Connected Technologies LLC, maker of the award-winning patented Connect ONE integrated cloud-hosted security management platform, has boosted the capacity of its Access Expander to handle up to 100,000 users. Prior to developing this new programming capability the Access Expander handled up to 10,000 system users, depending on the panel manufacturer’s integration. Integrated access control Connect ONE allows security dealers to offer home automation with integrated access control Connec...
A video analytics system that provides ‘behavioral understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviors, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car th...
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announces they are emphasizing the theme of tailgating mitigation and integration in booth #1103 at the GSX (formerly ASIS) exhibition in Chicago, Illinois from September 10-12. GSX is an annual event that brings together over 20,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official tur...
Global Security Exchange (GSX) 2019 will blow into the Windy City this fall, combining a tradeshow, a full schedule of professional education sessions, plenty of industry networking opportunities, and an annual reunion of the top professionals from around the world tasked with protecting people, property and assets. GSX – the trade show and industry event 'formerly known as' the ASIS Annual Seminar and Exhibits – will be Sept. 8-12 at Chicago’s McCormick Place. The show promi...
SnapAV, a provider of A/V, surveillance, networking and remote management products for professionals, and Control4 Corporation, a provider of smart home solutions, announce the successful completion of their merger. Unified into a single organization, Control4® becomes a professional smart home brand in the company portfolio, SnapAV continues to bring technology professionals a trusted, end-to-end partner that invests relentlessly in growing the industry and helping their businesses succeed...
Security-Net, Inc., a network of security system integrators, is welcoming two new members, providing the organization with important geographic reach in the New York, New Jersey and Illinois areas. These two new additions increase Security-Net’s membership to twenty. New members include FE Moran Security Solutions, headquartered in Champaign, Illinois and Care Security Systems, based out of New York City. Their addition to Security-Net will bring extensive expertise in a diverse array of...
PACOM, the provider of integrated security and access control solutions, is getting ready to exhibit at the ASIAL 2019 Security Exhibition & Conference, which takes place between the 24th-26th July at the International Convention Centre in Sydney. Now in its 34th year and firmly established as the premier event for Australasia’s security sector, thousands of industry professionals will gather for an impressive exhibition display, a world class conference program and the chance to network with their peers. The last 12 months have been a period of considerable activity for PACOM, and the ASIAL 2019 Security Exhibition & Conference provides the perfect opportunity to engage with integration partners and end users. Security management platform PACOM will use the event to introduce its sister company, 3xLOGIC, to the Australasian security sector and demonstrate how products from these two innovative brands can be integrated to offer a unique proposition for the entire region. All the information Unison collects is presented in a single graphical user interface Taking prime position on Stand A16 will be PACOM Unison – an open and integrated security management platform that permits the management of access control, intrusion detection, fire detection, intercom and video systems. All the information Unison collects is presented in a single graphical user interface, allowing customers to respond quickly to different types of events. Unison is the solution of choice for organizations within verticals such as healthcare, universities, commercial buildings, public facilities, municipalities, airports, shipping ports and data centers. Video management system PACOM Unison can now intelligently integrate with the 3xLOGIC range of video products for alarm verification, offering customers the opportunity to benefit from a completely integrated single solution. 3xLOGIC’s VIGIL video appliances come pre-configured with enterprise grade video management system software. 3xLOGIC’s VISIX power over Ethernet (PoE) enabled dome, bullet, cube, 360°, thermal imaging, and PTZ cameras are designed to suit any application. As one of the USA’s most respected innovators in server, cloud and artificial intelligence-based solutions, 3xLOGIC has acquired an enviable track record for redefining what’s possible with security technology. For example, its pioneering TRENDS business intelligence software has already been deployed in over 7,000 locations across North America and now Australasian security professionals can take full advantage of its ability to provide a clean, simple visual snapshot of an organization’s operations. Facial recognition technology A fully functional demonstration facility on Stand A16 will highlight how the TRENDS cloud-based solution provides actionable intelligence on data, with intuitive icons, graphs and images that can be configured specifically to meet an end user’s needs. 3xLOGIC’s VISIX VX-FR-01 is a special purpose, low cost dual lens 2MP camera Visitors will also be able to see that easy-to-use facial recognition technology is firmly within the reach of organizations of all sizes. 3xLOGIC’s VISIX VX-FR-01 is a special purpose, low cost dual lens 2MP camera that is designed for instant face detection, identification and notification of persons of interest, as well as access control and people counting. Using camera-based analytics and 3xLOGIC’s exclusive facial recognition software application and mobile app, users can review images and choose individuals to place on a watch list. Cutting-Edge security systems Ahead of the ASIAL 2019 Security Exhibition & Conference, Josh Empson, National Business Development Manager at PACOM, commented, “This is the first time we have exhibited at this event for a number of years and we are keen to show visitors why our level of technological innovation remains second to none.” “With a large number of dedicated PACOM engineers working throughout the region, PACOM continues to lead the way in the design, manufacture and installation of cutting-edge security systems. Visitors therefore have a great opportunity to discover how integrated solutions from PACOM and 3xLOGIC can transform a diverse range of built environments and the many advantages of working with us.”
Arteco Global starts a new chapter. The company – producer of Video Management Software and universally renown for its highly customizable offer – is now opening its first Latin American branch in Mexico and moves its borders to a constantly expanding market. After the exceptional growth in North America, with operation all over the US territory, Arteco is now aiming at strengthening its position in the second security market of the American continent – the first in Latin America. Juan Manuel Vélez has been appointed as Sales Manager. Achieved significant results Security professional for 10 years now, Vélez gained a deep knowledge of the dynamic of the Lat American market working in more than 12 countries in the area and developing large scale projects that range from critical infrastructure (International Airport of Mexico City) to retail (network of stores of the brand REPLAY in Peru). “Arteco is a company with great strong points: it stands out of the crowd of competitors for the endless possibilities of integrations and customized approach to customer care and commercial offers,” Affirmed Vélez. “I am happy to be part of a team that already achieved significant results and to help them grow in Latin America.” “The commitment to increase our penetration in that specific geographical context is strategic. As we did in South Africa, we decided to bet on promising areas where our skills can emerge and lead the market. Our project of expansion is not finished yet. There will be further news,” added Giampaolo Sabbatani, CEO of Arteco Global.
Eagle Eye Networks, the provider of cloud video surveillance worldwide, announced a new partnership with Salto Systems, a global provider of access control systems. In the new and improved Salto KS application, the Eagle Eye Cloud VMS Surveillance product has been integrated via cloud to provide Salto KS customers a more cyber-secure video experience connected to access control events. Within the Salto KS mobile app, a user can confirm a person’s identity before remotely granting access to any door, and share the video footage with offsite, cloud back-up. These and other features delivered by the Salto KS / Eagle Eye Networks Cloud VMS integration, provide considerable benefits to end users in various verticals that need a seamless integration between video and access control. Additionally, the partnership showcases the continuous expansion within the Cloud ecosystem of security products manufacturers. Benefits of cloud integrations “It is great to be able to provide this integration with what we perceive is our twin in the industry for CCTV. Twins because our companies are almost the same age, we share the Cloud vision and both share core values like security, reliability and both sell and support through a global network." - Rick Voogt, MD SALTO KS. SALTO KS provides a flexible access control management system that requires no software to be installed Through secure, restful APIs, cloud integrations are superior to on-site integrations in terms of speed, security and the redundancy of valuable customer data. For system integrators, this new partnership enables valuable opportunities to gain stickier customer relationships with monthly recurring revenues on both video and access control products. Cloud-Based wireless access control system SALTO KS provides a flexible access control management system that requires no software to be installed. The modern cloud-based, wireless access control system is simple to use and the configuration with an Eagle Eye Cloud VMS customer account can be quickly accomplished in a few easy steps with the appropriate Eagle Eye Networks’ customer account credentials. “We are pleased to work alongside Salto Systems globally to provide a better user experience for both end users and channel partners,” says Dean Drako, CEO and Founder of Eagle Eye Networks. “Cloud systems are rapidly becoming the better option in physical security and we are determined to continue leading the transformation with strong partnerships like this one with Salto Systems.”
LifeSafety Power Inc., Libertyville, Ill., announces deeper E4 and E8 enclosures are now ‘live’ across the product line, giving systems integrators and dealers more flexibility for their security and access control specifications. Growing connected system With this change, the interior depth of E4 and E8 enclosures increase from 4.5 to 6.5 inches—part of the company’s ongoing commitment to meeting installation needs in the field. With more interior space for batteries, wiring and equipment, security installers can comfortably keep pace with their growing connected system specifications. While the enclosures gain two inches of depth, width and length remain unchanged. The change applies to all E4 and E8 enclosures, including FlexPower® Unified Power and ProWire® Unified Power.
ProSource, the audio, video, and integration buying group in the United States, has announced the addition of eight new Custom Integrator (CI) members and one new PRO level member in the second quarter of 2019. New members in Q2 represent $44 million in new revenue for the group. Networking and integration firm "ProSource continues to grow by welcoming outstanding operations into the organization," said Dave Workman, CEO and President of ProSource. "Members benefit from the excellent programs with our vendor partners, exceptional educational opportunities, and peer-to-peer networking." The new CI members are: Advanced Tech Systems, Inc., Greensboro, NC ATTYWON, Great Neck, NY Chameleon Technologies, Inc., Los Angeles, CA HD2020, Tampa, FL Force AV, West Palm Beach, FL Glabman Technology Solutions, Costa Mesa, CA Show and Tell AV Solutions, Bountiful, UT Untangled, LLC, Wilton, CT The new Power member approved by the ProSource board of directors is: Upscale Audio, La Verne, CA "We are excited to welcome all of our new members," said Sherry Dantonio, Director of Membership at ProSource. "We are proud to offer our members a vast array of resources to grow their businesses."
Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the addition of Desjardins Technologies to its Authorized Manufacturer’s Representative Program to increase coverage for customers in Canada. Desjardins Technologies will deliver French and English pre-sales support in much of Eastern Canada, including the National Capital Region and the provinces of Quebec and New Brunswick. “Desjardins Technologies brings a wealth of experience in both the Ottawa area and throughout the provinces of Quebec and New Brunswick,” said Kyle Parker, Vice President, Americas, Arecont Vision Costar. “They offer expertise in both security and home automation systems that will be of benefit to our customers in this part of Canada, including for training and design assistance in both English and French.” Video surveillance products I look forward to the opportunity to bring the company’s solutions to customers throughout the Ottawa area" Based in Blainville, Quebec, CEO and Founder Jean Pierre Desjardins brings twenty-five years of experience providing outstanding pre-sales support and assistance to customers across the region. “Arecont Vision Costar and its web-enabled Total Video Solution are an ideal fit for those in the region who are looking for proven video surveillance products combined with an easy to deploy and manage offering,” stated Mr. Desjardins. “I look forward to the opportunity to bring the company’s solutions to customers throughout the Ottawa area and across both Quebec and New Brunswick.” Cloud-Enabled offering “Jean Pierre and his team will enable Arecont Vision Costar to reach many new customers in this region for the first time,” stated John Bujarski, Senior Regional Sales Director, Arecont Vision Costar. “Our Total Video Solution is proven, simple to deploy, and a truly modern cloud-enabled offering that will benefit those in this part of Eastern Canada, just as it has across the United States and around the world.” Desjardins Technologies and the other members of Arecont Vision Costar’s Manufacturer’s Representative Partner Program are focused on bringing the industry’s best, cyber-secure video surveillance offerings to their assigned regions. Participants in the program extend the reach of Arecont Vision Costar by providing expert pre-sales assistance while interfacing with and educating customers, system integrators, and distributors on available solutions for even the most challenging video surveillance requirements.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
The devil is in the details. The broader implications of the U.S. Government ban on Chinese video surveillance manufacturers are being clarified in the federal rule-making process, and a public hearing in July gave the industry a chance to speak up about the impact of the law. Ban on equipment The hearing centered on Section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019, specifically paragraph (a)(1)(B). The paragraph "prohibits agencies from entering into a contract (or extending or renewing a contract) with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system." “Covered equipment” refers to products and services from Huawei, ZTE Corp., Hytera, Hikvision and Dahua “Covered equipment” refers to products and services from Huawei Technologies Co., ZTE Corp., Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co. and Dahua Technology Co. Hikvision and Dahua are two of the largest manufacturers of video surveillance equipment, and Huawei manufactures HiSilicon chips widely used in video cameras. ‘Chinese ban’ provision The public hearing was part of the rule-making process for paragraph (a)(1)(B), which the industry has informally referred to as the “blacklist” provision of the NDAA. However, the “Chinese ban” provision [Paragraph (a)(1)(a)] is not at issue, was not covered by the public hearing, and is already scheduled to go into effect a year after the law was signed by President Trump (August 13, 2018). There were seven presentations at the public hearing. Presenters included the Security Industry Association (SIA), two Hikvision integrators, a representative of communications manufacturer Hytera, an economist and an attorney on behalf of telecommunications company Huawei, and Honeycomb Secure Systems, a federal contractor. There was no livestream or transcription of the meeting, although PowerPoint summaries of the 10-minute presentations were published. SIA emphasizes on clarity In its presentation, the Security Industry Association (SIA) emphasized that contractors need clarity, i.e., that paragraph (a)(1)(B) applies to an entity's use of covered equipment or services in the performance of federal contracts, but NOT to non-federal sales or use of covered equipment by a contractor that is unrelated to federal work. SIA also focused on the distinction (and contrasting risk profiles) between video surveillance equipment, which are endpoint devices that may or may not be on the Internet, and telecommunications equipment. In contrast, telecommunications equipment is essential to Internet infrastructure and manages all data on a network, encrypted or not. Fully-compliant video surveillance products Security equipment suppliers and integrators doing federal work can offer fully compliant video surveillance products" SIA's presentation included the following "outcome" statement: "Security equipment suppliers and integrators doing federal work can offer fully compliant video surveillance products in the federal market, while offering other products tailored to technical requirements, price points and specific customer needs that vary widely for non-government commercial sectors – e.g. malls, banks, convenience stores, etc.” In other words, involvement in government contracts should not restrict an integrator’s flexibility to offer any and all products and services (included those from the listed Chinese companies) to non-government customers. The two integrators made similar points, specifically about their business with Hikvision. One presenter was Rick Williams, General Manager of Selcom, a systems integrator in Selma, Ala., with 10 employees. They have been a Hikvision partner since 2012 with a year-to-date revenue from Hikvision products of approximately $400,000. Hikvision integrators speak out A second integrator at the hearing was Mark Zuckerman of Clear Connection Inc., a security company in Beltsville, Md., with 32 local employees, that focuses on electronic security, telecommunications and IT. Clear Connection designs, installs and services systems throughout Metro DC and Baltimore, including commercial entities, schools and non-profit organizations. They do about $120,000 a year in business as a Hikvision partner and have over $500,000 in business awaiting federal NSGP [Nonprofit Security Grant Program] approval. In two almost identical presentations, the integrators sought clear guidance on how to comply with the language of the law as written, specifically confirmation that Section 889 of the NDAA does not apply to non-federal sales or use of covered equipment. "This is critical to my company as I provide integrated security solutions across multiple government and commercial markets, using a mix of products from different manufacturers tailored to the technical requirements, price points and customer needs that vary widely for each sector," said Williams. Hytera speaks at hearing It is not clear what Section 889 means, who it applies to, or how far its prohibitions extend" "It is not clear what Section 889 means, who it applies to, or how far its prohibitions extend," commented Zuckerman. "If interpreted broadly, some of my customers would be barred from entering into a federal contract because they have covered products installed in their facility to protect their property and staff.” Also presenting at the hearing was Hytera, a manufacturer of open standard digital mobile radio technology. The presentation emphasized that Hytera does not sell to U.S. telecommunications carriers, and does not supply 5G components or video surveillance equipment. Hytera equipment is used by federal customers such as the National Gallery of Art, National Archives, National Zoo and the Holocaust Museum. Impact on clients and commerce "These federal entities do not play a role in national security, and the Hytera systems do not connect to any critical systems," says the company. "However, the lack of clarity in the implementation of the NDAA has a significant impact on Federal, state and commercial clients, impacting competition and choice." Hytera's presentation continues: "Hytera has never been informed by any U.S. government entity that its equipment posed a national security risk and as such has not been given the opportunity to respond to any concerns. The result of Section 889 is the creation and circulation of misinformation in the marketplace." Hytera also said that the federal proposed rules and regulations should exempt federal agencies that do not include a national security component, and equipment not interconnected with the public network. Impact on cybersecurity Consolidating the number of equipment suppliers hinders rather than helps cybersecurity" James E. Gauch, an attorney with James Day speaking on behalf of Huawei, offered a global argument that could be applied to any of the banned companies: “Virtually all equipment manufacturers rely on a global supply chain and face security risks from a wide range of sources, excluding may be one or two vendors based on their national origin will not address these risks.” He adds, “However, consolidating the number of equipment suppliers hinders rather than helps cybersecurity. Creating a small number of dominant suppliers, regardless of national origin, reduces the incentives of those suppliers to embrace industry-leading standards and creates greater exposure to vulnerabilities of a single supplier.”
Physical security has been stuck in a forensic and siloed mindset for decades, while the rest of the enterprise has evolved and transformed into proactive, connected operations. A new security management platform based on artificial intelligence (AI) seeks to change that status quo by using modern tools for unification, analytics and controls. AI-based security management “Security teams are managing more moving parts than ever,” says Clayton Brown, Co-Founder of ReconaSense. “As it stands today, the industry can’t keep pace with the digital transformation and the ‘smart’ movement. Physical security must transition from forensic security to proactive, risk-adaptive security.” ReconaSense says the company is changing the physical security industry with AI-based technology and a risk-adaptive approach ReconaSense says the company is changing the physical security industry with AI-based technology and a risk-adaptive approach. “We’re focused on making security integrated, adaptive and proactive,” says Brown. The flagship product, ReconAccess, is a risk-adaptive physical access control system. It controls who can go where, when, in a building. Taken a step further, ReconAccess analyses risk to prevent an authorized person from entering a room if there is a danger or threat present. It also can spot abnormal activity that may warrant further investigation, i.e., insider threats. ReconAccess unification security solution ReconAccess is part of a unification platform that includes geospatial AI, mobile apps and analytics. ReconaSense helps organizations to mitigate risk effectively in two ways. First, the system pulls in data from disparate systems into a unified language. And then, it enables users to proactively identify risk and threats before they become issues. “We provide actionable guidance and unprecedented visibility so that they can implement appropriate controls for quick remediation and risk mitigation,” says Brown. In general, ReconaSense will improve life safety, future-proof physical security, and provide enhanced situational awareness, he says. Application programming interfaces (APIs) By creating a database translation layer through application programming interfaces (APIs), ReconaSense normalizes diverse data into a common language, or database. Previous unification platforms have presented data from different systems into a common presentation layer. ReconaSense goes deeper by extracting, transforming and loading these diverse languages into a common format for humans and machines alike to understand what is going on across their operation in real-time. ReconaSense was honored with the Security Industry Association (SIA) New Product Showcase Award for Access Control Software at ISC West 2019 Security and risk unification The ReconaSense security and risk unification platform integrates and translates siloed data across systems, devices and applications into a common language, which makes it easier to focus on what matters most and keep risk at bay. “We can change permissions in real time based on any individual behavior or environment,” says Brown. “Being able to assess risk on both sides of the door enables organizations to not only improve security but also improve life safety. We are also positioned to detect insider threats and to streamline operations overall.” Security and data integration ReconaSense provides a common operating picture integrating all the incoming security and relevant data across an organization ReconaSense provides a common operating picture integrating all the incoming security and relevant data across an organization. The security intelligence platform can detect early warning signs and abnormal events and implement remediation actions swiftly. The platform can more deeply integrate 3rd-party data systems, analyze and score the data for risk trends, and then activate changes with a native access control system based on this intelligence. ReconaSense works with traditional security integrators as its exclusive channel. They are actively adding more dealers to the network. At this point, distribution is not on the roadmap, but could be beyond the current horizon as the industry matures. Intelligent approach to physical security "The market is ready for the new technology",says Brown. “We must continue to educate integrators and end users on the need to move to a more proactive, intelligent and integrated approach for physical security,” he says. “We have to help demonstrate that AI is not as scary or far away as you think. It’s here today.” In one year, ReconaSense expects to grow its team and partner network significantly and to be deployed in a variety of sites across North America. The current team consists of technologists, engineers, IT and physical security experts and data scientists. ReconaSense is headquartered in Austin, Texas, and has a technology center in New York.
Artificial intelligence (AI) is expanding the capabilities of license plate readers and vehicle identification systems. Within a smart/safe city scenario, automatic license plate reader solutions are used to help analyze real-time video streams for site surveillance, inspection and public safety, and to offer actional information through a network of connected camera systems. Outside of law enforcement, this can include other public safety initiatives such as traffic tolls, car counting, and parking security. Vehicle recognition systems Rekor Systems is a provider of vehicle recognition systems in more than 60 countries Using AI to enable video cameras, Rekor Systems is a provider of vehicle recognition systems in more than 60 countries. Applications include security and surveillance, public safety, electronic toll collection, brand loyalty, parking operations, banking and insurance, logistics, and traffic management. AI allows Rekor’s products to recognize and read license plates, while also providing information about each vehicle, including color, make, year, and model. Rekor’s products are powered by OpenALPR software, an AI-based solution that enables any IP (internet protocol) surveillance camera to scan license plates and provide vehicle data including tag number, make, model, and color in real time with 99% accuracy, according to the company. Rekor’s products are powered by OpenALPR software Integrated solutions “Rekor's software started as an open source project, and we have done our best to keep the commercial software as open as possible,” says Rod Hillman, Chief Operating Officer, Rekor Systems. “One of the challenges we see with others in our space is a tendency to ‘close off’ and ‘silo’ their solutions. Our goal is to make it as simple as possible to deploy, integrate, and ultimately use.” Rekor has numerous application programming interfaces (APIs) and ways the solution can be integrated into partners' solutions with a software development kit (SDK). Rekor solutions can be purchased directly or through a worldwide partner network of integrators, wholesalers, and within integrated solutions such as Nokia's smart city platform. Electronic toll collection Rekor’s solutions have viable applications within multiple markets While many systems are hardware-based, Rekor’s software-as-a-solution offering can turn an IP camera into an automatic license plate reader. Rekor’s solutions have viable applications within multiple markets, including law enforcement, security and surveillance, electronic toll collection, parking operations, banking and insurance, logistics, traffic management, and customer experience. “Rekor offers a cost-effective alternative to traditional LPR systems with a much higher accuracy rate at 99% allowing more cameras to be present and active at any given time,” says Hillman. “Traditional LPRs need someone to go through hours of footage to find what they are looking for while Rekor’s technology will send alerts in real time, resulting in much quicker response times.” Move Over Camera mounts onto roadside worker’s vehicles to capture ‘Move Over’ violations Two-Part authentication Rekor’s products include: NUMERUS, a cloud-based solution for high-volume vehicle recognition, designed to reduce costs and increase efficiencies for the electronic toll collecting industry. Two-part authentication instantly identifies the vehicle’s make, model, color and body type along with the license plate read. Machine-learning-enabled software recognizes license plates from all 50 U.S. states, in addition to plates from more than 70 countries on six continents. Edge, an all-in-one camera and vehicle recognition system that instantly reads vehicle license plates, along with the vehicle’s make, model, color and body type. Move Over Camera, which mounts onto roadside worker’s vehicles (police, tow truck, etc.) to capture ‘Move Over’ violations. ‘Move Over’ laws state that vehicles must move over one lane and/or slow down if they cannot move over to avoid incident while roadside workers are in the shoulder lane. The camera can detect what lane vehicles are in and how fast they are moving. Violators are flagged in the system for law enforcement’s review.
ProdataKey (PDK), an innovator of networked cloud-based access control products and services, and OwnerGo, a complete web-based lease-management, communication and organizational tool for multi-tenant properties, has implemented a fully integrated, comprehensive solution for Freedom Heights and Lofts (Freedom Heights), a condominium community in Atlanta, Georgia. Prodata cloud access control This unique integration between ProdataKey's Cloud Access Control platform and OwnerGo's lease management, communication and organizational tool for multi-tenant properties, is supporting the diverse needs of property management, the Homeowners Association and residents of Freedom Heights and Lofts, an upscale condo community in Atlanta, Georgia. This case offers the perfect example of how everyone wins when multi-tenant residential properties unite security solutions with other property management functions. Integrated security and access control The integrated platform, designed for condo, apartments & townhomes provides enhanced security The integrated platform, designed for condo, apartment, townhome and single-family home communities, provides enhanced security and convenient controlled access to all tenants and workers who service the property while simultaneously providing the Homeowners Association (HOA) board members and property managers with the tools they need to be responsive to residents and function more efficiently. The integrated, user-friendly interface controls 32 access points to external building entrances and common areas and contains a wealth of tools to support work order submissions, resident directories, event calendars, leasing documentation, a fully automated leasing list tool and more. Up to 25% of Freedom Heights homeowners lease their units to renters; the balance of units is owner-occupied. PDK access control system The PDK access control system provides the Freedom Heights HOA with powerful security management capabilities, robust reporting and the ability to segment access to specific buildings by tenant. A mobile interface provides the night security guard with real-time awareness of when doors are being accessed, as well as Instant Alerts if any doors are left propped open. Integration with OwnerGo eliminates redundant data entry while providing continuity in managing lease documents and assigning access credentials. System administrators can more easily keep track of authorized card holders and deactivate cards that have been lost or should no longer be in circulation. In addition, cards assigned to a particular unit can be transferred automatically to the next occupants. OwnerGo integration OwnerGo integration allows residents to unlock doors for which they have permission without the need for access control cards The OwnerGo integration allows residents to unlock doors for which they have permission without the need for physical access control cards. Using the graphical map feature within the OwnerGo web and mobile interface, they can simply tap or click on the door they wish to open. Using this method, they can also open doors remotely for visitors who call ahead from outside. The system also provides the HOA board with leverage when collecting delinquent payment of condo fees. Residents who are significantly late in payments may have their access to community areas, like the pool and gym, temporarily deactivated until payment is received. Cory Jackon, Vice President of Sales for PDK, says, “Using our open API, OwnerGo has been able to pull in a lot of PDK’s features, making the management of security a seamless part of the platform’s capabilities.” Enhanced security “Integrating PDK’s access control capabilities into the OwnerGo platform is an extension that enhances the security and convenience for all involved,” adds Klye Montgomery, President of OwnerGo. Current President of the Freedom Heights HOA, Ken Gwinner, agrees. He says, “I would definitely recommend the OwnerGo/PDK solution to Homeowner Associations, property management companies and other entities responsible for the many challenges associated with properties like ours. It does exactly what we need.”
Airbus has agreed a five-year contract with the UK Ministry of Defense (MOD) to manage test and reference services to support the delivery and assured release of Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) capability for deployed operations around the globe. The contract is valued at approximately £22 million (€ 25 million). Airbus offers the UK MOD a seamless transition and delivery of a comprehensive, consistent and coherent service model for the Land Systems Reference Centre (LSRC), delivering test and reference capability to support development, integration, approval and de-risking of C4ISR systems and services. Next generation tactical communications system The LSRC provides the MOD with a through life ‘Systems of Systems’ Test and Reference serviceAirbus aims to make the LSRC the UK MOD’s center of excellence for advice and test, ensuring that MOD networks can accommodate new applications, hardware and services. Major programmes such as Morpheus, which is the next generation tactical communications system for the British Armed Forces, will be tested in the LSRC. Located at Blandford Camp in Dorset, the Royal Corps of Signals’ headquarters, the LSRC provides the MOD with a through life ‘Systems of Systems’ Test and Reference service. It provides an appropriate test, integration and transition capability that assures release packages for introduction onto the Defense Network and in support of operations and exercises. Test applications and application upgrades The LSRC can provide support and specialist advice for deployed and base ICT capabilities throughout their lifecycle. The LSRC has the capability to test applications and application upgrades on reference systems to assess their impact on other applications and the network as well as the network’s impact on the application. Airbus has decades of experience delivering communications solutions to the UK MOD, as well as many governments around the world, both with ground infrastructure networks and satellite communications delivering unrivalled resilience and security to all forces’ operations.
It is one of Moscow’s most ambitious building projects: the VTB Arena Park was built on the site of the old Dynamo Stadium and revitalizes the entire surrounding area with a multi-purpose concept. At an estimated cost of US$ 1.5 billion, the modern VTB Arena Park combines sports, entertainment, commercial and residential facilities. A first challenge arises from the sheer size of the project: The football stadium, known as Dynamo Central Stadium and home to FC Dynamo Moscow football club, hosts league matches with a capacity of over 26,000 spectators. The park’s indoor arena holds more than 12,000 guests during ice hockey matches, basketball games and rock concerts, while the 300,000 square-meter park area also offers retail facilities, a five-star hotel and 1,600-car parking garage. Protecting residential areas Considering the wide range of very different purposes served by these various buildings, it was clear from the project’s inception that a multitude of vendors and providers would be needed to cover all security needs. VTB Arena Park was looking for a partner able to tackle that key challenge From the security manager’s perspective, the main challenge was to ensure that these disparate systems would function together and allowed for central management of a wide array of functions such as: access control for tens of thousands of football fans entering the stadium on match days, monitoring the vast perimeter with its park zones, and protecting residential areas against intrusion. VTB Arena Park was looking for a partner able to tackle that key challenge – integration of all parts into one platform – and chose Bosch as its provider of end-to-end video security and access control. Intelligent video analytics Aside from the project’s complex technical ramifications, there was a particular system design challenge: Residents of the Arena Park should feel at home enjoying the highest quality of living, while the area also needs to accommodate for the influx of thousands of visitors within short periods. As the Bosch experts learned, the multi-purpose character of VTB Park leads to an equally wide range of different security needs among its users. Catering to the video security needs, Bosch installed a total of more than 2,000 video cameras, fixed as well as moving cameras, both indoors and outdoors, to safeguard the vast perimeter of the Arena Park premises and secure the homes and offices. One of the camera types installed for perimeter protection is the AUTODOME IP starlight 7000 HD. This high-definition camera offers excellent low-light performance thanks to starlight technology and also features built-in Intelligent video analytics. Access control systems The video analytics function automatically detects deviations from standard moving patterns The video analytics function automatically detects deviations from standard moving patterns, like a person entering a restricted area, and triggers an alarm that is sent to the control rooms where security staff can then zoom into a scene for closer investigation. As required by VTB Arena, all 2,000 cameras and connected video storage on Bosch recording units are managed centrally via the Bosch Video Management System (BVMS). Another particular challenge consisted of aligning the three different access control systems of the stadium running at the same time. The ticketing system is the first layer of access control, managing the turnstiles that permit entry of thousands of visitors during events with paper tickets. This access control system needed to integrate with the employee access control system that relies on proximity cards (the Access Engine provided by Bosch), as well as a third, offline access control system used at specific stadium facilities. Integrated security system As the Bosch experts in Moscow found out, such an integration was without historic precedent. Because no standard solution existed, the team devised a highly customized set-up managed centrally on the Building Integration System (BIS) from Bosch. “We were fully aware that the multifunctional character of the VTB Arena Park would lead to complexity that could hardly be topped. We needed integration power, a partner who knew how to bind all loose ends into one solution that had never existed before. Creating this one integrated security system catering to all the various purposes has made Bosch our main security partner,” said Alexander Kravchenkov, Deputy Head of Security Systems Maintenance Group IT Department at VTB Arena.
Todd Burgess has an easy answer when asked why he’s used a March Networks video solution in his Quik-E Food convenience stores for more than 15 years. “It’s simple. The system is constantly saving us money.” Networking and IT In his role as Vice President of Quik-E Food Stores, Burgess oversees all the networking and IT requirements for the Lynchburg, Virginia business, which includes 13 convenience stores and gas stations, six car washes, a laundromat and a craft beer pub called The Filling Station known for its unique combination of ‘growlers, grub and gas’. Finding those incidents and stopping them quickly can directly impact Quik-E’s profitability While many things about the family-owned business have changed since its founding in 1973, the need to keep a close eye on each location’s inventory hasn’t. Like every retail organization, Quik-E can cite numerous examples of theft, fraud and inventory errors that have cost the business thousands of dollars in lost revenue. Finding those incidents and stopping them quickly can directly impact Quik-E’s profitability, and that’s where its March Networks intelligent video solution really proves its worth. Video system helps curb thefts “I can’t tell you how many thefts I’ve caught with the help of our video system,” said Burgess. “I had a former employee just finish paying me back $13,000 they owed us in stolen goods, and we recently caught another employee who was stealing probably $50 worth of cigarettes each day.” “And just this morning I was reviewing video of a weekly delivery with one of our managers,” continued Burgess. “We were able to confirm that we’d been charged for $77 worth of gloves that we didn’t actually receive. The video showed the delivery guy come into the store and put everything down. Two boxes of gloves is easy to spot, so it was obvious that that portion of the delivery was missing.” Quik-E Food Stores has upgraded its video solution over the years and Burgess uses the Searchlight software regularly to check for any unusual or suspect transactions and review the data when an incident occurs New software capabilities Over the years, Quik-E Food Stores has upgraded its video solution to take advantage of better performance and new software capabilities. The March Networks video recorders first installed more than a decade ago have been slowly replaced by new generation 8000 Series Hybrid NVRs, able to support both analog and IP cameras or a full complement of IP-only video. Hosted networking solution Burgess has also overseen the transition from older Visual Intelligence software to March Networks Command Enterprise software working with Integrated Technology Group (ITG), the retailer’s long-time systems integrator and March Networks certified partner. That’s in addition to moving the organization from office servers to a hosted networking solution and switching from an existing point-of-sale (POS) system to a new Gilbarco Passport POS solution. “We’ve been proactive about upgrading our IT infrastructure over the last few years, and our video system has always come back online, except in one instance where we couldn’t get the cameras connected again in a couple of locations,” said Burgess. “March Networks Tech Support was wonderful. They managed to diagnose the issue, which wasn’t related to the video products in the end. They were just a big help.” March Networks Searchlight™ Burgess says that he’s a satisfied customer and he won’t be looking for another video solution anytime soon Quik-E is also using March Networks Searchlight™ for retail, a software application that integrates surveillance video with the retailer’s POS transaction data to provide powerful search and investigation tools. Burgess uses the Searchlight software regularly to check for any unusual or suspect transactions and review the data when an incident occurs. “I use Searchlight primarily to look for voids and cancellations, or high dollar value transactions,” said Burgess. “We actually just used it to help catch a manager who probably stole thousands of dollars from us. I knew I was short in inventory, so I pulled up the video and transaction data to see if things were being rung up. It was clear they were not and we had the evidence to prove it. Now we’ll use that evidence to hopefully recoup our losses.” Satisfied customer Ultimately, Burgess says that he’s a satisfied customer and he won’t be looking for another video solution anytime soon. “I think it’s one of the best video surveillance systems on the market. March Networks has been good to me over the years and I’m a very happy customer.”
With its capacity of 32 million tons per year and water frontage of 6 kilometres, Chernomorsk sea port is one of the largest transport terminals in Ukraine, providing trade links with more than 100 countries all over the world. This port is a part of Eurasian transport corridor connecting the Western European countries, Ukraine, Georgia and the Asian countries. Its territory embodies the unique multimodal terminal that serves railway-ferry and auto-ferry lines as well as roll-on/roll-off vessels. The mission was to implement round-the-clock monitoring of the port territory and port waters in order to detect violations and prevent them. Monitoring in challenging light conditions PTZ cameras with integrated Axis Lightfinder are used for monitoring Experts from Inlimited suggested fitting the port with thermal technology platforms using 11 Axis network thermal cameras aboard (including models with two sensors: optic and thermal). PTZ cameras with integrated Axis Lightfinder technology are used, among others, for monitoring in challenging light conditions with low object contrast or difficult light sources. Thermal network cameras support guard tour function that can be used for continuous monitoring of a particular area according to the preset guard tour. In the context of modernization, the existing port security system was extended with the following video surveillance solutions: computer-aided continuous visual monitoring of the water frontage, the adjacent port area and the port waters of Sukhyi Estuary, the area along the port perimeter as well as monitoring of vehicles (license plate recognition) and approaches to the mounting locations of the main cameras. Integrated video surveillance Centralized security service control center offer video analysis capabilities. Video surveillance solutions integrated into a single software and hardware platform provide high-quality digital video real time record and store the archive for a minimum of 30 days. The integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area Integrated video surveillance and alarm system modernization project developed by Inlimited Ltd. for Chernomorsk sea port is of strategic importance for the customer since it is aimed at increasing the reliability of the guard tours and critical infrastructure of the port and its entire water area. When developing the architectural concept, the integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area, such as hurricane hazards, lightning strikes, salt air impact, as well as restricted visibility due to fog, heavy rain, snowfall and direct sunlight. Installation of PTZ network cameras Thermal platforms with Axis PTZ network cameras installed on the top became the ultimate solution for the port. Optical and thermal sensors combined into one system is the specific feature of bispectral modules. With this capability, such a device can substitute a significant number of conventional optical cameras and partially the security alarm system. Hence, the extensive territory of the port was covered by turntables with a total of 11 Axis network cameras: bispectral, optical and outdoor. Due to the intelligent capabilities of Axis network cameras, a real-time detection signal is automatically transferred to operator screen, immediately providing a very clear image of an object and ensuring reliable detection under any visibility and weather conditions. Moreover, the system can also detect suspicious objects even before an intrusion attempt. Recognizing person, car or watercraft We chose to go with Axis cameras because they are flexible and yet can be customized to solve particular problems"Automatic systems facilitate the work of security service operators displaying only actual violations, which helps to minimize the percentage of false responses. With this intelligent system, it is possible to immediately recognize a person, car or small-sized watercraft as well as detect possible smoke spread and other abnormal situations. Thus, the security staff has extra time to provide quick response. The video surveillance and alarm system of Chernomorsk sea port is integrated with IP-video control system Milestone Xprotect and vehicle license plate recognition system VIT AutoCode. “We chose to go with Axis cameras because they are flexible and yet can be customized to solve particular problems. Axis network cameras gained an excellent reputation as a part of the video surveillance system currently operating at the port and for this reason, we selected them again for additional security platforms,” noted the Chernomorsk sea port security service.
Frequentis was selected for phase two of the modernization and standardization of control center technology (Program MVL) for the police in the German state of North Rhine-Westphalia (NRW). NRW police selected the Frequentis multimedia communication platform, 3020 LifeX, to meet the requirements for future emergency call and broadband radio communications. Phase one of the modernization project was carried out by Thales Deutschland GmbH. To prepare for future multimedia emergency call and broadband radio communications, the NRW police selected Frequentis AG for the continuation of the modernization. Reliable technology partner The intensive and successful cooperation between Frequentis and Thales over the last two years – as well Frequentis’ previous success completing the project ‘digital radio concentrator’ – convinced the NRW police that Frequentis was a reliable technology partner. NRW is the largest police organization in Germany, covering 50 police authorities NRW is the largest police organization in Germany, covering 50 police authorities which ensure the protection and security of a population of approximately 18 million. To cope with this challenging task, and to live up to its self-acclaimed title as the most innovative police force in Germany, the NRW police relies on forward-thinking technologies for state-of-the-art control center solutions that will meet future demands of the service. Multimedia communication platform Phase two of the program MVL includes 50 police control centers with approximately 400 operator working positions. In the future, these will be hosted in a virtual cloud-based solution available in five networked technical centers across the region. The Frequentis multimedia communication platform, 3020 LifeX, will ensure efficient emergency call handling and operation on the public safety digital radio network as well as the interconnection of both channels. “We are very proud to be able to continue to work with, and deepen, our long-term cooperation with the North Rhine-Westphalia Police Department, helping them to achieve their goals for innovation. We see this customer as a very important strategic partner.” Norbert Haslacher, CEO Frequentis AG.
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?