member carries one RFID credential card programmed with access rights personalized to their individual role. In an emergency, the school can institute a complete lockdown via the centralized system. “Having a SMARTair® system in place has given us peace of mind. It’s quicker, it’s safer and it’s simple,” says Joanna Brunton, Executive Officer at Westbridge School. The school’s teaching, administration and residential buildings require multiple layers of access control, for both staff and students. The inflexibility of a legacy mechanical locking system had presented facility management and pupil safety challenges for years.“With over 50 staff, we needed more subtlety in assigning access permissions, which you simply can’t do with a bundle of metal keys,” explains Joanna Brunton, Westbridge School’s Executive Officer. New access system The system would need to be installed over the holidays for minimal disruption to the school’s busy calendar Beyond replacing and upgrading outmoded, inflexible mechanical key security, Westbridge had a number of requirements for its new access system. Devices in the new, unified system would replace piecemeal mechanical locking on 80+ doors around the site. School leaders wanted access control already proven in the field, with a track record of successful installations managing access in schools worldwide. New electronic locks must provide a real-time audit trail, so facility managers always know which doors are opened by which staff cards. The new system would also need to work within the school’s security budget — and be installed over the holidays, for minimal disruption to the school’s busy calendar. "We essentially had a safety and security need,” adds Joanna Brunton. “We needed to be able to discourage students from going where they didn’t need to be on site or redirect a student who was in a heightened state from re-entering a classroom and potentially disrupting the class or causing damage.” Wireless and battery operated SMARTair® solution has done everything we wanted it to do in terms of safety, security and monitoring" System administration is easy even for non-specialists. “I taught staff how to use the software and encode access cards,” says Kylie Bray, director at Western Lock Services, who have long managed hardware maintenance for Westbridge. “If a staff member loses their card, you can go straight in and delete it." The intuitive SMARTair® system software can open or secure individual zones, connecting to individual locks via a network of 9 hubs. “We now have the ability to set higher security for specific areas of our site, especially over the school holidays when students have gone home,” says Joanna Brunton. “Our regular maintenance contractors have their own access keys, so they just get straight on with their work without calling us to meet them for access. This keeps our time, and their costs, down. SMARTair® door devices are wireless and battery operated. Because there’s no need to run cabling to individual doors, installation was fast and cost-efficient. From a facilities management point of view, the solution has done everything we wanted it to do in terms of safety, security and monitoring,” adds Joanna.
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
Security installation: Manufacturers & Suppliers
- Dedicated Micros Security installation
- VIVOTEK Security installation
- Panasonic Security installation
- UltraView Security installation
- Tamron Security installation
- Seagate Security installation
- Vicon Security installation
- Vanderbilt Security installation
- Arecont Vision Security installation
- Hanwha Techwin Security installation
- Teleste Security installation
- Dahua Technology Security installation
- LTV Europe Security installation
- Sony Security installation
- Messoa Security installation
- Luxriot Security installation
- MOBOTIX Security installation
- Bosch Security installation
- Climax Technology Security installation
- CEM Security installation