Security monitoring system
Paxton’s longstanding access control system, Net2, receives its latest software update. The highly anticipated new feature, Checkpoint Control, supports COVID-secure sites. This additional functionality helps Net2 users protect employees and visitors by monitoring and approving people as they enter buildings. Throughout the first half of 2020 the creation of Checkpoint Control was underway, along with the unforeseen global spread of the coronavirus COVID-19. During this time lockdown and...
Allied Universal®, a security and facility services company in North America, launches its new, fully integrated marketing campaign titled ‘There for you’ which delivers on the company’s new purpose statement of ‘serving and safeguarding customers, communities and people in today’s world.’ Important role of safety With this new, bold campaign, Allied Universal displays the important role of safety and security in an individual’s ability to thrive a...
Security researchers at Check Point have unraveled a six-year, ongoing surveillance operation apparently run by Iran-based threat actors against regime dissidents. Going back as far as 2014, the attackers used multiple attack vectors to spy on their victims, including hijacking victims’ Telegram accounts, extracting two-factor authentication codes from SMS messages, recording a phone's audio surroundings, accessing KeePass password manager account information, and distributing malicious T...
Aquasight's CEWS is a full-service solution of sewage samplers, logistics, testing and a digital platform to track the presence of viruses in sewage using biomarkers, geographical insights, community level monitoring, heat maps, and dashboards which allows county officials to track the spread of infectious diseases for both asymptomatic and symptomatic individuals. Reducing PPE shortages Healthcare response teams to mobilize faster and resource planning will be started earlier to reduce PPE sh...
Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd, a provider of cyber security solutions globally, publishes its latest Global Threat Index for August 2020. Researchers found that the Qbot trojan, also known as Qakbot and Pinkslipbot, has entered the top ten malware index for the first time, ranking as the 10th most prevalent malware in August, while the Emotet trojan remains in 1st place for a second month, impacting 14% of organizations globally....
Johnson Controls is announcing exacqVision 20.09, which offers an integrated, cost-effective face mask detection solution that can quickly put information into the hands of facility decision makers to help maintain safe environments for employees and visitors. Based on Artificial Intelligence (AI) analytics versus pixel-based analytics, exacqVision 20.09 with Face Mask Detection offers improved accuracy and a scalable, efficient solution for organizations where public health and safety is a pri...
Panasonic announced its collaboration with the software company A.I.Tech. It brings together i-PRO’s security cameras with built-in AI capabilities and ground-breaking intelligent applications to provide a range of business solutions based on deep learning, many applicable to the current COVID-19 environment. The deep learning applications run directly on the cameras themselves, eliminating the need for additional servers for analytical calculations while maintaining the same high levels of accuracy. The benefits include lower total cost of ownership of security infrastructure, as well as faster processing and more immediate alarms, notifications or information from the applications. Integrated security A number of the AI applications can be used in the current pandemic to help manage social distancing, occupancy levels and the wearing of face masks. Applications can also be used by retailers to enhance the customer experience; in smart cities for traffic monitoring and smart parking; and by event organizers and transports hubs to monitor and ensure safety. They are completely integrated with the recently introduced Panasonic i-PRO X-Series camera range with AI engine, which includes six new models in total: The 5MP resolution cameras went on sale in July and the 4K resolution cameras come to market in November. All are available with vandal-resistant indoor and outdoor dome or box configurations. AI engine “This combination of AI intelligence with our flexible and adaptable cameras offers a new generation of predictive business and security applications that will help our customers become more proactive in their daily operations,” said Gerard Figols, European Head of the Panasonic Security Business Unit. “With the Panasonic i-PRO security cameras being open for third parties to develop their own ideas, it’s just the beginning of a new era of intelligent applications.” Alessia Saggese, Sales & Marketing Director at A.I Tech, added, “For the first time, this collaboration allows customers to harness all the benefits of all our deep learning-based applications by using the incredible power of the AI engine in the Panasonic i-PRO cameras. It’s a fantastic opportunity to tailor security hardware to the specific needs of a business or community.”
Hikvision, an IoT solution provider with video as its core competency, has announced its new generation of wireless alarm systems – the AX PRO – delivering comprehensive alarm solutions for both residential and commercial applications. The newly launched AX PRO product family includes a compact panel hub for a wide range of detectors and peripherals, covering intrusion detection, video verification, smoke detection, flood detection and home automation. Developed with both the installer and user in mind, the system can be configured according to a variety of needs. Installation complexity is minimal so the end-user can easily manage the system with its intuitive user interface. AX PRO panel hub with dual RF chip design The AX PRO hub itself supports several protocols for wireless integration, welcoming the connection of up to 210 peripherals. The panel has been designed with dual RF (radio frequency) chips, featuring Tri-X and CAM-X wireless technologies, to block interference across channels and enable high speed and reliable transmission of alarm messages simultaneously. Range of detectors and peripherals options With the PIRCAM, users can view those snapshots of detected activity to verify alarm notifications Alongside the panel, Hikvision has developed an extensive range of detectors and sensors to tailor the system to different installation needs, such as combined PIR-Glass Break detector, safety detectors, door contacts, smoke sensor, water-leak detector, etc. Also available is a wireless passive infrared PIRCAM detector, which detects infrared signals over a 12-meter range and collects snapshots of any moving object. With the PIRCAM, users can view those snapshots of detected activity to verify alarm notifications, receiving alerts even before intruders realize that they have been recorded on video. The PIRCAM is also equipped with LED Illumination for high-quality imaging in the dark. Intruder Verification as a Service Built with practicality in mind, Hikvision has created a wide range of peripherals to maximize user safety and assist their day-to-day activities. Such devices include static and portable panic button options to keep occupants safe, while the wireless LED keypad or ergonomic keychain fob provides multiple control options to suit the user’s preferences. If customers choose, the AX PRO hub panel can be linked to their IP cameras over the cloud or a sub-stream to initiate Intruder Verification as a Service (IVaaS). This service provides live video verification or seven seconds of video recording for users to quickly and efficiently confirm alarm events on the system. App compatibility Users will take charge and stay connected using the AX PRO since it is fully compatible with Hikvision’s proprietary Hik-Connect app. The app provides voice and video clip notifications for users and allows them to remotely control and monitor their alarm systems. The AX PRO also supports the Hik-ProConnect app, which can provide full configuration assistance for installers and enable them to offer cloud-based security solutions and services with customer’s authorization.
Johnson Controls, the global provider for smart and sustainable buildings has further expanded its Tyco Illustra range with the launch of a new Flex multi-directional camera. Designed to provide a highly cost-effective solution for monitoring activity over wide open spaces, the second generation Illustra Flex multi-directional camera is equipped with four separate image sensors which can be individually positioned and angled to provide up to 360-degree coverage via four separate non-stitched video streams. Multi-directional camera Each of the four sensors are able to capture high-quality 4MP images, enabling the camera to cover an area which might normally require four separate high definition video surveillance cameras. As well as the reduced capital cost, systems integrators and end-users can enjoy additional time and cost savings, as Illustra Flex multi-directional camera requires less cabling and mounting hardware. It also only needs a single IP connection. Easy camera placement and positioning The Illustra Flex multi-sensor camera’s magnetic base enables each sensor to be independently placed and a three-axis gimbal on each sensor allows their individual fields of view to be finely tuned. This provides users with a multitude of configuration options to provide, for example, 360 coverage of large open office areas, retail stores and car parks, a 270-degree coverage when the camera is installed externally on the corner of a building or a 180-degree field of view when the camera is mounted on a wall. Key features The ONVIF Profile S-compliant Illustra Flex multi-sensor camera’s other key features include the following: Field swappable lens modules True day/night functionality with a removable infrared cut filter (ICR), which enables the camera to operate effectively in low light conditions True Wide Dynamic Range (TWDR) which performs at up to 50dB to deliver clear images captured from scenes which might contain bright and dark areas, such as the entrances to retail stores Support for H.264 and MJPEG compression formats allows up to three simultaneous video streams to be efficiently transmitted and recorded at up to 30 frames per second, while efficiently managing bandwidth to reduce storage costs Flexibility to choose between overview and detailed images for each stream Power over Ethernet (PoE) support, which negates the need to provide a separate power supply and cabling for each camera IP66 rated Minimized vulnerabilities Cybersecurity: All Tyco Illustra cameras are covered by the Johnson Controls, Cyber Solutions Product Security Program which has been introduced to give all parties in the supply chain the confidence that Johnson Controls has minimized the possibility of introducing vulnerabilities into its Tyco branded electronic security solutions.
FelenaSoft announced the release of Xeoma software version capable of detecting people that are or are not wearing protective facial masks. With the start of the pandemic a facial mask has become an essential part of the everyday life and an integral element of the safety rules in many governments. Thanks to current technological advances, cutting-edge solutions like Xeoma can aid humanity in the struggle. Xeoma’s Mask Detector is a fully automated, artificial intelligence-powered feature designed to detect people who are not wearing facial masks and who are thus putting surrounding people at risk. It can also work in reverse order (detect people in masks) - for example, for statistics purposes. The authorized personnel will be automatically notified (via email/SMS) upon detection of people who do not have facial masks on, which allows to react promptly to the threat of spreading the virus. Neural network mechanisms Features like Mask Detector alone can significantly reduce the number of cases of non-compliance Moreover, video and photo evidence of all detected cases of disobedience to government safety rules will be retained for the specified amount of time on- or off-premises, or even mailed to the authorized official. Using artificial intelligence and neural network mechanisms for face recognition, the module cannot just spot, but also identify the offender. Connected to fine-imposing systems, it can be a part of a complex solution that helps detect, identify and punish the rule-breaker. The inevitability of punishment has accumulative snowballing effect slowly turning the system's type from “post-incident” into “proactive”. Features like Mask Detector alone can significantly reduce the number of cases of non-compliance to safety rules and restrain the spread of COVID-19. But Xeoma has a lot more to offer. Ensure compliance with safety regulations The onset of the coronavirus pandemic has resulted in enforcing the law regarding the allowed number of people staying within a confined area. Xeoma’s Visitors Counter module helps automatically count the number of people leaving or entering the monitored area. Xeoma's AI-powered Color Recognition module can be used as a Fever Detector and greatly facilitate the process of spotting people with elevated body temperature or even mild fever. No need to have a staff member standing at the entrance with a thermometer gun, risking their lives every day, every hour any more. Allow the tireless machine vision do the job. Also, this module can be used alongside thermal cameras that enhances fever detection even more. During the pandemic the feature of recognizing people using Face Recognition is especially demanded to detect ones flouting safety regulations. Video surveillance solutions The solution encompasses many of the required tools and features to ensure safety during this challenging time Xeoma offers a digital solution to this request: its Face Recognition module uses artificial intelligence and neural networks to identify the person in sight with better accuracy. Social distancing has been proven to be one of the simplest and most effective precaution measures standing in the way of spreading the virus. Xeoma's Social Distance module is coming soon to detect the break of the allowed physical distancing between people. With Xeoma, the users don’t need to buy a lot of separate devices or solutions. The solution encompasses many of the required tools and features to ensure health and safety during this challenging time. Video surveillance means safety. Safety means life. Powerful video analytics that video surveillance solutions like Xeoma can provide are a sign that video surveillance systems have jumped from simple camera feed storing utilities to effective tools in marketing, business, policing, and process automation. AI-Powered Video Analytics Xeoma’s module emotions detector recognises eight emotional states (sadness, joy, surprise, disgust, fear, anger, neutral) which helps business owners know customers better and tailor the offers to meet the needs of target audience. More information can be known from the Age and Gender Recognizers to get demographic statistics in reports or in real time. These modules will help to create a perfect advertising strategy that hits the target. Detection of helmets automatically carries out an estimation of whether or not the necessary safety gear elements are present at a construction site. Reduce the number of accidents, protect the workers by helping them comply with safety regulations - simply, fully automated, affordably. Automatize routine processes Developed for over 10 years now, Xeoma is the front-liner software for video surveillance Detection of forgotten or missing objects can be of use in safe storage to trigger alarms in case valuables are approached to or missing; or in stations (railroad, sea, airports) for the system to automatically detect an unattended item even in spite of the constant flow of people around. Xeoma has over 100 of features, including over 30 modules that provide intelligent and flexible video analytics. It can help automatize routine processes, save on staff, reduce losses and increase profits. More features are added regularly. Developed for over 10 years now, Xeoma is the front-liner software for video surveillance. Responding to needs and challenges of users from all around the globe, it is compatible with nearly all camera models and operating systems. 3D multimedia spheres The solution offers simple interface, affordable pricing policy with no hidden costs, flexible setup to adjust to the user’s goals, coupled with advanced analytics and fast high-quality support team. With over 15 years of experience in video surveillance, video editing, 3D multimedia spheres, Felenasoft has developed trendsetting solutions for various industries, from retail to governmental organizations. Xeoma can be synchronized with access control systems, security systems and alarms, smart home devices and smart traffic management, and it is not even its full potential. All of the user’s needs can be met in Xeoma, whether they only opt for simple recording or they are willing to build their own cloud service.
GeoVision Inc. has launched the GV-QSD5730 / GV-QSD5731-IR speed dome camera, designed to minimize the impact of uncontrollable oscillation. Its Sony STARVIS Sensor provides high quality image under low light conditions. The Servo Feedback feature allows the camera to return to its previous position immediately after encountering with external forces (tampering) or environmental vibration, such as earthquake. Featuring with EIS, minimal impact from vibration, and a stabilized image is provided. Also, its panoramic PTZ function when integrated with Geovision Fisheye camera allows users to monitor an area overview and a detailed regional view simultaneously. Key features include: NDAA compliant Up to 30 fps at 2592 × 1520, with 33x optical zoom EIS (Electrical Image Stabilizer) Servo Feedback Panoramic PTZ function: (Available in GV-VMS V.17.5 / 18.3) GV‐QSD5730 is significantly lighter than all previous speed dome models, with only 2.6kg in weight. Its Power over Ethernet (PoE) support further allows for quick and easy installation.
Ava, a unified security company, announced the completion of the merger between Jazz Networks, a cybersecurity insider threat detection and response company, and Vaion, an end-to-end video security provider. Ava is now uniquely positioned to deliver unified cyber and physical security solutions to organizations worldwide. “The only way to protect against hybrid cyber and physical security threats is to have a solution that can connect the dots across both domains,” said Tormod Ree, CEO, Ava. “In April, we announced our vision, and over the past five months, we have been connecting those dots. Working with new partners and helping organizations across industries protect their most valued assets: online and offline.” Improve cyber hygiene Ava’s integrated cyber and video solution allows for separate analysis of data from all users, cameras, and servers. The human-centric cyber solution (formerly by Jazz Networks) employs a powerful combination of policy, education and machine learning sensors to prevent IP theft and sabotage, improve cyber hygiene, and accelerate threat hunting. The end-to-end video solution (formerly by Vaion) delivers proactive video security, and insight including integrated video and audio analytics uniquely powered by machine learning algorithms, intuitive installation processes, and a range of smart cameras. For maximum flexibility and agility, video can be viewed from anywhere with simple web and cellphone interfaces. “By identifying both cyber and physical security threats before they become incidents, organizations can take a more proactive security posture,” said Ree. Overall physical security Ava allows us to leverage possible insider threat information into our overall physical security picture" “Managing our physical and information security needs through a wider lens has become critical to protecting our entire operation,” said Bill Tom, Director of Information Technology and Cybersecurity of Grace Farms Foundation, whose part of its mandate is to combat Modern Slavery, Gender based violence and Environmental Crimes. “The Foundation carries out its work through the publicly available facilities and integrated programs of Grace Farms, an 80-acre property owned and operated by the Foundation with an even larger population accessing data. Ava allows us to leverage possible insider threat information into our overall physical security picture.” Information security officers The average total cost of a data breach in the U.S. has grown from $3.54M in 2006 to $8.19M in 2019, a 130% increase over 14 years. The pressure on chief information security officers (CISOs) and security teams, in general, has increased incrementally. It is imperative that organizations have a flexible, secure solution to prevent incidents from occurring rather than just documenting the damage reactively. “Ava is driving innovation in the unified security market,” said Espen Riska, Atea. “It is no longer enough to protect against either physical or cyber threats. Organizations must account for the full spectrum of risk.” Efficiently managing systems We are excited to partner with Ava to bring innovative unified security solutions to our mutual customers" As companies move toward a hybrid workforce structure with employees splitting time between working in-office and remote, organizations must reassess processes to keep IT staff from burning out, while at the same time efficiently managing distributed systems and assets. “You can’t build firewalls around remote employees, businesses must empower and educate staff to make the right choices,” said Ree. Unified security solutions “We are excited to partner with Ava to bring innovative unified security solutions to our mutual customers,” said Urban Jansson, Sales Manager, Cygate. “Ava brings a unique understanding of the market’s pain points. Beyond protecting against physical and cyber threats, Ava understands that businesses don’t always have the in-house resources to monitor operations 24x7. Ava’s cutting-edge use of machine learning and the cloud eases the burden on internal resources while proactively mitigating the risk.”
We are slowly returning to normal after the COVID-19 pandemic that has swept the world. The journey to normality is going to see a large number of changes, and the physical security arena is set to be front and center in both implementing changes to keep the rest of the organization safe and within their own policies and procedures. Our return to work journey can be broken down into a number of areas for consideration. This is by no means an exhaustive list but will highlight the areas in which a security team can offer valuable insight and direction, and also some areas that end users may wish to consider as security leaders. Processes and procedures Employees returning to a site is going to be a major step for any organization, and this is where security leaders are going to be called upon to help. In these times of enforced social distancing, lockdown procedures, deep cleaning and personnel interaction protocols, each COVID protection program has a process to follow and this is the first place a security operations team may lend their experience. Physical security is built upon and relies on procedures and processes that must be strictly followed to be successful. These processes may be translated into the wider organization to help minimize confusion as the site becomes more populated. It is also a good time to review your own policies and procedures to ensure that they are adapted to meet the needs of the organization as people return to work. It is likely that you will have to increase the number of patrols or guards at access points, and you may have a new investigative process to consider for track-and-trace requirements, should there be a positive COVID-19 result. Monitoring The Security Operation Center (SOC) is likely to become an even more important part of the day-to-day operations on site. It acts as the centralized point for monitoring and incident management and may be subject to greater strain, incidents and demands than before. Ensuring that your SOC is suitable and equipped to handle these operations is key. While you may not have enough security staff to actively monitor your entire camera estate, video analytics provide a key ally. Many VMS manufacturers have simple video analytics built into their software, but there are specific tools available to help detect infractions around social distancing: people counting in a specific area to avoid over-crowding and a de facto fail on the social distancing measures; mask or PPE wear detection to ensure that people are appropriately dressed for their own protection; and people movement monitoring makes sure your employees aren’t bypassing the one-way system that you’ve implemented. An alert can be set up to identify when employees get within 6 feet of each other A particularly useful technique here is object distancing, where an alert can be set up to identify when employees get within 6 feet of each other for an extended period of time, aiding you in social distancing requirements. A second is built on wrong direction monitoring and will ensure that the one-way systems you create are being followed by staff and public alike as the analytic is capable of determining direction of travel for a pedestrian. A more advanced analytic may be the detection of PPE and ensuring that staff are wearing the appropriate masks and protective gear, although this is relatively dependent on strong camera positions and ensuring that the field of view is appropriately configured. There are a number of options to integrate with your access control systems, both physical and technology based. Thermal cameras and temperature probes may be used at entry points to ensure that anyone with a fever isn’t admitted to a location (although be careful when selecting a thermal camera and do thorough research on the temperature variation that it is able to detect). Human-to-human interaction Your physical security team is often the first human point of contact for your employees and often the most important. It may be necessary to increase your patrol and guard workforce temporarily to ensure that all entrances are covered and that entry procedures are tightened up or enhanced. I am confident that employees won’t mind an extra minute or two at the entrance for the improvement in their own health and wellbeing. If you do have an incident, perhaps where an employee is felt to be breaking the rules by not distancing appropriately, or ignoring mandated procedures, then your guard and patrol teams become vital peacekeepers in defusing and de-escalating the incident. Those same team members should also be trained in incident control and investigation, and with a well configured security environment (surveillance, electronic access control, personnel checks, etc.), they should form the basis of the track and tracing process of all staff that were on site and in contact with an infected employee should the worst happen and you have a positive COVID test returned. Protecting your security personnel Physical security operations team should be fully equipped with appropriate PPE This leads to my final point: your physical security operations team should be fully equipped with appropriate PPE, both while on patrol and in the SOC. Installing plexiglass panels between monitoring stations and spacing the monitoring stations appropriately should be the minimum first step. If your team is large enough, implementing a split A and B team is another possibility, with no interaction or risk of cross contamination between the teams, and a deep cleaning of the SOC and each guard station at the end of every shift. This ensures that you’ve covered at least 50% of your personnel in case of a COVID-positive event to keep operations moving, but also helps to create a contained working environment for this critical security function. If you have the space and the equipment, creating a secondary SOC, or engaging a remote GSOC (Global SOC) provider will improve your monitoring capabilities (GSOC companies are usually equipped with the latest video monitoring technologies) and reduce the risk of cross contamination. As you’ve read, there are many ways in which your physical security operations team can aid you in a successful return to work, playing a vital function in monitoring, managing and interceding in your organization. One final note: thank you to those front-line personnel for their tireless efforts in keeping us safe and healthy.
From drone fleets and autonomous transportation systems to smart homes with computer-controlled lighting, heating, media and security systems, a new group of highly-automated technologies is gripping the popular imagination. These technologies – made possible by the Internet of Things (IoT) – form advanced ecosystems of interrelated devices with the capacity to monitor, detect, communicate and act on the real world independently of human intervention. Promising to fulfil all of our wildest technological dreams and needs, the IoT age has arrived – and it looks like its here to stay. While the consumer applications of IoT tend to receive the most attention, one area that is seeing strong growth in the uptake of IoT devices is workplace safety. Workplace safety costs businesses billions every year, and industries with especially hazardous working environments – Construction, Oil & Gas, Mining, Utilities, Rail, among others – are beginning to adopt IoT technology to help minimize risk and address preventable threats. In addition, as the COVID-19 pandemic surges around us, the phenomenon of ‘social distancing’ and remote working has emerged to help avoid risk of infection. For the many who work across the aforementioned industries however, working from home will not be logistically possible. In order to reduce the burden on hospitals and medical staff, it is now more important than ever to protect employees from having to be treated for preventable injuries. Before exploring these IoT solutions, however, let us first consider some of the key threats faced by workers in these industries. Workplace safety 1 in 5 worker deaths in the US and incurring tens of thousands of short and long-term injuries each year Construction is one of the world’s most dangerous occupations, accounting for 1 in 5 worker deaths in the US and incurring tens of thousands of short and long-term injuries each year. In construction, the major risk is falling from a height, which accounts of 26 per cent of fatal injuries in the workplace. Additional risks come from being struck by vehicles and heavy moving objects, proximity to overhead/underground high voltage power lines, confined spaces, high noise environments, and exposure to dust and fumes. Other industries are often faced with some combination of the above, or similar, threats. In the Rail sector, for instance, there is high risk from collisions with vehicles, objects and machinery and vulnerability to electric shock. In Utilities, the number one risk is slips, trips and falls, accounting for 30 per cent of Lost Workday Injuries (LWIs) in 2016. And in Oil & Gas extraction, exposure to flammable gas, chemical emissions and oxygen-deficient atmospheres creates vulnerability to explosions and chemical poisoning. Tackling threats in a high-tech world What, then, is being done to tackle these threats? In a high-tech world, many safety measures currently in use – hardhats, earplugs, gloves, gas masks, guardrails, harnesses, protective goggles and high visibility clothing – have been in use a long time. While these measures are still fundamental in minimizing risk, companies have now started to integrate IoT technologies to enhance their application. These technologies bring together real-time analytics, machine learning, advanced sensors and embedded systems to offer a number of key functionalities: Physiological monitoring Wearable technology is used to monitor a worker’s physiological state in real-time. Japanese wearable tech company Mitsufuji is active in this space, creating smart clothes woven from silver-metallised fibres that collect a range of data about its wearer, including heart rate and body temperature. Other examples include wristbands with bio-sensors to accurately measure stress levels and glasses that detect eye movements to identify fatigue and periods of micro-sleep. Environmental monitoring Sensors used to measure temperature, radiation, gas leaks, carbon monoxide and other harmful chemicals can automatically alert workers to unsafe external conditions. Additionally, visual imaging software can map 3D representations of a worker’s environment, facilitating effective two-way communication between supervisors and personnel in the field, allowing for remote guidance technologies to provide live assistance to endangered workers (e.g. guiding a trapped miner out of a tunnel). Situational awareness, training and behavioural data Augmented Reality (AR) technologies offer new ways to support decision making in the field by providing holographic representations of physical equipment, while Virtual Reality (VR) technologies offer immersive situational training without the risks associated with real-life procedures. These technologies also offer up valuable behavioral data, which can be used to gauge a worker’s risk tolerance level and alertness in response to incidents. Proximity detection Proximity detection systems utilize wearable sensors to monitor workers’ location, map their movements, and alert them to nearby hazards. One example of this are radio-frequency identification (RFIDs), which can measure a worker’s proximity to moving equipment and alert them to possible collisions and near misses. Another piece of kit is the ‘smart helmet’, which can immediately detect an accident, determine the worker’s location and send an alert containing coordinates to a safety control centre. The centre is able to make video and audio contact and communicate with the worker until help arrives. Exoskeletons Exoskeletons can assist with heavy lifting and the prevention of musculoskeletal disorders (MSDs) by analyzing worker movements and providing the necessary support. The Chairless Chair, for example, used by factory floor workers, fixes around the back and legs to provide support whenever the worker sits or crouches. Exoskeletons are also used to monitor worker movements, identifying repetitive movements and sustained periods of overexertion. IoT technologies and innovations IoT innovations are helping to improve workplace safety on multiple fronts Taken together, these IoT innovations are helping to improve workplace safety on multiple fronts. Firstly, they are preventative. By closely monitoring one’s environment – both internal and external – IoT technologies can pre-empt and alert workers to potential dangers. Secondly, they are responsive. In the case of an accident, IoT technologies can alert supervisors and help coordinate a quick and effective response. Thirdly, they are informative. By accumulating and analyzing rich pools of data, IoT technologies can help optimize work in the field and find improved ways to limit risk.
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorized personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognizing the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorized person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorized users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.
J.D. Power is a well-known name when it comes to measuring customer satisfaction, and they have been measuring satisfaction in the home security industry since 2016. Changes affecting the marketplace – both in terms of disruptors and technology – make this a unique time. For example, in 2019, J.D. Power expanded the Home Security Satisfaction Study to not only measure the traditional pro-install/pro-monitor companies, but to separately evaluate self-install/pro-monitor brands. “At J.D. Power our rankings are meant to support an industry in two key ways,” says Christina Cooley, J.D. Power's Director, @Home Intelligence. “First, we provide consumers who are shopping for products and services with a ‘report card’ of who provides customers with high levels of customer satisfaction. Second, we provide companies with actionable insights to help them prioritize their initiatives to improve and maintain high levels of customers satisfaction that drive loyalty and growth.” Differentiating between companies The traditional Pro-Install/Pro-Monitor companies are challenged to differentiate from one another In home security, J.D. Power is in a unique position to report on the changes taking place in the evolving industry. The 2019 rankings show that the traditional Pro-Install/Pro-Monitor companies are challenged to differentiate from one another, as each have their individual strengths and opportunities, but overall the score range is relatively tight. On the do-it-yourself (DIY) side, there is more differentiation. A set of brands has been able to challenge the traditional industry by achieving extremely high customer satisfaction levels. Price is always an important factor that impacts customer satisfaction, whether for security or another market J.D. Power serves. The equation is simple, says Cooley: Does the price paid equal the value the customer feels they have received from the product or service? “For Home Security, we didn’t specifically look at price until this year,” says Cooley. “With the changes that have occurred in the market, price can be a differentiator as we’ve seen with the emergence of DIY-installed systems. However, lower pricing does not have a direct relationship to quality of service.” The price factor For example, there are some higher-priced pro-installed brands that perform lower on customer satisfaction than lower-priced competitors. And DIY-installed systems as a whole are less expensive, and price is the customer satisfaction driver in which the DIY segment most outperforms the pro segment. Price is the customer satisfaction driver in which the DIY segment most outperforms the pro segment The equation is: Performance minus Expectations equals Customer Satisfaction. “Obviously, price point will be a factor in the purchase decision and the expectations the customer has about the product and service,” says Cooley. “Any pro or DIY system has the opportunity to differentiate the customer experience regardless of price point.” There are clear differences in the pro vs. DIY experience, which is why J.D. Power evaluates the brands in separate rankings. However, Cooley says the drivers of satisfaction are consistent across both groups. The key to each group goes back to the equation above. Evaluating the purchase process For the both pro and DIY companies, J.D. Power evaluates the purchase process the same. Though the customer may take a different path to purchase based on the offering they seek, the drivers are still the same: Usefulness of information provided Reasonableness of contract terms Professionalism of sales representative Ease of purchasing home security system. For installation, there are clear differences. DIY systems are evaluated based on: Ease of completing installation Quality of installation instructions provided Timeliness of receiving home security system. Pro systems are evaluated based on: Professionalism of technician Timeliness of completing installation Quality of work performed. Interestingly, purchase and installation are the customer satisfaction driver where both pro and DIY providers (as a whole) are most closely aligned on performance. Customer loyalty The price a customer is paying must align with the quality of the system they receive What drives a customer to purchase a home security system initially will often be very different than what will keep them as a loyal customer, Cooley notes. The price a customer is paying must align with the quality of the system they receive, and the service provided through the professional monitoring and customer service. “With the expansion of home security offerings, it’s more important than ever for home security companies to understand the motivations, intentions, and usage patterns across different customer segments to ensure that regardless of the decision to go pro or DIY-install, they are able to meet their customers’ needs and differentiate in the very competitive market. The J.D. Power Home Security Study provides these actionable insights.” The study is focused on the companies/brands that comprise the top two-thirds of market share in each segment, pro and DIY installed. A number of the brands included may work with local dealers or retailers for sales and install, but the customer is essentially evaluating those services as part of the system purchased. It is one and the same from the customer’s perspective, and the sales/install process can either delight or frustrate a customer from the beginning, which can then set the foundation for the entire experience moving forward. Reasons for shopping for a security system tend to differ between pro and DIY shoppers: Both sets are most focused on wanting a newer, more up-to-date system Between the two, pro customers are more often moving into a new home or wanting to take advantage of a discount or bundling opportunity with other products For DIY customers, they are shopping for a system to give them more peace of mind and to protect their property. Reasons for selecting the provider also vary: A pro company is often selected based on brand reputation or a special offer/promo A DIY company is primarily chosen based on price or a positive review. In terms of brand image, we see that customers see both pro and DIY providers similarly in terms of reliability. However, when it comes to being customer-driven, DIY providers receive higher image ratings compared to pro-installed companies.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that the Santa Cruz Beach Boardwalk, an iconic amusement park in California, has recently upgraded its security infrastructure with the Security Center platform. By unifying video and access control park-wide, the park’s security team is able to speed up investigations and emergency response. Touted as the ‘Coney Island of the West’, the seaside park features about 40 rides, 30 restaurants, 15 retail shops, arcades, miniature golf, bowling, and conference and banquet facilities. Video surveillance technology As an admission-free park, guests can enter through multiple entrances to buy food, purchase ride tickets, or simply walk around and enjoy the surroundings. Unlike gated parks which typically have a main security checkpoint, the park’s security team must be hyper-vigilant to spot potential security threats before they can develop. Security operators constantly monitor video cameras and work directly with field officers to handle issues. While video surveillance technology helped security teams watch over the large park, aging equipment began compromising their efficiency. As the search for a new video management system began, the team prioritized openness, reliability, and a vendor’s reputation in the market. Moreover, their aging access control system would soon need replacing too. Actively monitoring cameras The team at Santa Cruz Beach Boardwalk uses the Security Center platform to manage over 400 cameras and 220 doors The Santa Cruz Beach Boardwalk team chose the Genetec Security Center platform because of its unique ability to unify video surveillance, access control, and other systems and sensors. The flexibility of the platform was a key selling point and enabled them to choose their preferred cameras and door hardware. Today, the team at Santa Cruz Beach Boardwalk uses the Security Center platform to manage over 400 cameras and 220 doors across the entire amusement park. From one single interface, operators actively monitor cameras and doors, respond to alarms, handle investigations, and export and share video evidence. This ensures that every security incident is effectively resolved without having to switch applications. Video surveillance system “Like any busy amusement park, our guests sometimes become separated from their groups. When this happens, we are now able to use the Security Center Omnicast™ video surveillance system, along with assistance from our field officers, to quickly reunite guests with their parties,” said Will Graham, Security Technology Administrator at Santa Cruz Beach Boardwalk. If motion is detected near a perimeter after opening hours, the platform will trigger an alarm and display live video and a 10-second replay of the event on a dispatcher’s monitor. This allows them to quickly identify if it’s an actual threat. Unique access privileges The team has also expedited investigations by sharing system access with other departments. This includes food service, loss prevention and ticket sales who can handle their own preliminary investigations, if needed. The team has set up different door schedules and rules and created over 200 cardholder groups “Using the Security Center platform, all door events are linked to video which means our team can quickly gather the information needed and solve cases faster,” said Graham. With Security Center, operators get an instant view of an event as it’s unfolding. So before sending an officer to check on the area, they can quickly identify if it’s a threat or a false alarm. Using the Synergis system, the team has set up different door schedules and rules and created over 200 cardholder groups with unique access privileges for various roles and responsibilities. Managed software maintenance For added peace-of-mind, the Santa Cruz Boardwalk team receives fully managed software maintenance and monitoring via the Genetec Advantage maintenance package to help ensure their systems always available and up to date. “Using Security Center has definitely heightened our response efficiency at Santa Cruz Beach Boardwalk. Everything from video surveillance and access control to alarm management has been consolidated into one solution—it’s just a better, more effective way to work. And we’re confident that with this unified platform, we’ll be keeping our guests happy and safe well into the future,” concluded Graham.
A national center of excellence for children and young people with mental health needs has been secured by a comprehensive security system from IDIS, the largest in country video surveillance manufacturer in South Korea. The £7 million refurbishment of Austen House, a 14-bed forensic hospital in Hampshire run by Southern Health NHS Foundation Trust, prioritized keeping both staff and patients safe from harm, given their specialized needs. Security systems integrator As the sole specialist National Health Service (NHS) unit of its kind in southern England, its refurbishment means vulnerable young people and their families no longer have to travel hundreds of miles to receive vital support. Video surveillance was key to allow incidents to be investigated and care practices to be monitored and improved. The solution had to cover all social and communal areas with no blind spots, be easy for non-specialist staff to use, and would have to comply with NHS cybersecurity requirements. Specialist security systems integrator ISD Tech selected IDIS technology as the best value and most robust solution, and one that would be the quickest and least disruptive to install. Outdated security setup The enhanced video coverage improves both standards of care and accountability Working with main contractor Kier Construction, ISD Tech and IDIS replaced an outdated security setup with an affordable cybersecure system which is easy to operate and maintain. It allows caregivers a complete overview of all internal and external communal areas at Austen House, including education facilities, music and sensory spaces, a gym and an art studio, as well as higher-risk isolation rooms. The enhanced video coverage improves both standards of care and accountability. It provides a complete record of events at the facility, making it easy for incidents to be investigated and video evidence to be provided, should it be required. Active tampering alarms Almost 100 IDIS 12MP Super Fisheye cameras, plus a mix of 5MP bullet and PTZ cameras, connected to 32-channel NVRs guarantee evidential-standard video coverage with a 360º view of all communal areas, a choice of 6 view modes and the ability to dewarp footage after the event. The 5MP bullet and PTZ cameras provide 24-hour coverage of the multi-use games area, gardens, car parks and perimeter. Built-in IR enables night-time image capture at distances of up to 30m, and the cameras enable intelligent functions such as active tampering alarms, motion detection, auto-tracking, and trip zones. All the IDIS cameras benefit from true DirectIP® plug-and-play set-up, which allowed the ISD Tech engineers to complete their work ahead of schedule. The ‘one-click’ set-up is faster and eliminates the cybersecurity risks associated with manual password entry. Local area networks IDIS Smart Failover protection ensures 24/7 continued recording, even during network instability or drop-out IDIS Smart Failover protection ensures 24/7 continued recording, even during network instability or drop-out. And, crucially, the Trust can link the new system to its local area networks without increasing the risk of hacking, thanks to IDIS’s use of proprietary software, which is inherently cybersecure. “Our upgraded IDIS video solution makes it easy for our clinical teams to review incidents quickly and work with external investigators whenever required,” said Tracey Edwards, Head of Security at Southern Health NHS Foundation Trust. “It’s not just an important tool for improving patient care, it allows us to maintain full public confidence and accountability.” Supporting clinical care Nicky Stokes, Managing Director of ISD Tech, commented: “We were impressed by the consultative approach of IDIS right from the initial design and planning, through installation to commissioning, and the ongoing support that they provide both to ISD Tech and the Trust. IDIS technology even helped speed up the installation so that we could deliver the project ahead of time.” IDIS Europe Sales Director Jamie Barnfield added: “This is the 4th major project that IDIS has completed for Southern Health NHS Foundation Trust, and it is part of one of the biggest refurbishments of its kind ever undertaken in the NHS. Not only is our video tech enhancing safety and security for patients and staff, it also supports clinical care and rehabilitation, which benefits the most vulnerable members of our community.”
Dahua Technology – one of the pioneer video technology companies – has entered into a six-figure sponsorship deal with Celtic FC, supplying the club with state of the art video-based technology and equipment. Under the sponsorship deal, Dahua is supplying video walls for locations such as the Celtic Store and Media Center at Celtic Park, high-tech quad-rotor drones to help with player training and development, and electronic whiteboards to be used for staff training, as well as meetings and presentations for staff and visitors. Highly visible aspects As part of the new partnership, Dahua will be appearing across a range of Club assets, on LED pitch-side banners, and on the club’s website and match programs. The deal represents the first ever major sponsorship by Dahua Technology in the UK and Ireland. The deal represents the first ever major sponsorship by Dahua Technology in the UK and Ireland “We are thrilled about our sponsorship of Celtic FC,” said Michael Lawrence, Marketing Director at Dahua Technology UK & Ireland. “As well as the highly visible aspects of the sponsorship, this deal represents a real partnership between Celtic FC and Dahua, and is an example of our engagement with communities across the UK and Ireland.” High quality technology Commenting on the deal, Cheng Zeng, Business Development Manager for China and Asia at Celtic FC said: “We are delighted to launch this partnership today with Dahua Technology. Their expertise and high quality technology will enhance both fan experience in our stores and business operations as a whole. We hope to work with Dahua long into the future.” As well as the equipment supplied to Celtic FC, Dahua Technology manufactures a range of innovative and technically advanced video equipment. These include TiOC, a three-in-one camera that integrates 24/7 full-color monitoring, active deterrence and Artificial Intelligence into one smart unit; WizSense, a series of products and solutions that utilize Artificial Intelligence and deep learning algorithms; and its Starlight range of low-light video technology.
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that City Council District E in New Orleans has taken an innovative approach to address illegal dumping using Security Center, the unified security platform from Genetec. Countering illegal dumping menace Illegal dumping is a problem in most cities around the world, but enforcing laws to prevent it can be quite difficult and resource-intensive. To catch culprits in the act, law enforcement and other city staff have to physically watch known sites and wait to spot illegal dumping activity. Most city officials know that's an impossible task, as officers can't be everywhere all the time, and offenders take full advantage of that reality. New Orleans’ RTCC and Sanitation Department has begun installing a network of cameras at known dumping sites In response, New Orleans City Council District E Councilwoman, Cyndi Nguyen, has taken a hands-on approach tackling illegal dumping head-on as a part of a larger push toward revitalising the community she serves. Nguyen’s team, working in partnership with New Orleans’ Real Time Crime Center (RTCC) and Sanitation Department has begun installing a network of cameras at known dumping sites. All cameras are portable so they can be moved to new dumping hotspots as needed. Genetec security technology platform deployed “This security technology from Genetec certainly helps re-enforce the message I’m putting out there, that we can and will enforce illegal dumping offenses in District E. We also have this great partnership with the Sanitation Department, our local Police Department, and the RTCC, and that’s extending out into our community as well,” said New Orleans City Councilwoman, Cyndi Nguyen. She adds, “I am working hard to get more residents and businesses involved in supporting these initiatives, because keeping our city safe and clean is a shared responsibility.” Real Time Crime Center (RTCC) The Real Time Crime Center (RTCC) already uses Security Center to manage its citywide public safety improvement initiatives. To help monitor illegal dumping activities, the Crime Center’s IT department also set up an event-to-action rule in the Security Center platform to processes motion detection in a defined zone of the camera’s field of view. As soon as motion is detected, the security system bookmarks it and notifies IT staff As soon as motion is detected, the security system bookmarks it and notifies IT staff so that they can evaluate the situation and determine if collection of the debris is warranted. The system also takes a snapshot of the video and emails it to designated personnel on the team, so as to enable them to identify and investigate any potential dumping perpetrators, and take appropriate action. Crime detection with video evidence In an example of a recent case, this event-to-action led to the arrest of a repeat offender who had previously been convicted and sentenced for dumping 14,000 tires. All snapshots and video evidence were securely shared with the New Orleans Police Department so as to enable them to quickly identify the perpetrator, apprehend him and complete their investigation. “Without this technology, finding these offenders comes down to chance or it could take a police officer hours and hours of investigative work. Instead, it took us minutes to set up the event-to-action in Security Center, and just about two days from the time we were notified about this offender to the time we were able to apprehend him,” said Bill Wood, IT Supervisor at New Orleans’ Real Time Crime Center (RTCC). Bill adds, “We love working with the Genetec Security Center security platform. It’s very user friendly and helps us cut down that investigation time exponentially.”
RCP21, a pioneering Community Interest Company (CIC), has used SmartTask to help set up and manage an in-house security operation at Langthwaite Business Park in South Kirkby, West Yorkshire. The workforce management software was adopted to coordinate a full-time team of officers, tasked with protecting 120 businesses located at the site, without the need to increase management and administrative resource within the organization. SmartTask has since enabled RCP21 to deliver a superior security service in the most reliable and efficient manner. Workforce management solution “As managing agents of Langthwaite Business Park, we had previously outsourced the security requirements, but we took the decision to bring the service in-house,” explains Nicola Parker, Operations Manager at RCP21. “We recognized the need for a proven workforce management solution that would underpin our security solution moving forward. SmartTask has given us the visibility and control needed to deliver our service and provide customers with complete peace of mind.” SmartTask is used to manage RCP21’s full-time team at Langthwaite Business Park that provides a range of security services including CCTV monitoring, mobile patrols and keyholding and alarm response. SmartTask-enabled smartphones are used to scan 32 checkpoint tags around the site, so RCP21 has full visibility of mobile patrols that take place. Submit incident reports SmartTask has proved to be a hugely useful tool that is delivering value across our security operation" The software’s SmartForm functionality also enables security officers to electronically view their daily tasks; complete vehicle safety checks; and submit incident reports. In particular, the incident reporting tool allows a security officers on patrol or responding to an alarm response to capture all essential information, including any photo evidence, via a smartphone. This means RCP21 has an electronic record of any incident in real-time, so it can take immediate and appropriate action as well as share relevant details to the customer. Monthly performance reports can be taken from SmartTask, while incident data is included within the business park’s newsletter to provide information in relation to crimes and incidents on the park. Mobile workforce management “SmartTask has proved to be a hugely useful tool that is delivering value across our security operation. The software is simple and easy to use by all staff involved and is effective in enabling us to monitor and deliver our security services to a very high standard,” concludes Parker. Paul Ridden, CEO of SmartTask: “Our cloud-based employee scheduling and mobile workforce management software is highly configurable and scalable, making it an ideal solution for any security operation. Whether you are a top 30 security company or a small in-house team, it is possible to take advantage of SmartTask’s user-friendly, feature-rich functionality to better plan, manage, deliver and report on your security services.”
Located 40 kilometers outside the Russian capital, the new Mercedes-Benz passenger car factory is a showcase for Industry 4.0 automotive manufacturing. To ensure the safety of more than 1,000 employees at the massive facility, Bosch provided a fire alarm and security system, replete with voice evacuation capabilities to meet the specific safety needs of modern-day car factories. Future of car manufacturing Walking into the main manufacturing hall of the new Mercedes-Benz Cars plant in the Moscow region is to see the future of automotive production. Amid glass walls and high ceilings, robots and humans work side-by side to assemble the company’s most popular limousines for the Russian market. From chassis welding to windshield installation to painting, the plant combines all production steps in the same building as part of a ‘one-roof concept’. But from a fire safety perspective, the ‘one-roof concept’ with its tall factory ceilings and open floorplan poses challenges. The reason: Conventional, point-type fire detectors exceed their performance limit when it comes to detecting smoke particles inside such a vast, air-conditioned space. Working closely with the client, experts of Ateksis, the system integrator who lead this project, realized that early fire detection would take a solution just as innovative as the futuristic car factory itself. Safety for automotive factories They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released Additionally, Mercedes-Benz required a centrally controlled combination of intrusion alarm and video security to guard the entire perimeter of the 85-hectare facility with its total of seven buildings. And could the solution be ready within a few weeks for the plant’s grand opening featuring international dignitaries? Working on a tight timeline, the team of Bosch and Ateksis experts selected a fitting smoke detection technology: aspirating smoke detectors. Perfectly suited for large warehouses, the detection units are located within a pipe system that constantly ‘inhales’ samples of air, which are checked for smoke particles via intelligent signal processing technology. As a result, the light-based detectors achieve smoke sensitivities as precise as 0.05%. They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released. electrical interference for reliability Aspirating detectors also pinpoint the exact location of fires, thus reliably preventing major damage in most cases. The system also suppresses environmental factors that typically cause false alarms in car factories, including dust, flying sparks and electrical interference for maximum reliability. “The Mercedes-Benz project is an important reference for us. It shows the level of integration and customer focus made possible by Bosch solutions. Our system has succeeded in meeting the specific needs of automobile manufacturers in the next generation of car production facilities”, said Ivan Konukhin, Bosch Security and Safety Systems Russia. audio sound quality The ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces Amid the acoustic conditions inside the vast production plant, a total of 650 horn and ceiling loudspeakers from Bosch deliver sufficient volume and intelligibility. The horn speakers offer a wide opening angle to broadcast sound across factory floors while offering protection from water and dust, as well as the corrosive effects of industrial environments. What’s more, the ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces of the automotive plant. The cabinet loudspeakers are certified according to the fire evacuation EN54-24 standard for reliable performance under emergency conditions. Overall, this level of audio sound quality directly serves to keep workers secure and informed, especially if evacuation becomes necessary. automatic fire detectors In the bigger picture, the total of 248 aspirating detectors inside the main production hall are centrally networked via Modular Fire Panels 5000 series and connected to more than 2,500 automatic fire detectors installed throughout six additional administrative buildings on the premises. For maximum employee safety, clear voice and audio alarm is provided by the PRAESIDEO Digital Public Address and Voice Alarm System. With Smart Safety Link, the interfaced fire and voice alarm system offers a full control in case of emergency, including the customization of the fire verification time and the automatic process that can ensure a safe phased evacuation. To ensure full visibility of the premises and around-the-clock safety, the video security solution consists of 112 high-definition cameras from Bosch. While bullet and moving cameras secure the perimeter, dome cameras monitor inside spaces. Video Management System Integrated on the Bosch Video Management System, all cameras can be controlled by the on-site security team Integrated on the Bosch Video Management System (BVMS), all cameras can be controlled centrally by the on-site security team inside the control room. Bringing security full-circle, the video system has a direct interface with intrusion alarm system containing over 200 detectors. This seamless integration of all solutions on the Building Integration System (BIS) from Bosch enables a host of additional functions: for instance, the system alerts the control room when a fire detector is triggered and sends live images from the nearest camera for full situational awareness. Aspiration smoke detector As Ivan Konukhin at the Regional Representative Center North-West and South Russia at Bosch Security Systems explains: “The cooperative functionalities between BIS and BVMS components were programmed according to customer requirements in an uncomplicated manner via macros, which also supported a timely installation.” Bosch Security System’s solution consists of: FPA-5000 Modular Fire Panel Solution Smart Safety Link License key for voice alarm Aspiration smoke detector 2 pipe systems AVENAR detector 4000 PRAESIDEO Digital Public Address and Voice Alarm System Metal Fire Dome Cabinet loudspeaker, metal, rectangular Horn loudspeaker, 10W, 6x10" Ceiling loudspeaker, 6W, ABS MAP 5000 family IP4000i, 5000i and 6000 cameras AUTODOME IP Cameras Access Control System Bosch Video Management System Building Integration System
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Security monitoring system: Manufacturers & Suppliers
- Dahua Technology Security monitoring system
- Vicon Security monitoring system
- Bolide Security monitoring system
- Hikvision Security monitoring system
- Seagate Security monitoring system
- BCDVideo Security monitoring system
- MobileView Security monitoring system
- LILIN Security monitoring system
- Pelco Security monitoring system
- Hanwha Techwin Security monitoring system
- Arecont Vision Security monitoring system
- Vanderbilt Security monitoring system
- TESA Security monitoring system
- CEM Security monitoring system
- VIVOTEK Security monitoring system
- Sony Security monitoring system
- DSC Security monitoring system
- OPTEX Security monitoring system
- Parabit Security monitoring system
- MOBOTIX Security monitoring system