As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of...
alliantgroup announces that it has been named an associate member of the Electronic Security Association (ESA). Established in 1948, ESA is the largest trade association in the United States representing the electronic security and life safety industry. Member companies install, integrate and monitor intrusion and fire detection, video surveillance and electronic access control systems for commercial, residential, industrial and governmental clients. In cooperation with an alliance of cha...
What happens after the sale is complete, after the contracts are all signed and sealed? That’s when an abundance of variables can kick in – variables that can mean the difference between a successful security system or a case of buyer’s remorse. The features and value of equipment involved in a security system are well known before the sale closes, as hopefully are the integrator’s and end-user’s expectations about after-sale service. But what is the reality of afte...
ThinkReps LLC, a security manufacturers’ rep firm in the New York Metropolitan area, announces that the company has expanded and added a new team member, Kenneth C. Kraemer to its roster. ThinkReps is a manufacturer's representation firm based in New York and focused on enhancing the sales and market awareness of the best physical security solutions in the industry. The company is committed to providing top notch sales and support to its customer base and continues to raise the bar on sal...
The Bird Home Automation Group, manufacturer of DoorBird IP video intercoms, and the PropTech company KIWI.KI GmbH announced their collaboration today. The DoorBird D301, the IP Upgrade for analog door intercoms, is now compatible with the KIWI locking system. Analogue To App-Based Door Intercoms The companies have partnered to create an integration solution ideal for businesses requiring the ability to access clients’ residences to perform contracted services. Businesses providing home...
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay a...
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organization's security, while enhancing user convenience.Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics Challenges For Biometric Authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal among older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realize the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimizing performance through a combination of new technology and algorithms, while ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimizing Capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data.The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness Detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimizes performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimizes performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted Performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template Matching Modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical Access Control Integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy Considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
CannaGuard Security is excited to announce that it is now offering franchising opportunities across the U.S. with international opportunities to follow. The company currently services the legal cannabis industry by providing overly compliant security systems for licensed growers and retailers in the medical and recreational/adult-use markets. Through a strategic partnership with Cannabis Security they can now expand to meet the needs of a flourishing industry. CannaGuard Security is adapting their current business model from being an integrator, to instead franchising SOP’s (Standard Operating Procedures), industry knowledge and brand recognition to security integrators all over the country. They strongly believe this will help ensure the consistency of service both remotely and on-site no matter where their customers are located. Working in tandem with local providers to ensure that customers are fully adapted to the ever-changing regulatory landscape will remove fear of unknown adherence to compliance regulations. Cannabis Security comes into this partnership as a long-standing industry leader in electronic security and digital video solutions Supporting Security Integrators “This has been a model we have been working on for quite some time. With the continued national and international expansion of regulated cannabis, it’s clear that in order to continue to provide the highest level of service, it’s time we move forward with this new model and bring on dealers all over the country. This will allow us to best share our experience and expertise not only for the licensee’s sake, but also to support security integrators everywhere! I could not be more excited about the expansion of the brand, it’s been a long time coming” – Noah Stokes, CEO of CannaGuard Security. Cannabis Security comes into this partnership as a long-standing industry leader in electronic security and digital video solutions. Their blend of expertise in technology, installation, and after-sales services makes them masters of cannabis facility security and compliance. Meeting The Highest Compliance Standards CannaGuard strongly believes that concentrated compliance efforts are incredibly important in the cannabis industry as it continues to flourish across the nation. Because marijuana remains illegal at the federal level and is subject to stringent regulatory requirements, compliance efforts are critical for cannabis-related businesses. Their mission is to help facilitate strong relationships between licensees and regulators, ensuring that only the highest compliance standards are met. CannaGuard's mission is to help facilitate strong relationships between licensees and regulators “Noah and I have worked together for years now and have a great relationship even as competitors here in the northwest. So now to get the opportunity to join forces and combine our resources to provide superior service and knowledge to their customers is very exciting! We look forward to carrying on the stellar reputation CannaGuard has established and believe together we can only make things better!” – Skip Jones, Co-Owner of Cannabis Security/Pixel Security. Over the next 60-90 days, current CannaGuard clients will receive updated contact information and program details to connect them with their new local service provider. Several of the existing and long-time staff of CannaGuard have been transitioned to Cannabis Security to ensure there is no interruption in service or adherence to compliance.
Siklu Inc., the global supplier of mmWave wireless solutions, has awarded Convergint Technologies, worldwide service-based systems integrator, as their Top Security Systems Integrator Partner in North America in 2017-2018. This decision was based upon the successful partnership between the companies over the past 2 years. Siklu Wireless Fiber Solutions Siklu’s wireless fiber solutions were chosen by Convergint in a number of video surveillance projects across North America, including University Village in Seattle, the cities of Gardena, Lakewood, Bakersfield and many more. Recent projects include the Columbus International Airport, where Convergint upgraded local area network connectivity by installing Siklu’s multi-gigabit radios in two days. This solution provided interference-free connectivity as a fiber extension throughout inclement weather conditions. A broad selection of Siklu mmWave wireless products with a range of frequencies and distances are supported in the partnership, including P2P as well as P2MP, leveraging narrow beams in the uncongested frequency bands of 60-70/80 GHz, which are immune to heavy Wi-Fi signals. Transmitting high bandwidth information across security networks, the mmWave solutions are ideal for mission critical and smart cities deployments that demand secured always-on connectivity. We are extremely pleased with the overall performance of Siklu’s solutions" mmWave Wireless Products “We are extremely pleased with the overall performance of Siklu’s solutions,” said Tony Varco, VP Security Division at Convergint. “Our customers increasingly demand advanced solutions that perform at a high level combined with a low cost of ownership, and Siklu’s technology delivers in both areas. They offer a scalable, high-capacity wireless solution without compromising reliability and enables Convergint to continue to deliver high-quality service.” “We’re pleased to work with Convergint as one of our leading security partners,” said Eyal Assa, CEO of Siklu. “Siklu expands the infrastructure offering for Convergint customers, enabling them to benefit from industry-leading performance to create a network which is ready for the next generation of IoT.”
ADME, Inc., parent company of Apollo Security Access Control has announced creation of a new division for sales and support exclusively for its Software OEM and Integration partners. This new division, named ApolloEM, will be responsible to provide support for industry partners that use Apollo’s hardware platforms along with their own software solutions. “Providing hardware-only solutions to our partners has been a significant part of Apollo’s business since the very beginning,” explained William Lorber, Vice President of Sales and Marketing. “Establishing a separate division to strengthen our role as an Access Hardware OEM became logical as more partners are coming on board to utilize our new product line.” Lorber went on to explain that Apollo’s new ASP Series Controllers allow easy integration as well as post-factory customization with App Scripting.” ASP-4 Integrated Controller/Reader Interface The flagship of the new hardware series, ASP-4 is a four-door integrated controller/reader interface designed for secure, high volume applications. In addition to expansion options via OSDP to support up to 20 readers, the ASP-4 can work in a network device cluster to support up to 128 doors working as a single management unit. Other features such as a native Open Platform SDK, on-board app scripting and 3rd-party serial device support make ASP Series an attractive choice for system integrators and software OEMs in the security industry. ApolloEM ApolloEM will provide support for existing partners as well as market to potential new partners. Upcoming events for 2018 include Security Essen and ASIS/GSX as well as product and technical seminars worldwide.
In an ongoing effort to provide the highest level of customer support, ASSA ABLOY is offering two new mobile apps to ensure that installers are well equipped in the field. The ASSA ABLOY Customer Support App provides a troubleshooting, e-learning and support experience that is immediate and intuitive, while the BILT app simplifies installation with fully interactive, voice narrated step-by-step instructions. Both apps are currently available for download on Apple and Android mobile devices, and more information about the offerings is available at the ASSA ABLOY booth (#611) at ALOA 2018. Built-in QR Code Reader The Customer Support app is powered with live, interactive video and live chat support from a technician. It also ensures support hours are displayed accurately within the app depending on device location and offers email options that are ideal for after-hours support inquiries. You can easily take a photo using your phone and attach it to your email for easier troubleshooting. A built-in QR code reader allows security professionals to scan the code located on the product for simple support lookup. A built-in QR code reader allows security professionals to scan the code located on the product for simple support lookup Through BILT, ASSA ABLOY provides interactive 3D models and step-by-step instructions to make installations easier, ensure products are installed properly, and store warranties for future reference. The instructions are fully-interactive, voice narrated guides that simplify installation and shorten the time it takes to accomplish the job. Instructions For A Wide-range Of ASSA ABLOY Products Installation instructions are available on the BILT app for many ASSA ABLOY products including Adams Rite, Ceco, Corbin Russwin, Curries, Emtek, HES, Medeco, Norton, SARGENT, and Yale. “Simple, intuitive instructions and immediate customer support are essential to a successful deployment,” states Leslie Saunders, Vice President of Customer Experience, ASSA ABLOY Americas. “We are continuously seeking out new ways to empower installers and locksmiths with the tools they need to effectively serve their customers.”
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced that Panda Restaurant Group, Inc. (parent of Panda Express, Panda Inn, and Hibachi-San) has completed deployment of 3xLOGIC’s VIGIL Trends Business Intelligence software to all of its North American locations. Interface Security Systems, headquartered in St. Louis, Missouri, is the integrator and overall project manager for this ambitious endeavor. Panda Express is the largest family-owned restaurant in America, with more than 2,000 stores globally, 35,000 associates and $3 billion in sales. Since it was established in 1983, Panda has steadily grown with roughly 125 stores opening each year. Privately owned and operated, the restaurant is guided by the core values of its co-founders and co-CEO, Andrew and Peggy Cherng and is dedicated to developing its team members and giving back to the community. As of today, Trends is deployed at 1,960 locations and has been integrated with existing Interface video surveillance and alarm systems Business Intelligence Solution “As an industry leader, Panda Express’s culture sets an expectation of best-in-class results,” explained Lyle Forcum, executive director of asset protection at Panda Express. “Accordingly, we needed a state-of-the-art business intelligence solution to provide us with truly actionable information. Intelligence we can act on is central to Panda’s business strategy, which focuses on meeting high standards through continuous operational improvement.” Starting in August 2017, 3xLOGIC and Interface Systems worked with Panda Express to customize Trends to meet the company’s unique, comprehensive needs. Interface began system deployment in QI 2018 with the first location going live in March 2018. As of today, Trends is deployed at 1,960 locations and has been integrated with existing Interface video surveillance and alarm systems. Integration With Intrusion And Video Systems “It was impressive that we were able to integrate Trends so seamlessly with existing intrusion and video systems,” said Sean Foley, senior vice president of national accounts at Interface Systems, “and the entire solution was rolled out without a single technician visiting any store.” Unlike many retail BI implementations, the focus at Panda Restaurant Group is not solely on loss prevention, but also on tracking and improving all operations at every store. Here are some of the key elements of store operations that Trends enables Panda to monitor, track, and improve: Trends provides intrusion data, which shows when stores are opened and closed, deliveries are made, and whether the store is being remotely armed and disarmed People Development. To set its people up for success, store managers are able to review all transactional behavior and address opportunity areas with employees within two days. Comparing Store Performance. The store managers’ Trends dashboard shows very clearly how the restaurant is performing compared to other stores in the region and to their prior month’s performance. Optimising Store Efficiency. Trends visually displays how many people are working per hour, what job they are facilitating, and the revenue generated per hour. Monitoring Intrusion Data. Trends provides intrusion data, which shows in a very simple display when stores are opened and closed, deliveries are made, cleaning is done, and whether the store is being remotely armed and disarmed. Tracking Cash. Panda Express can track currency, how much is in the safe and when it was last counted, as well as petty cash spend along with scanned receipts for purchases. Custom Dashboards. The system provides an array of dashboards for all levels in the organization that give an at-a-glance or drilled-down overview of an employee’s priorities and responsibilities. “At Panda, safety and loss prevention are key priorities in executing great operations,” said Lyle Forcum, executive director of asset protection at Panda Express. “We worked with 3xLOGIC and Interface for over a year to implement a highly-customized solution to meet these priorities. Now, we have a cutting-edge tool deployed across the entire enterprise that we can all be proud of.”
Coop wanted a security system to protect a number of their valuable instore goods, such as home electronics, cell phones, and tablets, perfumes, and jewelry. They wanted a modular alarm system that could transmit reliably with the most modern means of communication to the standard alarm receiving centers in Switzerland. They also wanted a solution that had proven reliability and fast alarm detection, and that was certified according to SES EN standards. It was essential that this solution would satisfy special customer-specific programming for the various Coop needs. For example, allowing overnight delivery without sacrificing optimal object protection. Vanderbilt SPC IP Communication System Coop installed Vanderbilt’s SPC across their sites. SPC is a modular, flexible alarm system that is adapted to the respective needs. SPC can be deployed in various shops of different sizes with different security concepts. This greatly simplified the maintenance and training of Coop employees and had a positive effect on costs. SPC is a full IP communication system that provides cause and effect programming for custom solutions. SPC also includes self-monitoring capabilities for Coop’s security employees. Coop also chose a number of other Vanderbilt security solutions to protect their sites. These include PDM infrared detectors with mirror optics, Seismic detectors, glass break detectors, and magnetic contacts. Vanderbilt’s solutions provided easy integration of external systems such as fog systems, integration in building systems or in-house alarm receiving stations via EDP and Flex-C.
Evolution has an established reputation for excellence having worked on many high-profile projects, designing, specifying, integrating and maintaining systems in some of the most demanding environments. Some of these projects have specified Third Millennium readers. Its brief was to deliver a solution that not only provided the highest levels of security, but also served to showcase Third Millennium readers and their capabilities in the best possible light. Two cameras monitor the front and rear entry points, with access controlled by four Third Millennium RX Series RFID readers Security Management System Peter Jones, Managing Director of Third Millennium, chose Evolution both for its proven technical prowess, and its reputation for working in highly sensitive areas: “We have been operating for some 20 years, and due to the nature of the business we have always been relatively covert,” he explains. “You won’t find our name emblazoned on the building, in fact we are situated in a business center, in a multi-tenanted building. Our part of it has always been secure but it was time to upgrade to a higher level of security.” Evolution devised a solution based on the S2 NetBox VR Quatro, a security management system which allows all access control, event monitoring and video surveillance to be managed through a single, user-friendly browser interface. Key personnel can therefore quickly and easily manage who comes in/out of the premises, with a full audit trail. Two cameras monitor the front and rear entry points, with access controlled by four Third Millennium RX Series RFID readers. Third Millennium employees can choose a traditional Third Millennium card, while others are using an app on their mobile phone or their smart watch Evolution RX Series Range The RX Series is a range of readers that combine sophisticated technology with clear aesthetic appeal, available as a gloss finish polycarbonate/ABS in either black or white. A subtle feature of the reader is the shadow line backplate, a simple design mechanism which offsets the reader a few millimeters from the mounting surface, making the unit appear to ‘float’ against the wall. Being Bluetooth-enabled readers, Third Millennium employees can choose what type of pass they use. Some are opting for a ‘traditional’ Third Millennium card, while others are using an app on their mobile phone or their smart watch. Standalone IP System Having specified Third Millennium readers on many occasions, Evolution knows the technology well, including its integration capabilities. John Wust, Joint Managing Director at Evolution, says that they also understood their client’s need to keep the existing IT infrastructure separate: “We centered the solution around the S2’s Quatro since it can be deployed as a standalone IP system that does not require software or client licences, ideal for this kind of site. Keeping it separate from the IT system was also something that the Third Millennium team wanted.” With a single box design, which minimizes installation and maintenance costs, and with a license for up to four cameras, the system has proven both being flexible and economical.
Liberty University, a private university in Central Virginia, provides a comprehensive curriculum with a Christian background for more than 110,000 students enrolled across the University’s 17 colleges, schools, and online programs. The safety and security of students and faculty is a priority and has resulted in the implementation of state-of-the-art physical security measures. The LaHaye Fitness and Recreation Center located on Liberty University’s Lynchburg campus is a prime example. The large facility, which occupies approximately 165,000 square feet, houses five basketball courts, an indoor track, a weight room, group exercise classrooms, raquetball and volleyball courts, soccer fields, and a rock wall in addition to a lounge and cafe. More than just an athletics facility, the LaHaye Fitness and Recreation Center is a hub for social interaction that opens at 5am and closes at 11:30pm every day. The access control solution allows students to use one universal card throughout the campus, including LaHaye Fitness and Recreation Center ID Badge With Access Control Credentials Every student enrolled at Liberty University is provided with an identification badge with embedded access control credentials to gain access to various Liberty facilities. The access control solution, provided by RS2, allows students to use one universal card throughout the campus, including LaHaye Fitness and Recreation Center, which is outfitted with four lanes of Speedlane 300 optical turnstiles from Boon Edam to control and document the approximately 30,000 users who enter the facility every week. Previously, Liberty students would simply hand their badge to a staff worker, who would swipe it for verification, and then allow the student into the facility. The old process presented numerous challenges including the inability to adequately deny entry, expedite entry to the gym during busy hours and more. The new array of Speedlane 300 turnstiles alleviates all of those issues and more by providing three dedicated lanes for entry and one lane for egress. Monitoring Recreation Center Visitors “We can lock the turnstile gates, disable them, hold them open, grant access along with numerous other operational options, to keep traffic flowing while providing security,” said Samuel Seaborn, Associate Director, Operations, at Liberty University. “The turnstiles integrate with Liberty’s access control system to monitor who is coming into the rec center and when, and helps ensure that only students and people with proper access are allowed into the facility.” With 30,000 average weekly users entering and exiting the facility, Liberty is already looking to expand the LaHaye Fitness and Recreation Center with satellite facilities located around the campus. To maintain the level of safety throughout their campus, protect the university from liability issues, and integrate with their current access control systems, Liberty hopes to outfit any new installations with Boon Edam turnstiles, which have been well received by students and staff. In today’s environment, we’re even more concerned with properly protecting our students, and Boon Edam turnstiles help us do that" Easy To Use Turnstiles “When they were installed, the students remarked on the futuristic design of the turnstiles,” continued Seaborn. “Everyone adapted to them quickly, because they’re so easy to use.” Liberty has also been happy with the service Boon Edam provides for maintenance and other issues. If there are any issues with the badge reader or if an internal component was malfunctioning, the integrator for Boon Edam products, Jamie Dalton at Mech-Elect, of Wake Forest, NC, has responded quickly. “The Boon Edam turnstiles are so simple to use, and they really help with traffic flow. In today’s environment, we’re even more concerned with properly protecting our students, and Boon Edam turnstiles help us do that,” concludes Seaborn. “When we expand our recreational facilities, as well as other facilities, we’re definitely looking to Boon Edam for our entrances and exits.”
Hikvision USA Inc., a provider of artificial intelligence, machine learning, robotics and other emerging technologies, and the supplier of video surveillance products and solutions, provided a new, high-resolution IP security system installed by Hikvision integrator ADT/Protection 1, to upgrade security for the Battleship North Carolina, a national historic landmark in Wilmington, N.C. A stationary nine-level ship and museum, the Battleship North Carolina is a memorial honoring the 11,000 North Carolina service members who perished in World War II, along with all veterans. Visitor attractions include mess halls, the engine room, the bridge, and the Combat Information Center. Hikvision integrator partner ADT/Protection 1 upgraded the system and installed 45 new Hikvision cameras Replacing Analog Surveillance “The combination of Hikvision camera models and thoughtful camera placement has produced a broad surveillance umbrella for the Battleship North Carolina landmark, and also has some amazing views,” said Jason Summers, commercial sales at ADT/Protection 1. The ship’s cabling posed the biggest challenge, Summers said. “The USS North Carolina had a team of volunteers that handled cabling onboard the ship. Once the old coax cabling was removed, connecting the cameras and network was relatively easy.” After completing a major network upgrade last fall, it was an ideal time to replace the battleship's aging analog surveillance system. Hikvision integrator partner ADT/Protection 1 upgraded the system and installed 45 new Hikvision cameras. Hikvision 3 MP dome cameras, 2 MP 30x optical zoom PTZ cameras, 2 MP motorized zoom bullet cameras, and 2 MP turret cameras were placed throughout the main ship and the gift shop Recording Capacity Up To 40 Days A mix of Hikvision 3 MP dome cameras, 2 MP 30x optical zoom PTZ cameras, 2 MP motorized zoom bullet cameras, and 2 MP turret cameras were placed throughout the main ship and the gift shop. Two Hikvision 32-channel NVRs with 6 TB of storage provide recorded footage up to 40 days. “Hikvision contributes to the communities where we live and work,” said Alex Asnovich, Head of Marketing, Hikvision North America. “With our integrators as partners, we are able to support the community and give back to memorials like the Battleship North Carolina.”
With over 166 years’ experience with seaports, ships and ferries, City Lines offer comfortable and safe sea transportation services to tourists and those who live and work in Istanbul, Turkey’s most populous city. Every day, over 150,000 passengers rely on City Lines services. Having decided to offer a new ferry service between Istinye and Çubuklu—which are both part of the Istanbul greater metropolitan area located on different sides of the Bosporus—City Lines asked Istanbul-based security systems integrator InfoMET Technologies, to recommend video surveillance cameras to help keep passengers and the ferries safe and secure. The cameras would be required to cope with sea conditions as well as capture high-resolution images day or night. The Hanwha cameras are used to monitor the movement of some 2,000 vehicles which are transported daily Monitoring Vehicle Movement “Having previously worked with Hanwha Techwin on a number of other projects, we were confident they would be able to provide cameras that would be able to withstand demanding conditions such as salt water and high levels of vibration,” said Oguzhan Kahraman, Project Engineer, InfoMET Technologies. “The pre-sales team for Hanwha Techwin in Turkey were extremely helpful and were able to recommend the best Wisenet camera models for each required camera location.” In addition to keeping a close eye on passengers, the Hanwha cameras are used to monitor the movement of some 2,000 vehicles which are transported daily. They also to provide a valuable navigational tool for captains who use them to view blind spots that can’t be seen from the ship’s bridge. Bullet Cameras With H.265 Compression The majority of the 250 cameras installed are Wisenet QNO-7080Rs, which are part of the Wisenet Q series. These 4 Megapixel bullet cameras have built-in IR illumination for night viewing and are packed with innovative features such as H.265 compression and WiseStream, a complementary compression technology that dynamically controls encoding, balancing quality and compression, according to movement in the image. When WiseStream is combined with H.265 compression, bandwidth efficiency is improved by up to 75% compared to current H.264 technology, making the Wisenet Q series one of the most bandwidth friendly camera ranges available on the market. Hallway View provides a highly effective way to monitor narrow vertical areas such as corridors, tunnels and aisles Featuring Hallway View And True WDR The QNO-7080R cameras also feature Hallway View, True Wide Dynamic Range, Tamper Detection, Defocus Detection, and Lens Distortion Correction, to deliver optimized images in every situation. Hallway View provides a highly effective way to monitor narrow vertical areas such as corridors, tunnels and aisles. It enables cameras which can generate images in the 9:16 x 3:4 aspect ratio, to work effectively in tall and narrow spaces. “One of the biggest factors in choosing Wisenet cameras is they do not have any problems in the environments we operate,” said Cuneyt Danaci, IT Specialist for City Lines. “Equally important, while we did not want to compromise on quality, we needed cameras with a high price/performance ratio. Wisenet came ahead of many other camera brands in respect of price, performance and technology. This is one of the reasons why we are thinking of working with Hanwha Techwin on other new projects in the future.”