Security monitoring system
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing...
A video analytics system that provides ‘behavioral understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviors, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car th...
It seems like every day there is another school or public shooting incident in the US. It dominates the news and has become a point of stress and fear for many Americans. According to the US Department of Justice Federal Bureau of Investigation, in 2018 alone, there were 27 incidents across 16 states resulting in 213 casualties. There is a great deal the security industry can do to prevent such violent incidents and preserve life. Protection Layers In general, protection should be built in la...
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LMP-1802G-SFP and LMX-1802G-SFP Series. Antaira’s LMP-1802G-SFP and LMX-1802G-SFP series are industrial-grade equipment that is Ethernet ready to fulfill various markets’ edge-level networking applications in harsh and...
Security-Net, Inc., a network of security system integrators, is welcoming two new members, providing the organization with important geographic reach in the New York, New Jersey and Illinois areas. These two new additions increase Security-Net’s membership to twenty. New members include FE Moran Security Solutions, headquartered in Champaign, Illinois and Care Security Systems, based out of New York City. Their addition to Security-Net will bring extensive expertise in a diverse array of...
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Niagara Networks, the Open Visibility Platform pioneer, and L7 Defense, a cutting-edge cyber security vendor, announces that they have formed a partnership to bring Zero Trust security to API communication running across an organization’s network. The L7 Defense application runs directly on Niagara Networks Open Visibility Platform which provides it full access to network traffic. The Open Visibility Platform offers enterprises, for the first time, on-demand deep cyber defense into their visibility layer. Network performance monitoring Open Visibility Platform is the only solution to offer network visibility and agility Ammune™ API Defense by L7 Defense monitors and evaluates the risk of requests made through an API exchange regardless of their identity or source, establishing a dynamic Zero Trust model adapted to the transient nature of APIs and North-South or East-West traffic flows. The L7 Defense solution utilizes unsupervised machine learning to determine anomalous behaviours within API communication. The Open Visibility Platform from Niagara Networks utilizes its Packetron™ powered Network Packet Broker and hosts best-of-breed applications to create an intelligence-driven visibility layer. Open Visibility Platform is the only solution to offer network visibility and agility for security and network performance monitoring by marrying the best of switching fabric speed and functionality with scalable, high-end intelligent processing. Critical cyber security foundation This unique joint solution ensures full packet visibility integrated with L7 Defense, providing automated mitigation response against API-based vulnerabilities and ensuring a more efficient and simplified security infrastructure. Unprotected APIs have been an open loophole for attackers to gain a foothold in a network" “Unprotected APIs have been an open loophole for attackers to gain a foothold in a network and carry out an attack by having a conduit for undetected command and control communication, exfiltration or the use of the API for reconnaissance or lateral movement,” said Yisrael Gross, Co-Founder and Vice President of Business Development at L7 Defense. “This exciting partnership with Niagara Networks offers a critical cyber security foundation providing customers with a new level of visibility, transparency and management.” API-Based applications Ammune’s API Defense involves three key capabilities: Discover - Auto-discovery of the web, mobile and API-based applications that provide the potential attacking surface for API attacks. Detect - Auto-detection of outliers in API behavior using the Ammune multi-profile model, which is adapted to protect from the main attack-category threats. Defend - Ammune™ can be installed in-line for proactive responses or in a monitoring mode to alert security organizations to take action. “We are delighted to announce our strategic partnership with L7 Defense and help address a critical security gap,” said Yigal Amram, Vice President of Business Development and Sales Engineering at Niagara Networks. “L7 Defense joins a growing list of partners who see the new paradigm offered by our Open Visibility Platforms, to offer customers a new advanced and flexible security posture.”
Exacq has announced its integration with the highly rated monitoring station software, MASterMind. These technologies combined utilize video verification services to receive live video from the exacq Network Video Recorder when an event occurs, and sends a call to the monitoring station call center. Made possible through the Connected Partner Program, the exacqVision and MASterMind integration allows seamless collaboration of video into the dispatching process through MASvideo. This provides command centers and central stations the ability to coordinate incoming alarms with the associated video captured by cameras located at the monitored site: Features of the integration The integration provides powerful features such as: View live video linked to an incoming alarm Control single or multi image views Select between cameras utilizing PTZ camera features Record video within a single application The Connected Partner Program is designed for product manufacturers and software developers. This opportunity offers access to all the tools needed to build integrations with Tyco products, including software, hardware, documentation, sample code, dedicated engineering and marketing support.
Trackforce announces the launch of its new Command Center, which removes the need for security companies to have onsite supervisors at each customer site. The Command Center achieves this with its ability to intuitively capture, process, and display essential information from the field required by supervisors to perform their duties on an easy to navigate screen, irrespective of their location. Security workforce management The Trackforce Command Center equips security supervisors stationed at a central location with the capability to remotely monitor and manage individual or multiple officers and various security situations. It also delivers a unified threat analysis across multiple sites. Security supervisors now have quicker access to existing security resources needed to manage a situation and improve response times. The Command Center also ensures that there is greater oversight and control over client sites. The Command Center is suited to security businesses with clients in various vertical market sectors As a component of the broader SaaS Trackforce security workforce management platform, the Command Center is suited to security businesses with clients in various vertical market sectors. It is scalable and will support the security company through all its growth stages without negatively impacting already tight profit margins. Customer service level The Command Center is provided with a full set of features to all security companies irrespective of size, and all users become fully operational within a few days of the Trackforce platform’s implementation and customization. “The Command Center changes the security environment from being reactive to pre-emptive, so, security teams don’t have to wait for something to happen and can make proactive decisions,” says Guirchaume Abitol, CEO and Founder of Trackforce. “It does away with disparate solutions that supervisors previously used to monitor and enhance their decision-making capabilities. This results in improved operational readiness and business efficiencies for security companies. Service standards are maintained, SLAs are met, and security companies are able to optimize the capabilities of their security supervisors. This is a win-win for security companies at a management level, supervisors at an operational level, and clients at the customer service level.” Real-Time monitoring Supervisors realize enhanced situational awareness through real-time monitoring of security officers With a responsive view of security officers and developing situations at every level, the Command Center empowers supervisors to go from a broad, regional display to site-level data. Management can also opt to zoom in and monitor individual personnel activity at any time and contact, assist, and communicate with even the most remote officers using push-to-talk and mass notification communication capabilities. Supervisors realize enhanced situational awareness through real-time monitoring of security officers. With enhanced command and control capabilities, an officer or developing situation can be tracked in no more than two clicks, on a single screen, with fewer actions than previously required. Privileged user capabilities The system has built-in security and privileged user capabilities controlling who has access to specific functionality, customer data, and officers on client sites. Supervisors have the ability to monitor and manage individual officers and teams of officers, individual sites, or a group of sites in a city, a state, across the country, or globally if needed. Over the past two decades, Trackforce has risen to become a recognized global market leader by improving security officer operations and productivity while reducing cost and risk via innovative mobile and desktop applications. The company implements solutions for clients such as Allied Universal, Whelan Security, SecurAmerica, Inter-Con Security Systems, SOS Security, G4S, and many others.
Senstar, a provider of video management systems (VMS) and perimeter intrusion detection systems (PIDS), is pleased to announce its products were recently selected to protect five airports in various locations around the world. These sites join the list of hundreds of civilian and military airports currently using Senstar products. “Airport infrastructure and assets represent a vital economic engine for many cities and countries making them prime targets for vandals, thieves and terrorists,” said Senior Vice President and Chief Operating Officer Jeremy Weese. “Senstar products help to keep operations, goods and people safe and moving.” Improve security monitoring Senstar’s VMS, video analytics, and associated hardware reduce operator workload and improve overall security monitoring by automatically detecting persons of interest, items left in public spaces, crowd formations, and wrong way movement between landside-airside egress points. These technologies also streamline operations and centralize IT management in the cloud, saving time and money. While Senstar VMS and PIDS are open platforms designed for integration with a wide variety of systems" Senstar’s PIDS provide early warning of unauthorized entry onto airport grounds, including into sensitive areas within the apron such as aircraft parking, fuel storage, electrical substations, and navigation/communication equipment areas. “While Senstar VMS and PIDS are open platforms designed for integration with a wide variety of systems, they work even better together,” said Mr. Weese. Perimeter intrusion attempt Built-in integration enables security personnel to monitor a wide range of sensors and cameras from a single workstation, with the end result being simplified operator interfaces and reduced response times. For a real world demonstration on the benefits of integrated VMS and PIDS solutions, watch Senstar’s surveillance video of a recent perimeter intrusion attempt. The new airport projects use the following Senstar products: Symphony VMS (manages 250 cameras), Enterprise Manager software (centralized cloud management), Thin Client network video display appliances, Face Recognition, Automatic License Plate Recognition, Left and Removed Item Detection, Outdoor People and Vehicle Tracker analytics, FiberPatrol® fiber optic fence-mounted intrusion detection system, and OmniTrax® buried cable intrusion detection system.
Security 101, one of the nation’s fastest growing security integrators, continues to expand nationally with the addition of a new office in the San Francisco Bay Area. The office will serve San Francisco and the surrounding metropolitan area, and will engineer, install, operate, monitor, manage and maintain integrated security solutions for local small, midmarket and enterprise business customers. Local tech companies Veteran entrepreneur Rob Chamberlin is the latest franchise owner to join the team at Security 101. Over the past 15 years Chamberlin has founded and operated two successful technology companies – starting True Wireless in 2004 and DataXoom in 2012. He helped build True Wireless into one of the nation’s largest value-added wireless resellers in the U.S. Chamberlin has also advised local tech companies on marketing, PR and business development The company appeared on the San Francisco Business Times ‘Top 100 Fastest Growing Private Companies’ list and the Inc. 5000. He continues to serve on the board of directors for DataXoom, a mobile virtual network operator. In addition to operating his businesses, Chamberlin has also advised local tech companies on marketing, PR and business development. Fast-Paced market “I believe we are off to an excellent start with a winning combination here in the Bay Area,” said Chamberlin. “I am very familiar with the ins and outs of the local business climate, and Security 101 corporate has shown us that they have the technology know-how and operational support to help make this office a huge success.” Security 101 has been interested in opening an office in the San Francisco Bay Area for some time now, according to Steve Crespo, Security 101 chief executive officer. “It’s undisputedly the tech capital of the world and our corporate skill set fits that fast-paced market perfectly,” he said. “We have been looking for the right person to lead our efforts in the Bay Area, and we believe we have found that person in Rob.”
At the beginning of 2017, MOBOTIX and RealNetworks established their strategic partnership. Almost everyone has known RealNetworks since the 1990s, when the Seattle-based company introduced the first online audio streaming solution, RealAudio®. Years of continuous innovation and multiple generations of RealVideo® then gave birth to the company’s most well-known product, RealPlayer®, which is still used millions of times every day for streaming and downloading videos. More recently, RealNetworks has been steadily expanded its expertise in the area of artificial intelligence (AI) and machine learning. “Our innovative strength, quality standards and commitment to high-quality, customer-oriented solutions form the basis of our strategic partnership with RealNetworks,” explains Thomas Lausten, CEO of MOBOTIX AG. Facial and mood recognition MOBOTIX and RealNetworks see enormous market potential for further joint projects and customized solutions SAFR™, the latest solution from RealNetworks, is an exceptionally accurate, artificial intelligence-based system for facial and mood recognition that has been optimized for the challenges of live video. MOBOTIX and RealNetworks see enormous market potential for further joint projects and customized solutions. “MOBOTIX cameras have an excellent market reputation for high quality, cyber security, reliability and direct applicability for facial recognition.” “Our partnership has grown rapidly as we also share the same values, such as a commitment to quality, innovation, data security and building strategic partnerships to generate synergies for both our companies and our customers,” says Mathias Grünwald, Senior Lead Account & Service Management at RealNetworks. “The new MOBOTIX is increasingly developing into a base platform for a multitude of industry specific tasks – Beyond Human Vision,” says Lausten. Identify cyber security Since joining the company, Lausten has transformed MOBOTIX from a highly secure but self-contained product provider into an open and flexible solution and system platform that continues to identify cyber security as its top priority. This means that all MOBOTIX products are now ONVIF-compliant, there is a dedicated NAS solution and, with the MOBOTIX MOVE series, a PTZ camera has been launched on the market as a complementary independent product line. “Artificial Intelligence will play an increasingly important role in all areas of IT, meaning video surveillance as well – and with Konica Minolta, we have a leading technology partner by our side in this area,” explains Christian Heller, MOBOTIX Sales Director for Germany, Austria and Switzerland. “In conjunction with our new openness and our drive to produce cyber-safe products and solutions, we can work with our strategic partners like RealNetworks to strengthen the market and develop new solutions for a variety of vertical markets,” he adds. Video surveillance cameras SAFR facial recognition solutions based on MOBOTIX cameras are already being used in numerous vertical markets MOBOTIX's partnership with RealNetworks and SAFR demonstrates this in unique ways: “We are currently working together on an exciting project for a high-profile European museum,” says Lausten. The museum uses SAFR live analytics at the entrance and other locations within the museum to automatically count the number of people by time of day, using demographic breakdowns, such as gender and age. The same system can also analyze people’s moods. This solution is made possible by the combination of versatile, high-precision MOBOTIX cameras and the equally high-precision SAFR facial recognition platform. SAFR facial recognition solutions based on MOBOTIX cameras are already being used in numerous vertical markets. “Since MOBOTIX cameras were designed as the best video surveillance cameras and SAFR is regarded as the leading facial recognition platform for live video, together, we are able to deliver solutions that go far beyond recognition,” says Grünwald. “Beyond Human Vision means more than just monitoring video from a camera feed. Together with our selected strategic partners, MOBOTIX is creating solutions based on artificial intelligence that make events predictable and that can initiate countermeasures to protect the environment, valuables and people,” emphasizes Lausten.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the check. What First Brought The Issue Of Alarm Verification To Your Attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What Is The False Alarm Rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why Did This Issue Resonate So Strongly With You? When I first investigated this issue, I was sure that the security industry would have already recognized this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who Is Affected By This? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a check for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What Is The Average False Alarm Fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why Do You Believe Audio Is The Ideal Technology For Secondary Source Verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How Would A Secondary Source Verification System Work With Audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are There Any Additional Resources You Would Suggest Looking Into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
Workforce management systems gather and analyze information and anomalies from security officers in the field. The information ranges from direct observations entered via mobile or desktop apps by officers on duty to reports from cleaning staff, the maintenance department, and CCTV operators. Taken together, the information yields business intelligence and data analytics at no additional cost. Trackforce is a provider of workforce management solutions specific to the security industry and its unique operational requirements. From tracking guard tours to managing incidents and officers remotely, the platform improves officer accountability, optimizes operations, and delivers actionable insights via a live dashboard to reduce vulnerabilities and enhance efficiencies. The platform is customizable and scales to each client’s business. Platform to control and identify risks “Corporate security teams deal with issues related to operational risk, facility security levels and design basis threats, and must contend with manmade, naturally occurring, and technological events,” says Guirchaume Abitbol, CEO and founder of Trackforce. “We provide them a platform that enables them to control and identify risks, deliver their service, and maintain security best practices.” Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications Trackforce serves large security guard companies and global organizations in diverse vertical market sectors and is expanding in facilities management. More than 200,000 professionals at over 20,000 customer sites in 45 countries use the platform. Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications, and generates data-rich analysis and key performance indicators (KPIs) that enhance monitoring and reporting. Reduces corporate risk Better management of corporate risk is a benefit of security workforce management. The Trackforce platform reduces corporate risk in four areas by: Managing multiple sites, located anywhere, with various threat levels, cultural differences, operating procedures, and regulations. Supporting a security budget and investment in new solutions by providing data necessary for budget approval. Keeping management informed about outsourced security services partners with relevant data, analytics, and transparency. Providing real-time data on risks and incidents so operations can be quickly optimized to ensure top-level security services. Identifying potential threats and risks The platform rapidly and accurately collates data (implied data or trends) based on user-selected parameters. Data- and intelligence-rich reports become available to managers from any location via a dashboard. All necessary information is displayed on a single screen in an uncluttered format.The ability to analyze current and historical data in real time empowers security managers to track patterns Reports can be downloaded and shared with stakeholders. The ability to analyze current and historical data in real time empowers security managers to track patterns, identify potential threats and risks, and implement preventative actions and strategies. Using data intelligence as benchmark Security teams will use data intelligence as a performance benchmark for resources required to accomplish site goals. They will also use this information to pilot and rationalize resource needs for impending contracts based on historical, descriptive (what happened), diagnostic (why did it happen), predictive (what will happen) and/or prescriptive data (how can we can make it happen). “For example, when a large company incurs incremental computer equipment theft, a supervisor can use the platform to review historical reports and identify patterns and anomalies,” says Abitbol. “The supervisor could then identify and proactively implement targeted strategies to mitigate the theft, such as modifying security routes, increasing patrols, or adjusting asset management protocols.” Enhanced control of security resources The Trackforce platform has been designed to serve clients at multiple regional and national locations and is available in many languages. The Command Center allows a security supervisor based at a central location to easily manage officers on multiple sites. The Command Center provides greater oversight and enhanced control of security resources The Command Center provides greater oversight and enhanced control of security resources. Management can compare locations and evaluate security with a customizable reporting dashboard for each site. The uniform platform uses the same reporting templates and processes for each secured and managed location, thus ensuring consistency and accurate benchmarking. Trackforce’s workforce management solution has low cost and presents a low barrier to entry, with systems that can be implemented in a short time.
An area of technology that is shifting how we interact with our cities is the Internet of Things (IoT). The IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes critical. The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilizing data in order to ensure it keeps people safe and mobile. Delivering exciting opportunities Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunitiesThe search for an answer to the challenges of growing human urbanization is believed to exist in the smarter application of new technologies. Where once, electricity and the arrival of the elevator gave us vertical cities, today, we have the promise of the Internet of Things, Artificial Intelligence (AI), Big Data, micro-controllers (MEMS) and new materials to help manage a very crowded future. Data capture form to appear here! We are confronted with a perfect storm of risk factors and potential vulnerabilities as each of these connection points is potentially a source for a security breach. Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunities and new kinds of services, many of which we have yet to imagine. Priority control solutions However, there will be equally unimagined and unintended consequences, if only because, in highly complex systems with many connected and tightly linked elements, accidents are inevitable. “The journey to a smart city is incremental—you can’t flip a switch or force it. It requires complex integration and relentless innovation,” says Global Traffic Technologies (GTT) product manager Chad Mack. GTT provides priority control solutions that use analytics GTT provides priority control solutions that use analytics, cloud-based computing to link connected devices to improve mobility, public safety and transportation in cities around the world. GTT’s Opticom Priority Control mobility solution allows transit and public safety vehicles to request a green light at intersections, dramatically reducing the potential for intersection crashes and improving travel times and reliability. Increased connectivity “These intelligent priority management systems allow users to oversee and control the movement of vehicles that operate on a city’s streets,” Mack explained. The rise of urban centers and ‘Smart City’ initiatives enabled by big data, network of sensors and the Internet of Things bring a new set of challenges to future policing. There is now a growing consensus that technology transformation must be part of the overall solution While digital technologies have helped compress the reaction time of police all over the world, the increased connectivity can similarly be leveraged by criminals to carry out increasingly sophisticated crimes. There is now a growing consensus that technology transformation must be part of the overall solution. To keep cities and citizens safe, law enforcement must be armed with the right technology, tools, and processes to solve – or even prevent – the toughest crimes at faster rates. Proven criminal theories Many law enforcement agencies such as LAPD, Seattle and Florida Police Departments are using cutting-edge cloud-based crime prediction software to predict drug crime, gang crime, anti-social behavior and gun violence. Such crime prediction software works by analyzing data through a sophisticated algorithm that applies proven criminal theories to predict the top 10 to 20 spots where crime is most likely to occur over the next few hours. To do so, it leverages on a variety of factors, such as historical and recent crime data, real-time activity, weather forecasts, locations and other information. Once these ‘hot spots’ are identified, police officers can adapt their patrol schedule and frequency at these locations, making their presence felt in the area and thereby prevent crime from taking place.
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
In the aging trend of 21th century with rapid aging population and high healthcare costs are creating a growing demand for care at home, especially for seniors with long-term health conditions. Home care is moving towards tele-health monitoring and telemedicine, including video conferencing and remote monitoring technology to help increase caregiver efficiency while still providing constant convenience to the patients. Living independently and aging gracefully are the ideals that every individual seeks to pursue, and the challenge is to ensure that all people can age with dignity and security. Climax’s GX Cubic Smart Care Medical Alarm is an all-in-one wellness, and personal safety medical alarm solution, designed to help the elderly to manage their long-term health conditions, bridging medical health monitoring information to care providers/hospitals and create points of care to keep them safe in their own homes. GX Cubic medical alarm GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors, like blood glucose monitor, pulse oximeter, blood pressure monitor, or weight for tracking health data and providing customized alerts to meet individual needs. The measurements can be automatically sent to a health professional who can review the results and continuously keep an eye on the patient’s health needs and provide early treatment as necessary. In addition to medical health monitoring, GX Cubic is also compatible with Pivotell Advance Automatic Pill Dispenser to keep secure of all pills, and remind the user to take the correct medicine at the pre-set time. The solution allows health professionals to monitor pill taking timely results and keep an eye on the patients’ treatment as needed. For situation when remote monitoring care given is insufficient and the user requires onsite assistance, GX Cubic can raise an emergency alarm to inform the caregiver or medical personnel for immediate action. Seniors can be assured that they are always being taken care of, and provide their family members with a peace of mind. Voice recognition solution Voice recognition has innovated over time and continues to advance, allowing products to become even more intuitive and easier to use. GX Cubic has built-in voice recognition and can activate an emergency call to care provider or central monitoring center by preset vocal commands or keywords. This allows seniors to receive emergency attention even in situations where they are immobilized or cannot manually reach the panic button. Working with the leading voice ecosystems Amazon Alexa and Google Home via cloud, GX Cubic also features voice control to activate home electronic devices, complete daily tasks, and seek help during emergencies. Voice over Internet Protocol With the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice callsWith the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice calls to contact their caregivers or family members at any time. With the additional add-on of DECT, GX Cubic can pair with voice extenders, talking pendants, call points, and voice extenders placed strategically around the home to create a safety net. Smart Home Automation Comprehensive elderly-friendly health care should also have a focus on preventive action to maintain a healthy ageing process. To realize independent living in a smart way, GX Cubic pairs with Zigbee or Z-Wave sensors to enable the whole-home control with various protocol-of-choice. GX Cubic can be programmed to turn on the hallway lights automatically when a sensor reports a senior’s movement in the middle of the night, to reduce a chance of falling; or automatically adjusting air conditioning when there is a sudden temperature-drop. The scenarios are unlimited to fit individual requirements, ensuring a safest living experience for the senior users. GX Cubic can also integrate IP security cameras and camera PIR motion sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and Monitoring Center to verify the event and sending immediate assistance as needed. Lastly, GX Cubic can support wireless sensor devices, allowing users to add in smoke detectors, water leakage sensors, and gas sensors to monitor environmental emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build a healthier, safer independent living.
Merthyr County Council were experiencing high levels of break-ins and thefts in its three household recycling sites resulting in high repair and replacement costs. The Council employed a security company to man guard three sites which cost over £150,000 per annum however, the break-ins were still occurring. The Gallagher Channel Partner designed a solution to detect, deter and protect. They installed a Gallagher Monitored Pulse Fence to detect intruders climbing or breaking through the fence, deter by delivering a short, sharp but safe shock, while protecting the Council's assets and on-going operation. Cost-Effective installation The system was retrofitted to an existing fence structure ensuring an easy, efficient and cost-effective installation. Since the fence was installed break-ins have ceased and the requirement for man guarding is no longer needed. Electrical Statutory Compliance Inspector at Merthyr County Council, Les Lewis, said: “I was thrilled with the completed project. Not only is it aesthetically pleasing, but it has met all of our security requirements. It has also helped make huge cost savings as we no longer require manned security out of hours or need to repair damaged fences and replace expensive assets. I believe the Gallagher system will pay for itself within 18 months.”
K9 Fuels are a family run, fuel distribution business providing an efficient and customer focused service in and around Lincolnshire. Since moving to their new premises on an industrial site, they weren’t able to leave their fuel trucks in the yard because of constant break-ins and theft. CCTV was installed but wasn't enough of a deterrent. Seeing a Gallagher monitored pulse fence at nearby TC Harrison, K9 Fuels wanted more information on how a similar system could benefit them. Monitored building alarm A simple stand-alone, four zone system linked to their existing monitored building alarm was installed. There is potential to upgrade this to a network based system, using the same F32 fence energizers, if the company expands. System height is 3.0m (32 wire), with a fence length of approximately 200 metres including one sliding gate and one double leaf gate. The break-ins stopped after the monitored pulse fence was installed and K9 Fuels are at ease knowing that their premises are monitored and protected 24 hours a day.
AT Brown (Coaches) Ltd is a premier coach company based in Telford, England that has been operated by the same family for over 100 years. After moving to larger premises in the town’s Hortonwood Industrial Estate in 2005, AT Brown began suffering from constant diesel theft. Installing a Gallagher monitored pulse fence stopped the thieves overnight. Despite having installed CCTV cameras and employing mobile patrols, AT Brown owner Ewen MacLeod says the diesel theft problem continued for the first eight years on the new site. “Thieves were coming through the security fence and syphoning fuel out of the coaches. The investment in CCTV cameras and mobile patrols wasn’t paying off.” Perimeter security solution Gallagher Security partnered with SPG Security Systems UK Ltd to provide a perimeter security solution that would let AT Brown get back to running their business. A Gallagher monitored pulse fence was installed around the whole site, including the large double leaf access gates. The monitored pulse fence was easily retrofitted to AT Brown’s existing security fence, making it a cost-effective option that could be quickly installed without any disruption to the business. SPG and Gallagher very quickly got to know what our requirement was and installed it around us" “SPG and Gallagher very quickly got to know what our requirement was and installed it around us,” says Ewen. “There was no impact whatsoever on us running the business.” Gallagher Security strategic business development manager Kevin Godfrey says the monitored pulse fence provided deterrence and detection for the whole site. Building alarm system “It’s a really simple, effective solution that has negated the need for guard patrols and a CCTV system.” The fence can be armed or disarmed with the building alarm or a keypad, and any break-ins are notified on a phone, through the building alarm system. Since the monitored pulse fence was installed in 2013, there have been no further incidents at AT Brown. The fence provides a powerful visual and practical deterrent to would-be thieves, preventing further break-ins and resulting in happy staff, and children getting to school on time in the mornings. “Everyone feels more secure, which is a very important factor,” says Ewen. “Now we can just carry on running our business the way we want to.”
"The safety of others has always been a matter close to my heart", says Hans Wetzlar, Managing Director of IHRE SICHERHEIT Security Service in Bielefeld. It was out of this motivation that he founded his security company ten years ago. Together with his team, he ensures, for example, that visitors to events and trade fairs can move around safely. Mobile ‘video guards’, using Dahua's powerful video surveillance technology, are now contributing to this. Video surveillance system Video surveillance is a new addition to the portfolio of security service providers Video surveillance is a new addition to the portfolio of security service providers. "This enables us to offer our customers a much wider range of services from a single source," says Hans Wetzlar: "Even the sight of a camera can deter potential perpetrators. The inhibition threshold increases. In our experience, this means less damage to property and less theft." And if 'someone dares', the course of events is completely documented. While searching for a reliable video surveillance system, the security expert quickly came across Kruse Sicherheitstechnik in Salzkotten. The idea to develop mobile ‘video guards’ arose from this cooperation. The compact housing of the video monitor contains a great deal of technology: four high-resolution HD cameras are attached to the 6-metre-high trailer, which can record a range of up to 200 metres using motion detectors. Wide-Angle fixed cameras "When it comes to technology, we rely on Dahua Technology's products and solutions - and with good reason. The heart of this control station is the DSS server, which receives all signals from the video trailers. The advantage over other providers is that Dahua Technology's licenses are provided free of charge - regardless of whether a 4-channel or a 64-channel recorder," says Tobias Vieth of Kruse Sicherheitstechnik. The Starlight series has very good night vision and a high-performance infrared illuminator Two different camera types are mounted on the trailers: Two wide-angle fixed cameras and two Dahua Starlight series PTZ cameras. They can zoom to certain objects. The Starlight series has very good night vision and a high-performance infrared illuminator - allowing people to be seen from up to 300 metres away. Specialist trade partners "The feedback from our customers is consistently positive. Our video guard allows significantly better surveillance at the best price. With Dahua Technology at our side, we are well prepared for the future," says Hans Wetzlar. Dahua Technology remains on a growth course in Germany, Austria and Switzerland with a comprehensive benefits program for its specialist trade partners. Reliable on-site support, permanent customer advisors, dedicated project support and technical support from Germany: The comprehensive services contribute to the fact that within a short period of time a three-digit number of specialist trade partners have decided to cooperate with Dahua Technology.
Over 1,600 Wisenet cameras manufactured by Hanwha Techwin have been installed at Asia’s largest mega hub terminal in order to help operators monitor the movement of parcels and vehicles, as well as keep employees and visitors safe. With its nine decades of endless innovation, Korea’s logistics service provider, CJ Logistics, is leaping forward to become a pioneer by expanding its global networks to over 94 locations and entering the Thailand, Malaysia, China and Philippines markets. Video surveillance solution In June 2018, CJ Logistics opened Asia’s largest mega hub terminal in Gonjiam, Gyeonggi-do, South Korea. The terminal, which comprises two buildings with four floors above ground and two underground, occupies approximately 300,000sq meters, almost the size of 40 football stadiums. The total length of the facility’s conveyor belts is almost 43km, long as a full-course marathon The total length of the facility’s conveyor belts is almost 43km, which is as long as a full-course marathon. The terminal also has a state-of-the-art automation system, the first of its kind in Korea, which has increased the company’s daily handling capacity to 1.72 million parcels, four times higher than its competitors. CJ Logistics looked for a top-notch video surveillance solution which could match the terminal’s grand scale and the technically advanced automated facilities. Providing periphery monitoring After testing cameras from different manufacturers in the market, CJ Logistics chose Hanwha Techwin as its supply partner and have subsequently installed around 1,660 Wisenet cameras throughout the terminal. Wisenet X series IR PTZ cameras have been installed along the building exteriors, providing periphery monitoring 24/7 and auto tracking that enables precise monitoring across long distances, while IR illumination provides visibility even at night. Inside the buildings, around 1,400 Hanwha Techwin’s Wisenet Q series cameras were installed on the terminal’s ceilings and walls. The cameras are able to help detect any problems occurring to the automated conveyor systems which have a constant flow of parcels on them. They also oversee the movement of over 1,500 vehicles in and around the terminal and help create a safe working environment. Highly accurate recognition Wisenet X series bullet cameras, running license plate recognition (ANPR) software onboard, have been installed at the main gate of the terminal to enhance security at the entrances and exits, providing highly accurate recognition of license plates. These cameras enable effective vehicle monitoring within the terminal where cargo moves in and out around the clock, and are particularly useful in monitoring the main entrance. Both camera types are equipped with 12x optical zoom and 150dB WDR Wisenet X series bullet and PTZ cameras have been installed at indoor staircases and corridors of the office building. Both camera types are equipped with 12x optical zoom and the World’s best 150dB Wide Dynamic Range (WDR) which ensures clear images are captured from scenes that contain a challenging mix of bright and dark areas, normally causing overexposed or underexposed images. Intelligent video analytics As part of the Wisenet X series, these cameras feature intelligent video analytics and offer movement, loitering and intrusion detection. They are also equipped with audio analysis functionality which recognizes critical sounds such as gunshots, explosions, screams and broken glass. “Thanks to the Hanwha Techwin’s Wisenet security solution, we were able to build a safe video surveillance system that can match the size and the cutting edge facilities of Asia’s largest logistics terminal,” said an official at CJ Logistics. “Now we can safeguard every corner of our terminal including vehicles, parcels, and personnel, not to mention indoor and outdoor spaces.”
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
Security monitoring system: Manufacturers & Suppliers
- Dahua Technology Security monitoring system
- Vicon Security monitoring system
- Bolide Security monitoring system
- Seagate Security monitoring system
- Hikvision Security monitoring system
- BCDVideo Security monitoring system
- Pelco Security monitoring system
- MobileView Security monitoring system
- LILIN Security monitoring system
- Arecont Vision Security monitoring system
- Hanwha Techwin America Security monitoring system
- Vanderbilt Security monitoring system
- TESA Security monitoring system
- CEM Security monitoring system
- VIVOTEK Security monitoring system
- Sony Security monitoring system
- DSC Security monitoring system
- Optex Security monitoring system
- Parabit Security monitoring system
- FLIR Systems Security monitoring system