Security monitoring system
People and vehicle access control specialist, Nortech is heading into the end of the year on a high with compliance with the latest ISO 9001 certification standard, a busy year at exhibitions and getting involved with a local teen pioneer being among the company main 2019 highlights. Nortech’s Managing Director Steve Blackler commented, “We are very pleased with how the company has progressed this year. We continue to grow and meet new standards and were also delighted to meet with...
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is cha...
ProdataKey (PDK), manufacturer of the leading cloud access control platform built for cellphone, announces the imminent release of its integration with DW’s Spectrum IPVMS video management platform. The integrated solution will be on display at ISC East in New York City, Nov. 20 -21, at the ProdataKey booth 346. The event coincides with the release of the integration to installing dealers, on Nov. 21, who will now be able to offer their customers one of the most affordable, feature-rich u...
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most h...
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional...
IDIS has teamed up with integration partner ISD Tech to support the Men’s Shed community group in Church Crookham and Fleet with the donation of a state-of-the-art video monitoring solution. The donation is part of the IDIS ‘Create a Better World” campaign that has run on company’s social media channels since the start of the year to support a global commitment to enhance safety and security for social welfare projects and non-profit community organizations. The system,...
Check Point announces the release of the new 1500 series security gateways for SMBs. The two new SMB appliances set new standards of protection against the most advanced fifth-generation cyberattacks, and offer unrivaled ease of deployment and management. According to the 2019 Verizon Data Breach Investigations Report, 43% of all breach victims were small businesses, and 63% of attack attempts against SMBs were successful. The cost of disruption from cyber-attacks against SMBs can exceed $1M, according to a Ponemon Institute report, which can have a devastating effect on an organization. Multi-Layered next-Generation protection The 1550 and 1590 gateways are powered by Check Point’s R80 release. R80 is the industry’s most advanced security management software, and includes multi-layered next-generation protection from both known threats and zero-day attacks using the award-winning SandBlast™ Zero-Day Protection, plus antivirus, anti-bot, IPS, app control, URL filtering and identity awareness. The new 1500 series empowers Small and Midsize businesses with Enterprise Grade Security: 100% block score for malware prevention for email and web, exploit resistance and post-infection catch rate, as seen in the NSS Labs’ recent Breach Prevention Systems (BPS) Group Test Up to 2 times more performance from previous generations. The 1550 Gateway offers 450Mbps of threat prevention performance, and the 1590 Gateway offers 660Mbps The 1550 provides maximum firewall throughput of 2Gbps and the 1590 provides maximum firewall throughput of 4Gbps The 1550 features six 1GbE ports and the 1590 features ten 1GbE ports both have Wi-Fi and integrated cellular modem architected for LTE and 5G Check Point WatchTower mobile application, enables IT staff to monitor their networks and quickly mitigate security threats on the go from their mobile device Out-of-the-box zero-touch provisioning allows for under 1-minute setup IoT devices discovery and recognition for accurate security policy definition. Truly enterprise-Grade security "Small businesses play a critical role in economic growth and innovation across the globe, but often lack the resources to fully protect themselves against today’s advanced cyber-threats,” said Itai Greenberg, VP of Product Management at Check Point Software Technologies. “Now, small and midsize businesses can enjoy truly enterprise-grade security with industry-leading threat prevention capabilities, coupled with easy and intuitive management.”
PSA, a consortium of professional systems integrators, announced the addition of Razberi Technologies to the partners in its Managed Security Service Provider (MSSP) program. The MSSP program is designed to help systems integrators diversify their service offerings and realize the full potential and benefits of a managed services business model. “Razberi helps integrators secure video surveillance networks and Internet of Things (IoT) devices against cyber attacks,” said Dan Dunkel, managing director of PSA’s MSSP program. “Cybersecurity is one of the most pressing and daunting issues facing integrators today and Razberi products automate the functionality and are simple to install and maintain.” Secure video surveillance and IoT solutions The Dallas-based company is an innovator in simple, secure video surveillance and IoT solutions. Razberi Technologies makes it simple to manage and secure video surveillance and network-connected devices. Designed to meet the needs of any sized organization, Razberi’s platform offers intelligent appliances for video surveillance and IoT, automated cybersecurity, and video health monitoring software. Razberi appliances are compatible with top video management systems and many network cameras. “We are excited to be a part of this great program,” said Tom Galvin, Chief Product Officer, Razberi Technologies. “PSA is a great partner and we look forward to helping provide simple, secure video surveillance and IoT solutions to their network of integrators.” Cybersecurity and cloud-based security solutions PSA’s MSSP program will hinge on uniting industry-leading partners in cybersecurity and cloud-based security solutions, offering training and certification opportunities and financing options with assistance from PSA.
IMG GlobalSecur, Inc., an international travel security consulting firm, is proud to announce a new post on privacy and travel safety apps on its FoneTrac website. The post highlights some of the important issues HR managers facing when selecting a best-in-class travel security app for employee security including itinerary monitoring. Most businesses and HR managers must be transparent when it comes to privacy issues in contrast to government agencies and law-enforcement personnel who face a different institutional environment. FoneTrac travel security app solution “The privacy relationship between employer and employee needs to be transparent,” explained Chris Hagon, CEO of IMG GlobalSecur. “Our new post highlights some of the different issues that government agencies face when dealing with international travel vs. employers who are seeking a ‘win/win’ and transparent travel security app solution that is also mindful or privacy concerns.” In fact, he continued, ‘FoneTrac is purposely designed to be user driven’. This means that the App and backend are unaware of a traveler’s exact location unless they press the ‘Check-In’ or ‘Panic Alert’ button.” GPS tracking To view the new post on travel security and privacy concerns, please visit the FoneTrac blog post What this means is that the app is ‘position-locating’ rather than ‘travel monitoring’, providing a happy medium between employee privacy concerns and the technical needs of the app to be able to help in the event of a security concern. This innovative feature has propelled FoneTrac to be one of the most popular travel security and itinerary monitoring apps for employees in the ecosystem. To view the new post on travel security and privacy concerns, please visit the FoneTrac blog post. Persons who want a robust overview to the features of the travel security app can visit and those who would like to know more about the GlobalSecur backend can also visit the blog post. International travel security HR managers and employers are encouraged to reach out for a demo, as demos are available of the FoneTrac travel security app as are one-on-one consultations. Journalists and bloggers are encouraged to reach out to the company for commentary on emerging privacy trends vis-a-vis international travel security.
The Cannabis Business Conference, an exhibition organized by the National Cannabis Industry Association at the Long Beach Convention Center, is back with its third annual edition to discuss the state and future scope of the industry. Arteco Global will be the only player from the security sector presenting its software solutions designed for this continuously growing and promising market. Arteco security solutions on display Arteco Global has a deep knowledge of the American market and has been the first-mover on the security front The cannabis industry is one of the driving forces of a vast social change that is leading a shift of perspective on the consumption of cannabinoids and derived products, ranging from prejudice to great opportunity for health and economy. While more and more countries are paving the legislative way to the use of cannabis for medical and recreational purposes, the growth of the market’s demands seems to be unstoppable, to the point that is expected to reach a revenue of $65 billion dollars by 2023, 90% registered in the USA only. Arteco Global has a deep knowledge of the American market and has been the first-mover on the security front, compared to other VMS companies, proposing its advanced solutions. The sector, in fact, is strictly regulated and requires controls from seeds to sales, representing a huge for Arteco’s software. Arteco VEMS for video compliance Arteco VEMS helps cannabis facilities to establish video compliance and identify the most relevant information at any given time. When integrated with Arteco VEMS through Arteco’s Open Connector, seed-to-sale software can send instant updates when a plant is scanned in the system, creating four key cross-points for video verification: Distribution: Lab sampling Cultivation: Managing crop growth Manufacturing: Weighing product POS: Print receipt/open cash drawer Each of these data points is then searchable in Arteco VEMS by certain criteria (plant tag ID, order number, strain, etc.) and therefore easily retrievable for inquiries, additional information or investigative purposes. This provides operators with the ability to locate a particular fact or data point at a moment’s notice, rather than sifting through overwhelming and irrelevant pieces of information. Business and security intelligence All the registered events can be graphically visualized on a facility map within Arteco’s software Additionally, exceptions from environmental sensors for factors such as humidity, carbon dioxide levels, water flow and more can be tied into the platform as well. This collection of data can arm security teams and business operations managers with the kind of intelligence they need to make informed decisions in a timely manner. All the registered events can be graphically visualized on a facility map within Arteco’s software that details all security, tracking and environmental controls. Security monitoring Combining these various aspects into one common platform enables cannabis facilities to efficiently monitor activity in a streamlined manner and quickly pinpoint any areas of interest or concern through real-time alert notifications to connected devices. Finally, Arteco goes to the show to present its view of security and automation, with integration and intelligence as main values for a flourishing business.
Louroe Electronics, globally renowned audio monitoring technology solutions firm, celebrated its 40th anniversary in business with a special visit from US Congressman Tony Cárdenas. Representing the 29th district of California for the last six years, Congressman Cárdenas presented a commemorative certificate to the Louroe team and congratulated them for their achievement. Key partners, customers and representatives from the business and security technology communities attended the ceremony. Audio surveillance firm Congratulations to Richard and the entire Louroe team on this great milestone" Louroe was founded by Louis Weiss and his wife Rose in 1979. With a small staff and a garage space serving as an initial office, the company has grown substantially and now occupies a 15,000 square foot facility. When Weiss passed away in 2009, his nephew, Richard Brent, was named a trustee and took over leadership of the company. “Congratulations to Richard and the entire Louroe team on this great milestone and for setting an example for future business leaders and entrepreneurs,” said Congressman Tony Cárdenas. “For 40 years, Louroe has been an integral part of the San Fernando business community. As a former business owner myself, I understand the challenges of running a successful business. I will continue doing all that I can to cut red tape and unnecessary, duplicative regulation that restricts entrepreneurship and progress.” Audio security and safety solutions “I could not be more proud of the Louroe team,” said Louroe CEO Richard Brent. “Without their hard work and dedication, we wouldn’t be where we are today. Together, we have built a company that is known as a trusted partner who provides American made, best-in-class audio security and safety solutions.” Manufactured in Louroe’s Van Nuys headquarters, Louroe’s suite of audio security solutions capture and classify sounds for added situational awareness and intelligence. Louroe’s products are installed in over 60 countries with over 825,000 Verifact microphones in use in the law enforcement, safe city, retail, healthcare and transportation industries. SIA New Product Showcase Award recipient As a company, Louroe has been recognized for its initiatives to further trade and economic growthCharacterized for their high quality, durability and reliability, Louroe’s products have received numerous awards, including the Security Industry Association’s New Product Showcase Award; this award honors innovative solutions at the International Security Conference (ISC) West, which is the largest security conference in the U.S. Under Brent’s leadership, Louroe has taken a more active role in government relations and has participated in several committees, boards and trade missions. As a company, Louroe has been recognized for its initiatives to further trade and economic growth. Most notably, former U.S. Secretary of Commerce Penny Pritzker presented Louroe with the President’s “E” Award for Exports in 2015, which is the highest recognition any U.S. entity may receive for making a significant contribution to the expansion of U.S. exports. In 2019, U.S. Secretary of Commerce Wilbur Ross appointed Louroe’s Richard Brent to his 21-member Trade Finance Advisory Council (TFAC).
The new Wisenet 5 megapixel Flateye IR dome cameras manufactured by Hanwha Techwin are designed for high humidity environments and for where condensation might occur because of temperature differences. A key feature of the Wisenet QNE-8011R and QNE-8021R domes is that they each have a flat surface cover which is applied to the front of the lens, instead of the dome cover. This reduces IR diffused reflection which is caused by moisture and in the absence of a normal transparent dome cover, also removes the effect scratches can have on image clarity. “These new H.265 models are intended to provide a robust and cost-effective solution for video surveillance projects where the end-user client wishes to capture high definition images in challenging environmental conditions, such as industrial or food processing plants,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “Installers will also benefit from having to spend less time on site as there is no need to initially remove and then mount a dome cap during the installation process.” Intelligent Video Analytics WiseStream II reduces total cost of ownership by minimizing the storage requirements of high definition cameras The Wisenet QNE-8011R is equipped with a 2.8mm fixed lens and the QNE-8021R has a 4.0mm fixed lens, while both have built-in IR functionality which ensures objects can be recognized at night up to a distance of 20 metres. As is the case with all cameras in the Wisenet Q series, the new models are all true day/night (ICR) cameras and feature Lens Distortion Correction (LDC). They also benefit from enhanced Wide Dynamic Range (WDR) which performs at up to 120dB to produce clear images from scenes containing a challenging mix of bright and dark areas that normally results in overexposed or underexposed images. A new open platform chipset at the heart of the new domes provides the opportunity for some third party applications to run onboard the domes and enhanced Intelligent Video Analytics (IVA), such as defocus and tampering detection, as well as directional, intrusion, motion and enter/exit detection, are provided as standard. Dynamically controls encoding Multiple streaming is supported with the choice of H.265, H.264 or MJPEG compression, while the new domes’ bandwidth friendly credentials are enhanced by WiseStream II, a complementary compression technology which dynamically controls encoding, balancing quality and compression, according to movement in the image. WiseStream II reduces the total cost of ownership of a video surveillance systemBandwidth efficiency is improved by up to 99% compared to current H.264 technology when WiseStream II is combined with H.265 compression. As such, WiseStream II reduces the total cost of ownership of a video surveillance system by minimizing the storage and bandwidth requirements of high definition cameras. Compliant with ONVIF Hallway View which provides a highly effective way to monitor narrow vertical areas such as shopping aisles and corridors. It enables cameras, which can generate images in the 9:16 and 3:4 aspect ratios, to work effectively in tall and narrow spaces, with the added bonus of minimizing bandwidth and video storage requirements. MicroSD/SDHC/SDXC memory slot allows up to 128GB of video or data to be stored at the edge. Power over Ethernet (PoE) support which negates the need to install separate power supplies and cabling for each dome. Compliant with ONVIF, the global standardization initiative for IP-based physical security products which seeks to improve the interoperability of different manufacturers’ devices operating simultaneously as part of a single system.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campusFinally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT Increases Threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organization recognize and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organizations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organizations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognizing and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
ISC East continues to flourish as the Northeast’s largest security trade show. Focused on the big Tri-State market and overall Northeast sector vs. the flagship ISC West event in Las Vegas in the spring, the International Security Conference & Exposition at New York’s Javits Center will be held Nov. 20 and 21. “Anybody who has been to the show has commented and seen the growth,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. Ninety new exhibitors When the show opens, there will be around 90 new exhibitors, including Gunnebo, Mobotix, Liftmaster, Cypress Integration Solutions, SAFR from Real Networks and Security Brands. Because it is a regional show, some large companies have smaller exhibits that feature their local and regional personnelLarger exhibitors at the show include Brooklyn Low Voltage Supply (distributor), Axis Communications, DoorKing Inc., NAPCO Security Technologies, and All American Monitoring. Because it is a regional show, some large companies have smaller exhibits that feature their local and regional personnel eager to meet with security professionals from the Northeast corridor. ISC East will be co-located with the Infosecurity ISACA North America Expo and Conference. The combination provides a comprehensive approach to physical and cyber security products and services. Rapid growth in past three years The audience at ISC East is unique – about 90% of attendees do not attend ISC West. The show has seen rapid growth in the past three years, and attendees report a new energy and passion among exhibitors and attendees. By every measure, the show will be bigger than last year, while maintaining the intimate, smaller vibe of a regional show. A “Crack the Tap” cocktail reception will be held at the end of the first day on the show floor. A charity activity on the ISC East show floor will be presented in partnership with Mission 500, an organization that works to serve the needs of children and communities in crisis. At the Mission 500 booth which will be adjacent to the Main Stage, each exhibition attendee will be invited to create a “care package” of essential hygiene items that will be delivered to children and families in need, in partnership with Volunteers of America - Greater New York. Attendees may write a note of encouragement to be included in the package they assemble. Event will highlight security startups A Nov. 20 (Wednesday) session at ISC East will highlight startup companies in a format reminiscent of television’s “Shark Tank.” Four finalists will take to the main stage and provide a seven-minute pitch about their new product or service. After the “Tech Tank” presentations, audience members vote live on their mobile app for their top choice, and the winner will be announced during the “Crack the Tap” cocktail reception.Four finalists will take to the main stage and provide a seven-minute pitch about their new product or service “It’s a program that allows attendees to see and hear about cutting edge technologies,” says Nicole Miller, Senior Conference Manager, ISC Security Events. The four finalists, chosen from more than 40 exhibitor submissions, are Arrow Labs’ MIMS Smart Watch for mobile incident management; Cepton Technologies’ Helius Smart LiDAR System; SAFR from RealNetworks’ Facial Recognition system, and ZeroEyes’ Weapons Detection and Active Shooter Mitigation Platform. New partnership with ASIS New York Beginning in 2020, ISC East will be combined with the ASIS New York chapter’s annual conference and expo, which was held in May this year. Starting next year, the events will be rolled into one industry-wide expo and education event geared to serving the total security industry in the tri-state area (New York, New Jersey and Connecticut). In 2020 there will be an enhanced education program along with the combined event next fall. In recognition of the new partnership, ISC East is involving the ASIS NYC chapter in this year’s show, too, with a booth on the show floor, and promotional logos and signage. The ASIS chapter will have a table at the SIA Honors Night event on Nov. 20. “We are really involving them this year to show we are working together and partnering going forward,” says Shaughnessy.
ADT Commercial has grown organically in double digits since 2016, in addition to growing through 15 acquisitions completed since the merger of ADT and Protection One. Acquisition of integrator companies such as Red Hawk Fire and Security and Aronson Security Group has expanded ADT Commercial’s presence geographically to more areas of the country. Most of the employees of the acquired companies have stayed with ADT and “helped to create a corporate culture and a good place for employees to work,” says Dan Bresingham, Executive Vice President of ADT Commercial. Happy employees ensure good customer service. Enterprise resource planning Bresingham will lead ADT Commercial as it becomes a separate business unit in 2020 “We adapt to where our clients want us to be,” adds Joe Sanchez, Senior Vice President of Customer Operations of ADT Commercial National Accounts. “We take a strategic approach as we determine how adaptive our customers are going to be to the new technology.” I caught up with ADT Commercial at the GSX trade show in Chicago. Bresingham tells me ADT Commercial has benefitted from the caliber and breadth of leadership talent that have come along with the various acquisitions, including Mike McWilliams of Red Hawk, Bob Dale of Protection One, and Phil Aronson of Aronson Security. The transitioning of internal systems such as enterprise resource planning (ERP), billing and customer repair software will further steamline the ADT Commercial operation in the next several months. Bresingham will lead ADT Commercial as it becomes a separate business unit in 2020. We caught up with ADT at the GSX trade show in Chicago Providing new opportunities for regional integrators Additional acquisitions are also likely; in fact, growth is likely to accelerate. ADT Commercial offers a national footprint that can provide new opportunities for regional integrators it brings into the fold. New acquisitions will continue to fill out ADT’s skillset requirements in specific geographic areas where more expertise is needed. Security directors have a small staff and we help them know what they should be looking at in terms of data"“The industry doesn’t change a lot,” says Bresingham. “The technology just gets better, faster, and cheaper. As a service provider we take the best technology and combine it to provide the best solutions. We’re product-agnostic. Most of our jobs are down-and-dirty, doing the same things, but we’re pushing ourselves to be the best every day at the basics.” An emphasis at ADT is to provide customers ‘actionable’ data compiled from their various security systems. “We have a range of customers,” says Sanchez. Managing networks and video remotely “From small businesses to large data centers, there is no electronic system we cannot do. We are adaptable, from providing basic intrusion all the way to more sophisticated elements. Security directors have a small staff and we help them know what they should be looking at in terms of data.” “Our customers are our ‘true north’,” says Sanchez. A strong relationship with clients forms the basis for ADT Commercial’s success. Helping customers track data utilizes ADT Commercial’s eSuite account management system, homegrown software that compiles and analyses various customer data inputs. It also allows the ability to manage networks and video remotely. “We built it from scratch for customers. It’s a web-based system that helps them manage their business,” says Bresingham. “We hold ourselves accountable. We don’t hide from data, we encourage it.” Monitoring refrigeration units The solution is different in every case, just as every customer is uniqueIn addition to data from customer systems, eSuite can compile local weather information, crime statistics and other information that can help provide trending information to guide a customer’s business. The system’s flexibility enables ADT to provide the data each customer needs. ADT helps customers manage their business beyond the security department, too. “We do a lot of things in environmental control, monitoring refrigeration units and making sure humidity and temperature readings are correct,” says Sanchez. Leaving a door open could cause product loss at a pharmaceutical company, for example. In the food industry, a freezer malfunction could cause huge losses. In either case, an alarm can draw attention to the problem in a timely manner. Other customers face regulatory requirements that demand an audit trail of compliance, which ADT’s systems can provide. At the end of the day, ADT asks customers ‘What’s your security need?’ The company then adapts and assembles its solutions using internal resources and outside vendors, to meet that need. The solution is different in every case, just as every customer is unique.
A video analytics system that provides ‘behavioral understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviors, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorized activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioral understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioral understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognized a growing global need for intelligence to make physical and virtual public areas safer – and realized the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioral recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognize behavioral events in a video such as people fighting or a car collision because such behaviors can’t accurately be concluded in large scale from analyzing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognizing a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security“Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behavior inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimized for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviors can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behavior recognition, behavior events many times are not clearly defined, which is very different from object classification. Behaviors can have many variations and they can be very diverse.” An example is a simple behavior like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviors that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
Evelina London Children's Hospital has had many different brands of door entry system, as is often the case with NHS Hospitals spread across the UK. Managers at Evelina wished to have a standardized system across the wards in order to improve operating efficiency and reduce maintenance costs. Upgrades needed to be quick problem free and cost-effective. Each independent ward utilizes a self-contained door entry system to control security critical access to their busy nursing area. The Maternity Ward provides a good example of a security critical area that requires an intuitive and cost-effective system to control access with the ability of a ward receptionist to permit entry and exit via an audio-video communication link. Time and date stamping of visitors Fermax Area Manager Andy Saxton worked closely with Evelina’s nominated installation company, GBE Security Solutions, to ensure that the Fermax system design using DUOX and VEO met the hospital’s needs. Based on 2 wires system with aesthetically pleasing profiles and user-friendly features and functionality, the Fermax DUOX system with VEO video monitors was a perfect match for the hospitals requirements. Purely digital in nature, the DUOX 2 wire system functions perfectly using most types of cable which meant that it could be retro-fitted onto the existing system infrastructure, thereby avoiding the excessive costs of re-cabling. Equipped with the Photocaller function which allows for the time and date stamping of visitors, the Fermax DUOX VEO monitor delivered the ideal solution.
The city of Bologna has chosen Wisenet video surveillance cameras to help it create a smart traffic management system. Bologna is the seventh most populous city in Italy. It is at the center of a metropolitan area of approximately one million people with a diverse range of traveling requirements within a very large area. The City has always invested in traffic control and monitoring systems with the aim to make travel easier and faster for its citizens. An example of this is a centralized traffic light management system which has been in operation since 2013 and has helped reduce travel times within the urban area. Video surveillance solution The purpose was to provide a tool to allow authorities to take strategic planning measures The City wanted to invest in a video surveillance solution which would allow the monitoring of 12 vehicle access gates to the city in order to provide authorities with reliable real-time information about urban mobility. The purpose was to provide a tool to allow authorities to take strategic planning measures and optimally redistribute the traffic load on the road network. After extensive research, which included the evaluation of a wide range of possible solutions, a decision was made to procure a total of 89 Wisenet cameras manufactured by Hanwha Techwin. The implemented solution consists of cameras dedicated to vehicle counting and classification, and ANPR cameras which have been installed on strategic gates. The cameras monitor both directions of travel to allow local authorities to study the most important and strategic vehicle access flows to the city. Detecting illegally parked vehicles This is made possible thanks to the latest generation of Wisenet cameras. By integrating high image quality and advanced video algorithms, Wisenet ‘intelligent’ cameras are able to enhance the value of video surveillance by supporting mobility and security in Smart Cities. 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data, an edge based application developed in cooperation with Sprinx Technologies which facilitates the collection of statistical data about vehicle flow. By tracking the vehicles moving in a camera field of view, the application is able to provide information on vehicle counts, classification and average speed. 24 of the other cameras installed are Wisenet XNO-6120R/FNPs. These feature Roadway Licence Plate Recognition application which is able to help the local authority’s control room operators detect illegally parked vehicles and other traffic infringements. Built-In IR illumination Effective with all European number plate formats, the application has more than a 95% recognition accuracy whatever the environmental conditions, even when vehicles are moving at speeds of up to 150 km/h. The Wisenet XNO-6120R is a 2 megapixel bullet camera which is able to capture high definition images with the help of a 12x optical zoom, digital image stabilization with built-in Gyro sensor, a Defog feature and built-in IR illumination. Part of the Wisenet X camera series, the XNO-6120R features the World’s best Wide Dynamic Range (WDR), which performs at up to 150dB to produce clear images from scenes that contain a challenging mix of bright and dark areas and normally result in overexposed or underexposed images. Real time automatic incident detection The Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins The processing power of the Wisenet 5 chipset incorporated into the Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins for different applications, such as number plate recognition, vehicle counting/classification and real time automatic incident detection. Completing the camera line-up are 41 Wisenet SNP-L6233RH 2 megapixel 23x IR PTZ dome cameras which have been carefully located at major road junctions throughout the city, in order to allow control room operators to zoom in to see close up detail of any incidents. Traffic management solution “We are delighted with how easy it has been to successfully integrate the Wisenet cameras with our existing video management platform and our other supervision monitoring systems,” said Alberto Nuzzo, Head of Office 'Digital Infrastructure and Telecommunications', at Comune di Bologna, when commenting on the success of the traffic management solution. “The data captured by the Traffic Data and ANPR applications running onboard the cameras, is allowing us to far better manage the existing levels of traffic, whilst also helping us capture and store valuable data which we will be able to analyze to assist us to plan for the future. Our control room operators have been particularly impressed with the exceptional clarity of the images captured by the cameras and the data analytics capabilities of the system, which are enabling them to accurately visually verify what may be occurring and quickly take appropriate action.”
APRR (Autoroutes Paris Rhin Rhône) Group has selected Teleste’s S-VMX Video Management System for upgrading its motorway safety and surveillance infrastructure. The system will be implemented by a consortium composed of Teleste and ENGIE Ineo, a part of worldwide renowned energy provider, The ENGIE group. Teleste S-VMX video security system APRR Group, a subsidiary of Eiffage, manages motorways and toll structures under concessions awarded by the French State. Under the terms of its concession agreements, the Group also invests heavily in its 2,323 km network in order to improve travel conditions and satisfy customers’ new mobility requirements. Teleste’s S-VMX system will be in charge of monitoring and securing the East & South of France Motorways network, including the motorway routes as well as car parks and rest areas. The project is expected to be delivered during 2019 and 2020, and the contract scope includes a 10-year maintenance agreement. Security and operations control systems Security and operations control systems are becoming increasingly complex as they are expected to process large amounts of information in real-time. Teleste’s S-VMX video surveillance and S-AWARE situational awareness platforms enable the building of security systems that will evolve alongside the changing needs of public authorities. In addition to the powerful video core, the systems can control large amounts of information from multiple sources within the operating environment to ensure that the right information is available to the right people, when and where needed, and that the correct action is taken promptly whenever unexpected situations occur.
An upgrade of surveillance, using the latest video technology from IDIS, has put Circuit Zandvoort in poll position as host venue for the 2020 Formula 1 Grand Prix in the Netherlands. As well as wider improvements to the track, a top priority at the circuit was a complete overhaul of the video monitoring capability to meet the requirements of Formula 1. Security and safety surveillance Circuit Zandvoort will be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS For Track Manager Niek Oude Luttikhuis a key objective was to rapidly implement a solution that would be much easier than the previous system to use, maintain and adapt in the future. To achieve this, he brought together a team including IDIS – Korea’s surveillance manufacturer. Significantly improving security and safety surveillance of the track, their solution will also let the Formula 1 organizers temporarily receive functional authorized access of video data for the duration of the competition. Video management software At the heart of Circuit Zandvoort’s new system is IDIS’s server-crunching, 64 channel DS-IR300 NVR technology, pre-loaded with IDIS Solution Suite video management software (VMS). This allows all the track’s existing cameras to be easily integrated and operated alongside the latest IDIS 5MP speed dome PTZs and 12MP bullet cameras. It also delivers impressive new functionality, including ultra-high-definition monitoring capability using IDIS Smart UX Controls. The system now provides real-time image capture of the highest quality, with no lag, ghost-shadowing or stuttering of images, even when cars traveling at high speed are displayed. Critical Failover technology It ensures that recordings are automatically updated without the need for engineer calloutsImages on the racing control room video wall are now crisp and clear. And looking ahead, the IDIS Solution Suite VMS will make it easier to sustain this high standard by allowing cost-efficient, remote firmware updates and system maintenance. Circuit Zandvoort will also now be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS. This protects against video data loss due to a wide range of potential fault conditions, such as network instability or power failure. It ensures that recordings are automatically updated without the need for engineer callouts and with no risk of gaps in recordings while the fault is resolved. No interruption to surveillance The entire upgrade was completed while the original system continued to run in parallel, confirms Track Manager Niek Oude Luttikhuis. This meant there was no interruption to surveillance during implementation, which was vitally important as the track is in almost continuous use. “There is fantastic mutual communication between IDIS and the different suppliers – they think ahead and complement each other,” says Mr Luttikhuis. “And from the start IDIS demonstrated a deep understanding of the security and operational requirements of our circuit and a passion for motor racing.” PTZ cameras for tracking With the new system operational as promised, in the control room a rotating team of 10 people work with the IDIS Solution Suite VMS, with minimal training required to use all its features and functions – including easy search and retrieval, and silky-smooth control of the ultra-high-definition (UHD) PTZ cameras for tracking in real-time. Authorization levels can be set, giving each individual specific user rights, and during the Grand Prix itself the Formula 1 organizers will also be given access to the system. If necessary, this will also include the ability to view and retrieve footage on mobile devices via the IDIS Mobile app – helping the 2020 Formula 1 Grand Prix to run smoothly behind the scenes.
Bolloré Logistics is one of the top ten transport and logistics companies in the world. Its warehousing and logistics facility near Auckland Airport, New Zealand, has seen significant growth in recent years and often handles in excess of 2,000 items in a day. As a customs bonded warehouse, the location is subject to strict security requirements. All movements and processing in the warehouse must therefore be monitored closely, as the consequences of damage to facilities or loss of stock could be catastrophic. A combination of c25, v25 and i25 hemispheric cameras, along with several MOBOTIX Dual D15 cameras, provides complete coverage of the 6,600-square-meter site. The new system provides full visibility of the warehouse aisles to protect both employees and customers should an incident occur. Tool for risk management A security system that enables monitoring of business processes and guarantees the availability of historical footage can help companies avoid facing expensive compensation claims. As such, the MOBOTIX system is an invaluable tool for risk management, compliance enforcement and dispute resolution. The stream of metadata generated alongside the video feed cannot be manipulated, which ensures that the images will hold up in a court of law. Moreover, this kind of security system even helps save money: Some insurance companies reduce their premiums when this kind of system has been installed.
ADT, a security and automation provider serving residential and business customers, announces a partnership to integrate mobile safety solutions into the Lyft platform. Extending ADT’s safety and technology to mobile applications will bring an additional layer of security to Lyft’s rideshare experience. With ADT’s mobile safety platform, Lyft seeks to give riders and drivers more peace of mind. The pilot will focus on an ADT-powered safety feature within the Lyft app that will discreetly connect Lyft users who feel unsafe - by voice or SMS chat - with a security professional at one of ADT’s owned and operated monitoring centers. Detailed incident information After contacting the user, or if there is no response, the ADT security professional will alert authorities as needed so they can arrive at the user's location, equipped with detailed incident information. “As a rideshare company with an exceptional commitment to rider and driver safety, Lyft is the ideal partner for ADT,” said Jim DeVries, President and CEO of ADT. When it comes to safety, there is no better partner for Lyft than ADT" “We look forward to working closely with the Lyft team as together we bring our industry-leading technology to rideshare riders and drivers. We continue to leverage our deep expertise, technology and the trusted ADT brand to expand our reach into new areas of security beyond the home and business. Partnering with Lyft broadens our exposure while enabling ADT to further realize our mission and belief that people deserve to be safer and more secure wherever they are.” Professional monitoring services ADT’s data-driven mobile safety solution provides Lyft with a platform to extend the safety and security of ADT’s professional monitoring services to its users within its mobile app experience. Beginning in early 2020, Lyft intends to pilot the ADT mobile safety solution in nine U.S. markets including Chicago, Los Angeles and New Jersey, with potential to implement nationally to Lyft’s 30 million riders and 2 million drivers. “When it comes to safety, there is no better partner for Lyft than ADT,” said Ran Makavy, EVP and Chief Product Officer of Lyft. “We are extremely excited to enter into this partnership and look forward to a meaningful, industry-leading collaboration.”
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Security monitoring system: Manufacturers & Suppliers
- Dahua Technology Security monitoring system
- Vicon Security monitoring system
- Bolide Security monitoring system
- Seagate Security monitoring system
- Hikvision Security monitoring system
- BCDVideo Security monitoring system
- MobileView Security monitoring system
- LILIN Security monitoring system
- Pelco Security monitoring system
- Hanwha Techwin Security monitoring system
- Arecont Vision Security monitoring system
- Vanderbilt Security monitoring system
- TESA Security monitoring system
- CEM Security monitoring system
- VIVOTEK Security monitoring system
- Sony Security monitoring system
- DSC Security monitoring system
- Optex Security monitoring system
- FLIR Systems Security monitoring system
- Parabit Security monitoring system