Luxul, globally renowned innovator of IP networking solutions for security integrators, has announced its technology lineup for ISC West 2019, taking place April 10-12 at the Sands Expo in Las Vegas. In Legrand | AV's booth 29098, Luxul will exhibit PoE Self-Healing, managed Gigabit switches; award-winning routers with integrated Domotz remote management technology; the company's next-generation wireless controller; "Good, Better, Best" dual-band wireless access points (APs); and the new Easy Se...
Aiphone, the international manufacturer of intercom and security communication products, released ‘Best Practices for Keeping Students Safe: A Guide to Campus Security’, an eBook providing public and private K-12, college and university campus administrators with proven best practices for protecting an entire campus population. The free 31-page eBook looks at current technologies, policies and procedures required to handle a variety of security challenges. It includes interactive ch...
PSA the systems integrator consortium, announces it will host an education track with sessions during ISC West in Las Vegas, NV on April 9-11, 2019. The PSA education track will be held exclusively on Tuesday, April 9. Members of PSA Committees, PSA executive leadership team, and other industry experts will lead the six sessions that are included in the PSA Track. The sessions being offered will include: The Emerging Leader: The Change Agent In The Security Industry April 09, 2019, 8:30 AM -...
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services...
Dragos, Inc., provider of the industrial industry’s most trusted asset identification, threat detection and response platform and services, announces the acquisition of Atlanta-based NexDefense, a provider of industrial controls system (ICS) visibility technology. As part of this announcement, the company also introduces Dragos Community Tools, a set of free assessment tools to help organizations of all sizes around the globe forge the path forward towards comprehensive ICS security. NexD...
Booth number: 34103 Oncam offers industry-leading 360 and 180-degree video technology. The company has the largest range of wide-angle cameras that are open platform and easy to integrate. Unique dewarping technology allows the creation of award-winning video solutions for stakeholders from the C-suite to the security officer in wide range of industry segments. Oncam’s products greatly enhance situational awareness. Oncam recently introduced two specialty cameras to the market: the Evolu...
Booth number: 20060 FLIR Systems is a provider of advanced thermal, video and sensor technologies designed to meet complex border, critical infrastructure, safe city and commercial enterprise needs. FLIR’s signature products include thermal cameras, visible light cameras, radars, video management systems, and physical security information management solutions. Saros DH-390 enables integrators to offer remote video monitoring services and increase their recurring monthly revenue At ISC West 2019, FLIR will showcase its FLIR TruWITNESS solution for true situational awareness for city-level security and public safety operations. Worn on an individual’s body or mounted inside vehicles, TruWITNESS combines video, audio, location data and IoT capabilities. Together, these sensors send alerts and stream data back to a central command center running FLIR United VMS for improved incident analysis and intervention. FLIR will also display its FLIR Saros DH-390 Dome camera for perimeter and wide area protection for commercial businesses and alarm monitoring companies. With its ability to integrate with central station platforms, Saros DH-390 enables integrators to offer remote video monitoring services and increase their recurring monthly revenue. For more about their presence at ISC West, we contacted Fredrik Wallberg, Director of Marketing, Security, at FLIR Systems. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. FLIR has been exhibiting at ISC West for over a decade. When we first exhibited at the show, there was very little knowledge about thermal imaging technology. Attendees primarily viewed thermal as a technology for specialty applications for night operations. Through the years, FLIR has used ISC West to introduce the security market to the value of and many uses for thermal cameras, from 24-hour surveillance to intrusion detection to condition monitoring. Now, security personnel not only know what thermal cameras are, but they are also actively requesting FLIR thermal cameras for a broader range of applications spanning the government, transportation, energy, industrial, commercial and safe city sectors. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? As meeting with integrators and end users is our top priority while at ISC West, the majority of our efforts is centred around driving attendees to the FLIR booth. We will leverage print, digital and social campaigns to increase brand exposure and to secure booth appointments prior to the show. We’ve also hosted in-booth contests and giveaways during the show to encourage attendees to interact with the FLIR team. During these meetings with integrators and end users, we can truly listen to and assess their needs Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? For FLIR, success is measured by the quality and quantity of meetings we have with customers because getting face time with them is invaluable. During these meetings with integrators and end users, we can truly listen to and assess their needs. With this understanding, we can discuss solutions that can both address their pain points and provide added value. These conversations are often the beginnings of collaborating on projects together. Additionally, by having our technology partners, such as Genetec, Milestone Systems and Embedded Logix in the booth, we can showcase our technology integrations that attendees may not have been aware of. This can also spark product requests and ideas for future applications. For FLIR, success is measured by the quality and quantity of meetings we have with customers because getting face time with them is invaluable Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? ISC West is also a time of training for FLIR personnel. Each year, we have meetings with our global business development team to discuss annual goals, progress and strategies. Outside of business, FLIR has also hosted VIP dinners and events for key influencers and customers surrounding new product launches or other company initiatives. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the premier show for security dealers, integrators and installers, welcoming over 30,000 attendees and 1,000 exhibitors. No other event attracts FLIR’s target customers and technology partners on such a large scale. It is a prime opportunity to meet with current customers, answer questions from prospective customers, and discuss projects in the pipeline.
Booth number: 8037 Boon Edam is an over 140-year-old global market provider in entry solutions, headquartered in the Netherlands, with over 20 subsidiaries worldwide. They offer a full range of security turnstiles, security revolving doors and mantrap portals as well as architectural revolving doors and have extensive expertise in managing the movement of people through many types of buildings across all industries. Boon Edam works with customers to determine their exact requirements and develop a customized solution. In the Americas, Boon Edam has been recognized as the market leader in “Pedestrian Security Entrances” by IHS Markit since 2008. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. The market has matured and most people are familiar with security revolving doors Our first year at ISC West was in 2003, and our booth size was only 10x20 foot. We had just two security entrance products and only five sales people in the booth. Back then, we focused on showing people what exactly a security revolving door was and how it worked to prevent tailgating or piggybacking – most visitors had never seen one! We spent a lot of time conducting demonstrations. Today the world has changed, the market has matured and most people are familiar with security revolving doors and understand they can provide a payback. In the past few years we have more time and people allocated to having meetings with large customers. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? To gain brand exposure we sponsor the entrances by placing our turnstiles at every entrance to the show floor. At the booth, we install each type of product we sell so that people can get up close to them, see the quality construction and the working principle. Our products also include adjacent technologies like an access control system, readers, biometrics – people can see the whole solution working together. Finally, we definitely allocate space to meeting areas to have meetings with our current customers about ongoing and new projects. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? We look forward to getting several hundred visitors at ISC West Like everyone else, we care about new visitor traffic at the booth. We look forward to getting several hundred visitors at ISC West. Many of them have active projects coming up in the next year, providing a solid ROI every year. Another less tangible ROI is the existing customers we are already working with and our ability to meet with groups of their decision-makers very easily in our booth. We can solidify new projects without planning another business trip in the same year, so there’s efficiency there. Finally, there’s the exposure of our brand and our products in a physical way the industry – hard to quantify that, but we do get a lot of word-of-mouth business probably because of our exposure and earned reputation. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host our customer and partners at dinners on nights before and during the show at the many restaurants located in Vegas. We have over 20 sales representatives around the country and so we also schedule some time during the week to have a sales meeting to get everyone on the same page. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Both end users and integrators can come to the booth to see how a solution works together For Boon Edam, ISC West has shown consistent and improved metrics regarding the number of visitors to our booth and overall attendees year over year for at least the last 10 years. It is our biggest event of the year for that reason. The show also brings some of the largest integrators in the Americas, and more recently, some of the largest global end users. Having both at the same show is a ‘two birds with one stone’ opportunity because we showcase our security entrances as integrated solutions paired with access control, different types of readers and biometrics. Both end users and integrators can come to the booth to see how a solution works together without having to travel to an installation site.
ISC West, the largest converged security event in the U.S., introduces the lineup for its 2019 education sessions, in collaboration with premier sponsor the Security Industry Association (SIA). In partnership with SIA, ISC West will be making educational sessions available during its 2019 ISC West show taking place April 9-12, 2019 at the Sands Expo in Las Vegas, Nevada, with SIA Education@ISC kicking off the day prior to the exhibition on April 9. The comprehensive program includes 85+ accredited sessions covering a range of industry topics aimed at providing the critical knowledge attendees need to protect and defend against developing threats in today's security landscape. Force-Multiplying Asset Keynote 1: Delivering Results: How DHS and Industry Partnerships Drive Security Innovation: In this session, keynote speaker William N. Bryan, acting under secretary for science and technology at the U.S. Department of Homeland Security (DHS), will discuss the advances in mobility, machine learning and autonomous technologies that provide new capabilities to build resilience capacity and reduce risks. Keynote 2: Stadium Security – As It Was, Where It Is and Where It Is Going…: Keynote speaker Russ Butler, vice president of security for the San Francisco 49ers and Levi's Stadium, explores the history and evolution of the ever-changing stadium security landscape. ISC West offers complimentary hands-on Vendor Solution Sessions and Unmanned Security educational sessionsThe Great Biometric Debate: After years of promise, biometrics are finally on the rise toward pervasive use. The audience will benefit from a detailed and spirited debate, tempered with a moderator that is an expert in cryptography, identity and applied authentication models across information and physical domains. Integrating Millennials Into Security Organizations: Today, one in three workers is a millennial, but millennials represent only a fraction of membership in security professional associations. This highly interactive session will feature a simulation in generational dynamics with a panel discussion from three generations of security practitioners: Baby Boomer, Gen Xer and Millennial. Meet the Jetsons: Understanding the Promise and Challenges of Smart Cities: Smart cities are now a reality, not just in the U.S., but across the globe. This session will address issues of technology governance to ensure that smart systems are protected and able to serve their human masters without impinging on privacy and civil liberties. How to Adapt to Address Drone Security: With the rapid deployment of small drones across the globe, security organizations are scrambling to become familiar with the threat they represent as well as with ways to use this new technology as a force-multiplying asset. Learn from drone industry professionals and a physical security design engineer about the realistic applications of drone systems and counter-drone solutions that can protect organizations and facilities. Smart Cities, Smart Buildings and the Evolution of the Converged Security Approach: This transformative session will discuss the future of security from the managing of traffic lights/traffic flow, power grids, ports and transportation systems. Included in this conversation will be the understanding of the use of cameras, access control, gunshot detection, open source intelligence social analysers (OSINT), Internet of Things devices, cyber information, video management, predictive maintenance for critical infrastructure and entry solutions. Vendor Solution Sessions In addition to programming with SIA, ISC West offers complimentary hands-on Vendor Solution Sessions and Unmanned Security educational sessions, including: Unmanned Theater: Drones 2.0 - The Next Generation of Flying Robots Unmanned Theater: Multi-Layer Security: Requirements of a Drone World Unmanned Theater: Cyber-Physical Security: How to Evaluate A Counter-Drone System Axis Communications: From Campuses to Communities: How Smart Technologies Are Driving Our Future Intel: Intel OpenVINO Toolkit Workshop Verkada: Modernising Enterprise Video Security Smart City Technology In addition to the standard education sessions, ISC West and SIA will be holding the SIA Women in Security Forum Breakfast @ ISC West on Friday, April 12 "It's our ongoing mission to arm attendees with the knowledge, strategies and tactics they need to make the most informed decisions possible when dealing with today's cyber-physical and public safety security threats," said Will Wise, group vice president, security portfolio at Reed Exhibitions. "This year, we have many new speakers and are covering a gamut of topics – from drones to stadiums security to the developments with smart city technology – facilitating thought leadership between security industry peers looking to advance their knowledge on the most pressing issues." In addition to the standard education sessions, ISC West and SIA will be holding the SIA Women in Security Forum Breakfast @ ISC West on Friday, April 12. Attendees will enjoy featured remarks from Juliette Kayyem – Belfer lecturer in international security and faculty director of the Homeland Security Project at the Harvard Kennedy School, national security analyst for CNN and CEO of Zemcar, – in addition to networking and complimentary breakfast. Robust Education Program Kayyem previously served as President Obama's assistant secretary for intergovernmental affairs at the U.S. Department of Homeland Security and as Massachusetts Governor Deval Patrick's homeland security advisor. "Sharing new knowledge on emerging trends, technologies and best practices in security is the cornerstone of the SIA and ISC West partnership," said Elli Voorhees, Ph.D., director of education for SIA. "Our robust education program offerings cover a wide range of topics that appeal to all ISC West attendees – from product manufacturers and integrators to professionals supporting sales, marketing, IT and business operations efforts. Our goal is foster peer-to-peer learning on the most current technological and physical security solutions and business practices, providing attendees with essential information to help them improve organizational performance and gain a competitive advantage in the marketplace."
Avigilon Corporation (“Avigilon”), a Motorola Solutions company, announced that the Avigilon H4 IR PTZ (Infrared Pan-Tilt-Zoom) camera has been selected as one of the recipients of Asmag’s Buyer’s Choice Awards for 2018. Winning in the network cameras category, the Avigilon H4 IR PTZ camera line combines patented Avigilon self-learning video analytics with zoomable infrared (IR) technology to provide broad coverage and exceptional image quality in a range of lighting conditions and environments. The H4 IR PTZ camera’s powerful zoom lens and IR technology allows users to see up to 250 meters (820 feet) in complete darkness. Rugged Housing Available in 1.3 MP (45x zoom) and 2 MP (30x zoom) camera resolutions, the H4 IR PTZ features continuous 360-degree rotation, enabling operators to more easily zoom in and out to capture and monitor activity in almost any direction. It also features an optional wiper to keep the window surface clear of moisture and a rugged housing design for tough environments, making it well suited for a wide range of applications. Gaining Visitor Traffic “We are honored to receive this recognition for our H4 IR PTZ camera,” said James Henderson, Avigilon’s President. “This camera provides our customers with a versatile surveillance solution, that delivers exceptional image quality and area coverage, offering the detailed evidence needed to effectively respond to security events.” The winners of the Buyer’s Choice Awards are companies who gained the most visitor traffic on their product pages, as well as the highest number of votes from global security buyers and system integrators.
Booth number: 11053 At ISC West, Bosch Security and Safety Systems will showcase how intrusion and fire detection, video surveillance and analytics, access control, and communications technology work together to deliver increased security, more efficient monitoring and control, automated audio announcements, and valuable data that extends beyond security to deliver clear business advantages. Bosch’s solutions solve challenges in retail, critical infrastructure, transportation, smart city, and many other markets Visitors will be able to grab a free snack in the Bosch Marketplace and experience solutions to reduce theft, improve parking management, enhance warehouse and dock security, detect outdoor risks, and more. Bosch’s solutions solve challenges in retail, critical infrastructure, transportation, smart city, and many other markets. For more about their presence at ISC West, we contacted Chelsea Render, Director of Marketing, North America for Bosch Security and Safety Systems. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. Our history at ISC West goes back more than 30 years, when we exhibited under the RCA and Detection Systems brands, prior to the Bosch acquisition of these companies. Over the years, our booth size has grown, and we've refined and enhanced our presence at the show to make the most impact. From parking a double expandable tractor trailer on the show floor to building a mini retail store within the booth, we're always improving to give the customer the best experience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? This year, we'll have a mini retail store, complete with a parking lot and loading dock, to show how integrated solutions improve safety and security At the Bosch booth, we create immersive experiences. This year, we'll have a mini retail store, complete with a parking lot and loading dock, to show how integrated solutions improve safety and security, reduce shrink, and help retailers improve merchandising and operations. For example, visitors can simulate a blocked exit door within the store to experience how video analytics can trigger a warning to play over the public address system. In addition, a truck approaching the dock will cause video to display on the operator's monitor, and a dock door left open will trigger an alert to the warehouse manager. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? We track the number of leads from the show, but we're primarily interested in the quality of leads. Within a few days after the show, we contact all visitors to the Bosch booth or our events to ensure they received the information they need and to determine if we can assist them further. We see ROI when customers have an ‘aha’ moment at the booth as they experience our integrated solutions and understand how they can solve pain points within their organizations or for their customers. This helps build awareness on the full breadth of the Bosch portfolio. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Each year, Bosch hosts free educational sessions in a ballroom at the Venetian. Here, we provide attendees with breakfast and an informative discussion on the latest trends and technologies. We also sponsor the Mission 500 Security 5K Run/2K Walk, supporting children and families in need This year, we will have a session on rising connectivity and the impact of the IoT on security, privacy, and data, and a session on how integrated solutions work together to improve security and provide more efficient monitoring and control. Attendees interested in these events can email for a registration link. We also sponsor the Mission 500 Security 5K Run/2K Walk, supporting children and families in need. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? As the largest security industry trade show in the U.S., ISC West provides the opportunity to meet with integrators, end users, consultants, and more. We consistently have heavy traffic at the Bosch booth and are able to speak with many of our customers, meet new prospects, and interact with specifiers and consultants. The high number of attendees, broad audience, and quality interactions sets ISC West apart from other trade shows.
Booth number: 13115 LifeSafety Power is the innovator and originator of a new category of intelligent networked power solutions that provide robust, proactive analytics to access control, security and mission-critical devices. With LifeSafety Power, integrators and end users gain unprecedented visibility into overall health, integrity and reliabilityWith this new standard of power performance created by LifeSafety Power’s modular solutions, security companies can achieve a 77% increase in installation and troubleshooting efficiency while providing lower total cost of ownership to the end user and remote monitoring and management of power which produces new streams of RMR. With LifeSafety Power, integrators and end users gain unprecedented visibility into overall health, integrity and reliability, which ensures greater system uptime. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. LifeSafety Power was formed in 2009 and first exhibited at ISC West in 2010. We started with a 10x10 booth as a testing ground, and today have a 20x20 booth with the latest solutions on display and live demonstrations — a far cry from our first simple tabletop. We weren’t sure how we would be received, as there were no other companies going in the direction we were: networked power systems. The first year and a few after were tough trying to get established in the industry — but we continued to focus on communicating our value-add proposition. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We schedule meetings with end-users so they can see the latest offerings and products and how they might be applied to their particular business or facilityWe do extensive planning, many months prior, to get the most out of the show. We continue to upgrade and revamp our booth to showcase the latest solutions, technology partnerships or to focus on the products that provide solutions to integrators and customers in specific vertical markets. We schedule meetings with end-users so they can see the latest offerings and products and how they might be applied to their particular business or facility. We have users from around the world who specifically come to see us at the show — an affirmation of the global presence of LifeSafety Power. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Success is seeing attendees four or five deep at our booth — excited and interested in our solutions. We talk to attendees and ask them what they are using and how we can assist. We have customers who bring colleagues from other companies to see our products — a great way to solidify our success. They start explaining the product to others — and we just let them give the pitch, because that’s the best kind of referral there is. The ROI is in the growth of our network. We don’t sell at the show — we network, educate, listen and learn. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We attend industry-sponsored events like the Interop Fest by SIA and network outside the show floorWe don’t organize any specific company activities outside the show floor, but our sales team is hopping throughout the conference. We attend industry-sponsored events like the Interop Fest by SIA and network outside the show floor, meeting with current and potential customers. We’re here to tell our story — and our sales team hits it hard throughout the event. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is a big security show. It’s the only one we do with our booth — we do many other shows but those are primarily smaller conferences or events with tabletop displays. This is the show that continues to grow and address the rapid changes occurring in the technology sector and IT and how this is trickling down to the physical security industry. We used to do two big shows a year, but now have settled on ISC West because of the qualified attendees, ongoing growth of the event and the ability to network with current and prospective customers.
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-Based Products We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile Credentials Applications We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customized action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future Of Biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video Management Platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access Control World An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
Should ‘Made in China’ be seen as a negative in security systems and products? It’s an important and complex issue that merits a more detailed response than my recent comment in the Expert Panel Roundtable. For me, there are two sides of the answer to this question: Buying products that have certain negative attributes that are not in alignment with some part of a belief system or company mandate. Buying products that do not perform as advertised or do something that is unacceptable. For integrators and end users making the buying decisions, the drive to purchase products may not be based on either aspect and instead on the product that can do the best job for their business. But for others, a greater emphasis on the ethical implications of purchasing decisions drives decision-making. What Is Ethical Consumption? Ethical consumption is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favoredEthical consumption — often called ethical consumerism — is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favored, and products that are ethically questionable may be met with a ‘moral boycott’. This can be as simple as only buying organic produce or as complex as boycotting products made in a totalitarian regime that doesn't offer its citizens the same freedoms that we enjoy in the United States. Consider the goals of the Boston Tea Party or the National Consumers League (NCL), which was formed to protect and promote social and economic justice for consumers and workers in the United States and abroad. Some examples of considerations behind ethical consumption include fair trade, treatment of workers, genetic modification, locally made and processed goods, union-made products and services, humane animal treatment, and in general, labor issues and manufacturing practices that take these factors into account. Increase In Ethical Consumption The numbers show that ethical consumption is on the rise. In a 2017 study by Unilever, 33 percent of consumers reported choosing to buy and support brands that they believe are doing social or environmental good. In the same study, 53 percent of shoppers in the United Kingdom and 78 percent in the United States said they feel better when they buy products that are ‘sustainably’ produced. There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities Though the aforementioned question that sparked this conversation centers around concerns with products made in China, there are many other countries where, for example, governments/dictators are extremely repressive to all or parts of their populations, whose products, such as oil, diamonds, minerals, etc., we happily consume. There are also a number of countries that are a threat in terms of cybersecurity. It may be naive and simplistic to single out Chinese manufacturers. Impact On Physical Security Products Product buying decisions based on factors other than product functionality, quality and price are also starting to permeate the security marketplace. While this hasn't been a large focus area from the business-to-business consumption side, it's something that should be considered for commercial security products for a variety of reasons. Hardware hacks are more difficult to pull off and potentially more devastating" There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities. Last fall, 30 U.S. companies, including Apple and Amazon, were potentially compromised when it was discovered that a tiny microchip in the motherboard of servers built in China that weren't a part of the original specification. According to a Bloomberg report, “This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.” This, along with many other incidents, are changing the considerations behind purchasing decisions even in the physical security industry. Given that physical security products in general have been lax on cybersecurity, this is a welcome change. Combating Tech-Specific Threats In early January, members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors and ensure U.S. technological supremacy by improving interagency coordination across the U.S. government. The bill creates the Office of Critical Technologies & Security at the White House, an indication that this issue is of critical importance to a number of players across the tech sector. Members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors To address a significant number of concerns around ethical production, there are certifications such as ISO 26000 which provides guidance on social responsibility by addressing accountability, transparency, ethical behavior, respect for stakeholder interests, respect for rule of law, respect for international norms of behavior and respect for human rights. While still emerging within physical security, companies that adhere to these and other standards do exist in the marketplace. Not Buying Products Vulnerable To Cyberattacks It may be counter-productive, even irresponsible, to brand all products from an entire country as unfit for purchasing. Some manufacturers’ products may be ethically questionable, or more vulnerable to cyberattacks than others; so not buying products made by those companies would make sense. The physical security industry might be playing a bit of catch up on this front, but I think we're beginning to see a shift toward this kind of responsible buying behavior.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-Readers Simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 Encryption Ensures Cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labor from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting Requirements Of FICAM Guidelines SIA is pushing to make the latest OSDP version a standard recognized by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organizations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognized by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organizations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
A hyperconverged infrastructure is a software-defined environment in which various elements of a physical security system – computing, storage and networking – are combined together and run more efficiently on fewer hardware devices. Rather than each element of a system being represented by a physical hardware device, those elements are combined on a cluster of hardware devices. Hypervisor software separates a computer's operating system and applications from the underlying physical hardware. The elements continue to function as before, and software keeps them separated virtually, while also enabling the system to run more economically on less hardware. Virtualization Within Hyperconverged Systems Hypervisor software separates a computer's operating system and applications from the underlying physical hardware Software companies such as VMWare, Microsoft Hyper-V and Nutanix provide virtualization software that enables hyperconverged systems in the IT world. However, bringing hyperconverged systems to the world of video surveillance requires special handling, and security integrators may not be aware that hyperconverged software from the IT market does not work seamlessly with video data. Specifically, these hypervisor software systems have latency problems that are not compatible with video. Therefore, hyperconverged software systems must be adapted to meet video’s needs. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations of security integrators and end users while also providing economic and operational advantages of hyperconverged systems. Why A Virtual Machine Can Aid Your Server Solution A hyperconverged system can transition a stack of 10 or more application servers down to three servers, with all the applications still virtually separated on fewer machines. Each server is used to 100 percent of its capacity, which is more efficient. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations Both operating and maintenance expenses are lower, and if more computing resources are needed for a virtual machine, the software interface enables an end user to allow more processing power, RAM or disk space to that application. Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses. When a video system is working on a hyperconverged cluster, what happens if there is a hardware failure? The virtual system gets moved to a cluster that is working, but there might be a 30-second gap in video, which would not be acceptable for a critical application. All video must therefore be saved in two places. Virtualized Server Stacks From BCDVideo BCDVideo has entered into an engineering partnership with Scale Computing to develop an optimized hypervisor based on Scale Computing’s HC3 software that is also efficient for writing video.Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses Virtualization in the physical security market can create traffic patterns that are unlike traditional IT, and changes need to be implemented to accommodate for that. To avoid a “bottleneck” that can occur during the virtualization process, the virtual machine and the underlying physical hardware must be optimized to account for the virtualization process. “Performance and high-availability are critical in the video surveillance market and not all HCI solutions will adapt to video data,” said Dan Pierce, VP of Strategic Sales at Scale Computing. “With Scale Computing’s HC3 platform and BCDVideo’s ‘purpose built’ approach, customers will benefit from a solution that’s adapted to meet industry wide requirements while simplifying the management and maintenance of their infrastructure.” Hyperconverged infrastructure will become more and more prevalent in the video market, especially for large systems that have high camera counts and longer video retention times. Hyperconverged systems offer a more efficient use of resources and save costs because hardware is more fully utilised. Previous problems of using hyperconverged systems for video have been solved, which paves the way for much more widespread deployment. Over time, we should expect hyperconverged system to become more common for larger video installations, such as gaming, sports arenas, large cities, universities, corporate campuses and airports. The key to success is applying knowledge both of the needs of video systems and of how hyperconverged systems can be adapted to meet those needs.
Anyone looking to ensure customer satisfaction in the video server market for security integrators and end users need look no further than the supply chain. Eliminating the inconsistencies and time delays in the supply chain is a key strategy to ensure customer success, and certified systems builders can provide extra value in the process. Tom Larson, Chief Technology Officer, BCDVideo, says supply chain issues impact customer satisfaction for integrators and end users at all stages of an integrator’s job – at presale, during deployment and for after-sale support. Data capture form to appear here! Stage One: Presale Sticking with large, enterprise-grade server manufacturers like Dell and HP guarantees the widest possible selection of high-quality products For an integrator commissioning a video job, a systems builder can provide a wide selection of server and networking products – including the exact needs of any application – through an association with a large-scale OEM (original equipment manufacturer). The scale of the manufacturer also ensures the quality of products; each individual component is made by the same manufacturer so quality and compatibility of the assembled product are givens. In contrast, a generic, non-branded, do-it-yourself server product might be assembled from components made by various no-name manufacturers in an approach reminiscent of Frankenstein, a mixed bag of parts on the inside. Sticking with large, enterprise-grade server manufacturers like Dell and HP guarantees the widest possible selection of high-quality products, says Larson. Stage Two: During Deployment After an integrator specifies a system, the deployment stage again relies on effective management of the supply chain. In this case, it’s the systems builder that ensures immediate availability of needed server and networking products that are pre-tested and preconfigured before they are delivered to the job site.Creating a close relationship between integrators and their systems builders provides added confidence to integrators that their needs will be met Servers are imaged with the customer’s choice of video management software before they are shipped – it’s another time-saver for customers. Buying direct from a large manufacturer might involve longer lead times, especially if there is a huge amount of equipment involved. In contrast, systems builders can make the process easier by keeping proper levels of inventory on hand and generally ready to be shipped to a customer’s site, within three to five days as needed. If the unexpected occurs with an installation, equipment is needed immediately. In critical situations, additional servers can be pulled from inventory, benched, properly configured, and overnighted if required for a project. A financially solid systems builder can also provide more favorable payment terms, such as net-30 or net-60, to help integrators with cash flow. Creating a close relationship between integrators and their systems builders provides added confidence to integrators that their needs will be met in a timely and professional way. The ability to return equipment within 60 days of purchase for any reason and with no questions asked saves time and also reduces the integrator’s risk. That’s another added service systems builders can provide. The system builder is encouraged to raise high expectations among their integrator customers during deployment and then work to meet, and even exceed, those expectations.All along the supply chain, their certified systems builders facilitate value to integrators and ultimately the end users Stage Three: After-Sale Support If a system component fails two years from now, how quickly can the component be replaced? Large server OEMs maintain seven years of components after a product’s end-of-life, thus ensuring the availability of replacement components. The systems builder again plays a role in making sure that replacements are kept on-hand and can be shipped at a moment’s notice. Another supply chain benefit when it comes to after-sale support is the world-wide availability of on-site technical support provided through large OEM server companies. All along the supply chain, their certified systems builders facilitate value to integrators and ultimately the end users, says Larson. This ensures rapid availability of equipment, flexible payment terms, expertise with system configuration, and the nurturing of a close working relationship with integrators. OEMs provide dependable products to build on, a long-term commitment to providing replacement components, and on-site technical service all over the world. The combination meets the market needs of security and video system integrators and ensures satisfaction of their end user customers.
Security integrators are often tasked with a multitude of responsibilities which could include a variety of installation, integration or design tasks made up of sprinkler systems, fire alarms, access control, HVAC, video surveillance systems and networks; and then pile on maintenance, training and analytics. Traditionally, most security integrators have installation backgrounds but are now expected to be IT savvy, too. Even the most proficient IT professionals may not fully grasp the complexity of adapting computer servers for use with video systems. It’s not the area of expertise of security integrators as the complexities between IT data and video data are significant. Therefore, security integrators depend on system builders to provide solutions to meet the needs of video systems expertly and with few hassles. It’s a simple enough ask, but not so easy to deliver. Tom Larson, Chief Technology Officer, BCDVideo, lists some of the challenges: Data capture form to appear here! The Gap Between Reality And Customer Expectations End users should expect a security integrator to provide services and a wide product line to ensure the right equipment for any size job Sometimes there is a gap between what a security integrator expects from a video surveillance solution (in terms of validation testing, dependability, technical support) and the performance of available choices, especially in the case of low-cost or generic equipment. Extra service and support are needed to bridge the gap. Unfortunately, some manufacturers entering the market have failed to deliver, and integrators (and their end user customers) have paid a price. The Network Is Often Overlooked Security integrators should pay special attention to engineering the network and calculating the bandwidth and storage needed for video projects, especially given how technology evolves so quickly. Security is an appliance-driven business, and integrators who just want to add another server to expand storage or functionality without configuring the network run the risk of i/o bottlenecks and other system failures. End users should expect a security integrator to provide services and a wide product line to ensure the right equipment for any size job. Unfortunately, traditional IT resellers are often married to a singular solution limiting their knowledge of a good fit for the job. Buying a video server based on a low price aggravates the problem, as “Frankensteined” or generic servers tend to generate additional costs over time Servers Are Mistakenly Considered A One-Time Expense One mistake purchasing agents make and security integrators have a hard time quantifying is viewing video storage as a capital expense (as one more component of a security system) rather than considering ongoing operating expenses. Buying a video server based on a low price aggravates the problem. “Frankensteined” or generic servers tend to generate additional costs over time, such as firmware or supply chain issues, and some systems builders have failed to provide support to offset those costs. In fact, the high costs over time of supporting inexpensive servers have been unsustainable for some system builders, who have left integrators and end users holding the bag, and in some cases, the liability. Adapting To Sustainable Strategies “Systems builders to the video surveillance market must adapt and invest to meet the demands of security integrators’ expectations, and they need a business model that enables them to provide a substantial level of support and commitment,” says Larson. “Working with high-quality manufacturers and providing tried-and-tested, certified equipment upfront ensures manageable costs over the life of the system. Products that are fully tested and contain no firmware bugs ensure smoother installations. By providing adequate technical support to the security integrator and managing IT variables over the life of the system, the systems builder makes it possible for a security integrator to specify and install a video server as easily as any other system component.” Keeping IT professionals on staff to deal with server issues is cost-prohibitive for security integrators Taking a longer-term view and considering total cost of ownership is a more sustainable strategy for integrators, says Larson. Investing upfront in a higher-quality server is rewarded by dependability and lower service costs over the life of the system. And the lower costs of supporting a higher-quality server create a more sustainable business model for the integrator, thus ensuring the integrator and end user will have ongoing support. Adapting Server Technology To Video Applications Security integrators deliver a different skill set than IT integrators, who tend to be more hands-on in terms of updating firmware and providing maintenance. Keeping IT professionals on staff to deal with server issues is cost-prohibitive for security integrators, who therefore depend on systems builders to provide that expertise. They develop a long-term relationship with a systems builder they can depend on to meet their needs for each job. Larson says the best scenario for a security integrator is a combination of a high-quality server systems builder that understands the specific needs of the security integrator market. Adapting server technology to video applications requires knowledge of both disciplines. Dependable technology adapted to the needs of the video channel ensures successful installations and happy, long-term customers.
Kunsthalle Mannheim is a museum in Germany which contains a major collection of important art. Reliable technology, integrated in a networked solution from Bosch, ensures all-round protection on a total of 3,600 square meters of exhibition and storage space. A special focus of this is optimally safeguarding people and property without interfering with visitors’ encounters with priceless works of art. Customized Security Solution And Integration Since its inauguration in 1909 over a century ago, Kunsthalle Mannheim has acquired a global reputation as a very special place to experience modern art. The complex comprises a building in Art Nouveau style dating from 1907, underground storage rooms, a main building, and the newer Hector Building, completed in 2018. Coinciding with the opening of the Hector Building, a customized security solution installed and integrated by Bosch experts also debuted. The system’s components are almost invisibly connected with the various exhibition areas. The modular alarm system UGM 2040 and around 260 state-of-the-art video cameras monitor the interiors of Kunsthalle Mannheim as well as the open areas around. Fire Protection All of the security equipment is controlled by the Building Integration System from Bosch Comprehensive fire protection is provided by a fire alarm system spanning 700 detection points. There are 330 speakers in case it should ever be necessary to evacuate visitors and employees. All of the security equipment is controlled by the Building Integration System from Bosch. Modular Alarm System Thanks to this new solution, Kunsthalle Mannheim is facing the future with confidence. The modularity of the alarm system UGM 2040 allows fast, cost-effective implementation of modifications and extensions. Professional service technicians from Bosch regularly maintain it and perform any required repairs to ensure highly reliable operation and low overhead.
Aston University, Birmingham, is transforming security and safety with the introduction of SafeZone for students and staff on campus and those traveling globally. The SafeZone solution, from CriticalArc, will put users directly in touch with the university’s security control room using their mobile phone, enabling them to request help, trigger an emergency response, receive rapid notifications in the event of emergencies and benefit from a wide range of customer-care services. SafeZone was selected following a detailed comparison of alternative systems, says Mark Sutton, Head of Security and Emergency Planning at Aston University. Resource Management Capabilities “While some alternatives offered individual features that were attractive, none of them combined all the functions and benefits in the way that SafeZone does,” he says. What we are investing in is a comprehensive solution that allows our security team to engage much more closely with students and staff" “What we are investing in is a comprehensive solution that allows our security team to engage much more closely with students and staff, and to work in a more integrated way with the university’s various departments and within its senior management structure. It also gives us important additional functions including lone worker protection and resource management capabilities.” The technology works by letting Aston’s control room operators pin-point the locations of individuals who elect to check-in using a simple app on their smart phones, including staff, students, service users and members of the security team. Reporting Suspicious Activity This app makes it easy for students, staff and school’s using the system to communicate directly with security responders, calling for help, asking for advice, reporting suspicious activity etc. And in return security teams can send out alerts and safety instructions to groups or individuals, in specific locations, as individuals or by specified user type. Notifications can range from helpful advice to alerts regarding specific threats. Officers responsible for emergency response management can also monitor activity patterns of those who choose to check-in, seeing where people are gathering during an incident for example. And they can co-ordinate resources, keeping track of where known first aiders are, or seeing exactly how team members are deployed, minute by minute. Significant Placements Program The benefits of SafeZone bring together features found in an assortment of systems – including lone-worker protection - making them available in a unified, scalable package. There are also new options for users to collaborate with the growing global network of SafeZone system operators. At Aston University stakeholders such as the students’ union, staff and department heads have been fully engaged in the roll-out of the new system At Aston University stakeholders such as the students’ union, staff and department heads have been fully engaged in the roll-out of the new system. “Safety is a big issue, particularly for city center campuses,” says Mark Sutton. “Prospective students and parents want to know how well we look after our community, so we see SafeZone as an important new benefit.” Aston also has a growing international reputation and a significant placements program, with students and staff traveling around the world to work. Safety Monitoring With the ability to ‘geo-fence’ any location in the world that has a signal, the university’s security team will now extend the same level of customer care and safety monitoring to all users, whether they are on campus, in accommodation blocks or associated sites around the city, or working abroad, says Darren Chalmers-Stevens, Managing Director EMEA and APAC for CriticalArc. “We are delighted to be working with Aston University’s security and emergency response team to help them provide the best available monitoring and protection for all their people, in all situations and wherever they are. In addition, they are benefiting from a wide set of extra functions which would otherwise have to be purchased separately - including lone worker protection and health & safety compliance.” There are also important, emerging benefits which CriticalArc is developing alongside its community of users, confirmed Darren Chalmers-Stevens. “These were discussed during our recent two-day user group conference in February.”
A 300-plus camera city center video surveillance scheme in Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The previous analog-based CCTV system was more than 20 years old and had become expensive to maintain, so City of Lincoln Council decided to replace the analog cameras and transmission equipment with HD digital equipment. The total cost of ownership has been reduced by the savings made on legacy fiber lease costs, as well as reduced energy consumption and the ability to configure and maintain the cameras remotely. Installation Of IP Full HD System The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020The design of the new all-wireless encrypted system was based around delivering flexible technology, reducing the total cost of ownership, ease of installation, lower maintenance requirements, smart edge analytics and remote connectivity. Environmentally friendly aspects of the project included specifying lower-energy equipment, integrating remote support and recycling hardware wherever possible. The council employed independent consultants Lever Technology Group to help them ensure they had a robust and future-proof radio network design. The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 – which seeks to drive innovation in the city and harness new technologies to improve the lives of citizens. One of the results is the provision of free Wi-Fi in the city, working alongside the Dahua cameras using the same IP wireless network. Bandwidth Efficiency Using H.265 Compression A combination of fixed and PTZ cameras were installed over a new 1GB duplex network. These include cameras from the Dahua Pro series, which features high image quality, bandwidth efficiency using H.265 compression and excellent low-light performance. Bullet cameras from the Ultra series – with powerful optical zoom, IR distances of up to 50 metres and software which supports people-counting and heat-mapping – were also installed. The design of the scheme incorporated both camera and server-side analytics with legacy motion and audio detection The bandwidth efficiency of the cameras meant that multiple cameras could be installed in any given position, providing 360° coverage of locations and up to 20 Megapixels of video capacity per location – compared with less than 400,000 pixels with the previous analog cameras. The design of the scheme incorporated both camera and server-side analytics, including video content analytics, facial recognition, ANPR, heat maps and pedestrian counting, as well as legacy motion and audio detection. The objective of the facial recognition aspect is to support operators in areas such as the search for missing and vulnerable individuals. PoE Switches For Providing Power The superior image quality of the new system is borne out in figures which show an increase in ‘actionable’ images from 5% with the previous system to 60% successful reviews with the new one. Dahua PoE switches were also installed to provide power to the cameras, which are then connected to a layer-2 network. A new video wall comprising ten Dahua DHL49-4K LED backlit 49-inch 4K Ultra HD video wall display units featuring industrial level wide-viewing LCD panels, was fitted into a newly refurbished control room in City Hall and connected to i-Comply wonderwall video display drivers. This is a great collaboration of key project partners that have a tried-and-tested pedigree and working relationship with Videcom Security"Supplied through authorized distributor Mayflex, the entire system was installed by public space CCTV specialists Videcom Security, which worked with other partners to provide a high-performance, efficient and feature-rich system. Cost-Effective And Reliable Equipment Bill Mead, Managing Director at Videcom Security, said that working largely with Dahua video equipment meant it was easier for engineers in terms of configuration, as well as being cost-effective and representing good value for money. “Working with the Dahua product range has been great. The products have proved to be reliable and we experienced very few problems, from the initial configuration through to installation and commissioning. “This is a great collaboration of key project partners that have a tried-and-tested pedigree and working relationship with Videcom Security. We broke new ground with the development of 4K H.265 decoding, the support through Luxriot for camera-side analytics and edge recording, and the development by Dahua of camera-to-camera communication, allowing for non-connected systems to communicate locally.” Infinet 5GHz And Siklu E And V Band Radios Videcom Security is a certified Dahua Integration Partner, training for which was delivered both by Dahua and the Mayflex AcademyDahua is a solution provider in the global video surveillance industry and associated technology and has a keen focus on innovation by investing heavily in research and development. For the Lincoln city scheme, its products were selected based on their performance and cost-effectiveness to meet project budgets. Videcom Security is a certified Dahua Integration Partner, training for which was delivered both by Dahua and the Mayflex Academy. This helped Videcom negotiate key firmware enhancements, which added to many of the analytical features available in each of the cameras. The wireless network is built with Infinet 5GHz and Siklu E and V band radios. Resilience and diverse routing has been built into the network design, which supports video surveillance as well as public Wi-Fi and capacity for smart city services. Luxriot have worked closely with Dahua, supplying their Evo Global video management system and supporting edge analytics integration through their ‘events and actions’ management, which has also been integrated through to i-Comply’s VTAS CRVMS software (now rebranded as Viewscape). Real-Time Control And Video Streaming The Dahua system implemented by Videcom Security provides the main elements of our tier-1 solution"The introduction of H.265 compression was ground-breaking for such a project, with the system capable of displaying 4MP and 6MP H.265 to the operator’s spot monitor with real-time control and video streaming. “The Dahua system implemented by Videcom Security provides the main elements of our tier-1 solution,” said Martin Byrne, CCTV Team leader at Lincoln City Council. “The police are extremely pleased with the system and we’ve had very positive feedback from them. “There is really no comparison from how we operated previously to how we can now. It revolutionizes how we manage the CCTV systems and data. The potential for what we can achieve going forward is remarkable. We have now started to get real results from the investment in analytics; in particular vehicle and people-counting has been deployed and data is used to enhance other city projects.” Martin added: “Dahua has taken time out to visit and discuss with us our ambitions for smart city services. We have adopted Dahua as our brand of choice for CCTV cameras and have so far been very pleased and impressed with their reliability, low-light performance and overall image quality.”
On December 11 to 16, 2018, the 14th FINA World Swimming Championships was held at the Olympic and International Expo Center in Hangzhou, China. Nearly 1,000 world swimming stars from 178 countries and regions competed here, creating a new glory with breaking 9 world records and 22 event records. The Chinese team won three gold medals, five silver medals and five bronze medals with the total medal number ranking the third in the world. The World Swimming Championships is one of the world's highest-level international swimming events. It is also the highest-standard individual international sporting event ever held in Hangzhou. For an international sporting event of this scale, the safety and security of the venues are of paramount importance. Security Monitoring Equipment As an important guarantee force for the security of the World Swimming Championships, Dahua Technology ensured the event’s safety with the host spirit and a great sense of responsibility. Dahua Technology once again shouldered the mission of guarding international events after successfully guaranteeing the G20 Hangzhou Summit. Dahua Technology provided a complete set of professional intelligent security monitoring equipment and system solutions In the periphery and outside of the venue, important entrances and exits, various passages and commanding points in the venues and security commanding headquarters, Dahua Technology provided a complete set of professional intelligent security monitoring equipment and system solutions, assisted the security department to establish security command headquarters, refined the security deployment of the venues and realized the full coverage of security monitoring from the periphery to the stadium and from the bottom to the commanding heights, facilitating the safe and smooth host of the 2018 Hangzhou FINA World Swimming Championships. Intelligence Equipment At the venue of the 2018 Hangzhou FINA World Swimming Championships - the surrounding area and interior of the Hangzhou Olympic and International Expo Center, Dahua Technology has teamed up to deploy a number of professional intelligent HD PTZ cameras, fiber cameras, bullet cameras, domes, transmission and other intelligence equipment, covering all areas within the venue, which helped the security department to control all corners inside and outside the stadium in real time so that to ensure the safety of the venue and the event. Dahua Technology combined the requirements of ‘first-class venue facilities, first-class organization guarantee, first-class opening and closing ceremonies, and first-class city image’ in the Championships, focused on key links and built a set of intelligent security video management system with the support of advanced technology platform. Integrated Control System It integrated control system, storage and management, and enjoyed the advantages of simple deployment and operation, flexible combination, excellent performance, and a high level of security and stability. It turned the cameras inside and outside the stadium into ‘smart brains’ to guarantee the safety of every corner of the Championships, meeting the high-level security needs of the event. Dahua Technology set the command and dispatch of the security department as the core At the security command headquarters of the site, Dahua Technology set the command and dispatch of the security department as the core, with high-definition tiled LCD screens as the display carriers and brought more intuitive and flexible display and control to the security management of the venues before and after the event to ensure the real-time handling, efficient command and visual control of the entire venues, thus winning the praise of the security department leaders. Display Control Equipment On the evening of December 16, the 2018 FINA Annual Awards Ceremony was held at the Hangzhou International Expo Center. As a ceremony of the most authoritative awards, with the largest scale and the greatest number of world-class swimming athletes in the global water sports field, Dahua Technology assisted the security units to reuse a large number of equipment around the venue, including intelligent cameras, storage, management platforms and display control equipment, making sure the ceremony was successfully being held. As an essential force in the escort 2018 World Swimming Championships, Dahua Technology actively devoted to the security work. Stationed professional and technical personnel were responsible for on-site equipment support, achieving zero failure of the equipment, successfully completion of the tasks, and winning the praise of the security department leaders.
CNL Software, a provider of Physical Security Information Management (PSIM) software, is pleased to announce that its award-winning PSIM technology was used to support a multiagency security program for Super Bowl LIII. The company’s IPSecurityCenter PSIM solution is installed in the Atlanta Police Department’s Video Integration Center (VIC) and helps secure the city and surrounding metro area, keep the metro area’s transportation networks and systems safe, and to help law enforcement personnel make sense of the huge volume of video intelligence that is generated day-to-day and during large-scale events like Super Bowl. Provide Law Enforcement Atlanta is no stranger to hosting large-scale events, which includes a previous Super Bowl, and has invested in a multitude of surveillance, analytic, data fusion, and communications systems and technologies in recent years. The City has also established an innovative public-private partnership, known as Operation Shield, that effectively leverages the surveillance assets and infrastructure of other participating Atlanta metro area departments and agencies, including the City’s Metro Atlanta Rail and Transit Authority (MARTA) and Hartsfield Jackson International Airport, and the City’s business community, while also bridging communication gaps between and across them. IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement and other public safety professionals with the data and video intelligence they need to effectively respond to incidents before they arrive on scene. Crowd Size Monitoring “Estimates are that nearly one million people traveled to Atlanta for Super Bowl Week. As with all major events, ensuring public safety and security is a big job and huge concern,” comments Mike Mostow, General Manager – Americas at CNL Software. “IPSecurityCenter was installed in the VIC by the Atlanta Police Department to provide the real-time situational awareness and decision support they need to ensure public safety and security during large-scale special security events like Super Bowl LIII.” IPSecurityCenter PSIM is installed in some of the largest public safety and security programs in some of the world’s largest cities. The platform enables the most intelligent integration of the widest range of disparate public safety, security, emergency management, and homeland defense system and sensor technologies, including video and video analytics, facial recognition, license plate recognition, crowd size monitoring, gunshot detection, chemical, biological, radiological/nuclear and explosives detection, geospatial mapping, and asset tracking.
MARSS NiDAR system has been selected to secure and protect a critical national infrastructure (CNI) site in the form of a major dam facility. The NiDAR command and control (C2) system has been selected to integrate a thermal camera and a sonar system to protect the dam from potential underwater and surface approaches. NiDAR is an advanced long-range surveillance system designed to protect maritime and land-based critical infrastructure from air, surface and underwater approaches. Tracking Objects In Real Time NiDAR is sensor agnostic, enabling it to integrate with any existing hardware or systems, and due to its modular design, not only does it meet the current contract needs, but it also offers the flexibility to meet any future expansions or requirements. NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time, of over 1000 known and unknown, air, surface and underwater objects thanks to the software algorithms. It can intelligently analyze and rank unknown objects to determine potential threat levels and automatically trigger the appropriate alert. When the user determined warning and alarm zones are breached the system can automatically or manual deploy integrated countermeasures to deter potential approaches and de-escalate threats. Enhanced Awareness Picture The intuitive C2 interface provides an enhanced awareness picture, in real-time, through a touchscreen user interface and multi touch control. Rob Balloch, Sales Director of MARSS said, “NiDAR was chosen for this critical national infrastructure as it is robust and suited to all environments, however challenging. Its high availability and reliability, low maintenance and cost effectiveness makes it the perfect choice for any future growth, or change of requirements, with minimum disruption.”
Round table discussion
A basic tenet of sales is ABC – always be closing. But it's a principle that most professional salespeople would say oversimplifies the process. Especially in a sophisticated, high-tech market such as physical security, the required sales skills are much more involved and nuanced. We asked this week's Expert Panel Roundtable: What unique characteristics are required of salespeople in the arena of physical security systems?
Cybersecurity continues to be a major theme in the physical security industry, but effective cybersecurity comes at a cost. Higher cost is contrary to another major trend in the market: lower product pricing, which some have characterized as a ‘race to the bottom’. Chinese manufacturers, whose products tend to have lower prices, have been the target of cybersecurity concerns and even a government ban. So what is the overall impact of cybersecurity on pricing trends in video products? We asked this week’s Expert Panel Roundtable: Are cybersecurity concerns slowing down the ‘race to the bottom’ (i.e., the dominance of lower-cost cameras)?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?