Security monitoring system
ADT, a provider of monitored security and interactive home and business automation solutions in the United States and Canada, unveils its new ADT Commercial brand and positioning video, as part of its multi-year expansion plans. Since the merger with Protection 1, ADT has built upon its commercial capabilities and customer focused approach combining more than ten strategic acquisitions, bringing decades of experience to commercial and national account customers. ADT’s announcement is part...
Keyfactor, a provider of secure digital identity management solutions, announces the launch of Keyfactor Control 6. This newest release of the company’s flagship, end-to-end secure identity platform addresses scalability in connected device security. Keyfactor Control secures, authenticates and future-proofs IoT identity at every step of the device lifecycle, providing a scalable IoT security solution. “The threat landscape is changing – trends like IoMT are creating new secur...
Dahua Technology, a video-centric smart IoT solution and service provider, showcases a wide range of competitive product portfolios and smart solutions to top security professionals during the International Security Conference and Expo (ISC West) at booth #14039 from April 10th to 12th. Dahua will also celebrate the fifth anniversary of its USA subsidiary on Wednesday evening, showing strong commitment to the local markets. Running with the theme ‘Empowering through Technology’, the...
March Networks, a global video security and video-based business intelligence pioneer, is pleased to introduce March Networks Insight. The new, hosted service provides March Networks customers with unmatched video network visibility, asset control, system health, and service level agreement (SLA) performance management. It offers a visual overview of an organization’s entire video network, and valuable reporting capabilities accessible via a secure, cloud-based platform. Leveraging the pr...
Resideo Technologies, Inc. is highlighting its latest offerings at ISC West 2019 for the first time as a standalone company, following its successful spinoff from Honeywell. The security industry will see Resideo’s new home automation platforms, a new security dealer loyalty program and how the companies’ new voice, video and mobile solutions integrate with consumer’s connected lifestyles to give dealers opportunities to expand their businesses. Home Security “We are fu...
Dortronics, a pioneer in off-the-shelf and customized door control solutions, is showcasing its 4800 Series Intelligent Interlock Controllers here at ISC West 2019 (booth #1037). The newly enhanced controllers offer an abundance of features providing installers with a higher degree of versatility to meet customers’ specific needs. “Our enhanced line of door interlock controllers are a one board solution that allows the installer complete control of all operating and configuration op...
Dortronics, a pioneer in off-the-shelf and customized door control solutions, showcases the company’s custom design and manufacturing capabilities and enhancements to its popular 4800 Series Door Interlock Controller here at ISC West 2019 (booth #1037). “The demand for electronic door and access control systems continues to grow as more companies and organizations look for better ways to protect people, property and assets, and reduce liabilities,” said John Fitzpatrick, President of Dortronics Systems, Inc. “Dortronics specialises in delivering the products with the performance, quality and often customized features and aesthetics that installers need with fast turnaround times and at the right price.” Fast Turnaround Times This facilitates the company’s unique ability to custom fabricate a wide range of door control products with fast turnaround times All of Dortronics’ product design and manufacturing operations are located at the company’s Sag Harbor, NY headquarters. This facilitates the company’s unique ability to custom fabricate a wide range of door control products with fast turnaround times. Dortronics’ wide range of customized products includes: switches with durable, highly-visible laser etched or engraved paint filled lettering; and custom plate sizes and annunciators in almost any shape and size. Also at ISC West 2019, Dortronics is showcasing enhancements to its 4800 Series Door Interlock Controller, which accommodates up to five doors, including doors with automatic openers. The unit’s 17 outputs control door locks (fail-safe or fail-secure), traffic lights and mirror door status with alarm outputs with a long list of features that includes adjustable timers for propped door time, panic release unlock time, and unlock pause time for REX unlock time. Additional features include 12 inputs for door status, request for access, interlock override and emergency unlock. A watchdog circuit to monitor operation, LED input/output status indication and voltage spike/surge protection are also all included. The 4800 Series is available as a controller board only or with a 4-amp Class 2 UL 294 power supply.
SilverShield Safety & Information Systems, providers of the industry’s most advanced cloud-based, multi-platform solution, is featuring their new Self-Service Visitor Management Kiosk at ISC West this week. The kiosk is integrated with the SilverShield Visitor and Incident Management System to enable unmanned registration for visitors and guests. “Our Self-Service Kiosk helps organizations secure all of their entry points so they know who is on premises at all times, even those entry points that are unmanned,” said Robin Baker, CTO, SilverShield. “Even a single uncontrolled entrance could otherwise compromise the safety of the facility.” Silent Alert Notifications Visitors can self-register with the SilverShield Kiosk (SS Kiosk) using a Mac or PC computer, iOS or Android device. The process is fast and easy; users enter their credentials manually, scan their valid IDs, or scan a SilverShield Quick Badge. Once a visitor’s details are entered, SS Kiosk notifies a Kiosk Monitor (e.g., system administrator or security guard) that a visitor has completed check-in; they can then initiate access or deny access if the visitor’s details match any watchlist or sex offender entries. If a visitor’s details are matched with any watchlist or sex offender entry, the Kiosk Monitor may initiate silent alert notifications to any stakeholders the organization chooses. Also, if the visitor that is denied access becomes a further threat, the Kiosk Monitor can initiate any additional internal or external alarms they feel are needed (e.g., Alert Security, Hard Lockdown, etc.) which produce mass emergency notifications. “The SilverShield Self-Service Kiosk ensures that all visitors are correctly checked-in, screened and badged,” said Baker. “It’s one more way that SilverShield Systems helps keep your facility safe and secure.”
ReconaSense announces ReconMaps, a new module of its A.I.-powered security platform, designed to provide real-time decision support for advanced emergency and security management. This powerful geospatial visualization tool empowers organizations and security departments to quickly and easily view any type of incident, and the affected surrounding resources. The solution features geospatial mapping that connects the dots between the location of people and physical assets, and the evolving conditions around them. Beyond just identifying and mapping hot spots, ReconMaps allows users to apply flexible geofencing to define areas of interest, and all affected assets in an area. Further, the solution can automatically identify the fastest path to respond to any threat as conditions evolve in real-time. Controlling Access Permissions Includes visualising and identifying people, buildings or assets based on the severity, type and location of the threat This includes visualising and identifying people, buildings or assets based on the severity, type and location of the threat. When combined with live video feeds, response times and quality are drastically improved. As threat levels increase in a particular area, ReconaSense can send actionable guidance to targeted groups and individuals to relocate to safe locations, while controlling access permissions. Leveraging integration with GPS, RFID, devices, and other data sources, the solution can map any asset defined by an organization and ‘flag’ it the moment something atypical occurs – such as a gas leak in a pipeline, an unauthorized vehicle in a no-entry zone, or other events and activities that can be identified by a sensor or application and reported to ReconaSense. GPS-Directed Guidance ReconMaps geospatial A.I. features and benefits include: Geofencing: Define any perimeter on a map to monitor, track, communicate with and control people and assets in a specific range including any micro, macro or global location. Geospatial Analysis: Identify a potential threat or risk on a map, understand where and how widespread it is, and who and what may be affected. Proactive, Risk-Aware Guidance: Target specific individuals and groups based on their unique role, status and location and provide GPS-directed guidance to quickly reach safety zones and avoid a threat altogether. Optimal Routing: Accelerate response times and provide optimal paths for responders to reach an impacted area, people or assets based on real-time traffic, weather and travel conditions. Risk-Adaptive Access Control: Leverage integration with ReconAccess to provide or deny access to specific areas or safe shelters based on evolving risk conditions. Remote Control: Integrate with building automation systems to shut down or turn on safety systems according to established safety and security protocols. Analyzing Travel Schedules The solution works in combination with other components of the ReconaSense security intelligence platform and risk-adaptive access control solution to analyze, detect threats and send actionable guidance – without having to pull manual reports or look at spreadsheets that might slow down responses, and put lives and systems at risk. With such a broad, bird’s-eye view, ReconMaps makes it easier and faster for campuses, smart cities and smart buildings, geographically-dispersed organizations and critical infrastructure to assess location-based risks and to make real-time security decisions. The system can project and predict the impact of a weather event or other impending situation by analyzing travel schedules For example, the system can project and predict the impact of a weather event or other impending situation by analyzing travel schedules, scheduled calendar events for key executives, transportation plans and routes, and more. Any upcoming events that may put people and assets at risk can be rescheduled or re-routed and alerts can be sent to impacted individuals to avoid a potentially dangerous situation. Risk-Adaptive Access Control Solution “Too often in an emergency, limited interoperability between disparate security systems can impact the flow of information and allow things to slip through the cracks – increasing, rather than decreasing, the number of lives and assets at risk,” said John Carter, co-founder, president and CTO of ReconaSense. “ReconaSense geospatial A.I. offers a visual presentation layer that’s easy to navigate across highly-diverse, dynamic environments. It provides the ability to quickly and easily drill down into specific points of interest, and recommend intelligent, proactive responses.” Attendees at ISC West in Las Vegas are invited to learn more at a panel presentation on The Rise of Intelligence in Physical Security, featuring speaker Clayton Brown, co-founder and vice president of business development and strategy at ReconaSense, on April 11 at 9:45 a.m. PDT in Sands 304. The ReconaSense team will be onsite demoing its A.I.-powered security and risk intelligence platform and the industry’s first risk-adaptive access control solution, ReconAccess, in the Connected Security Expo, Booth #33091.
Facit Data Systems is delighted to announce that it is working in partnership with Avigilon. Avigilon is a Motorola Solutions company that provides trusted security solutions to the global market. Avigilon manufactures video analytics, network video management systems, surveillance cameras and access control solutions. Avigilon's solutions are installed at thousands of sites, in education, transportation, healthcare, banks, public venues and critical infrastructure. Video Data Analytics Facit Data Systems specialises in video data analytics and compliance. Facit's analytics systems typically operate over installed monitoring cameras to help organizations to generate business intelligence and reduce operating costs. Waqas Hassan, Facit Data Systems CEO, says: “We are very pleased to be working with a company that has such a deserved reputation for quality and service. Our products are innovative and unique, and we look forward to helping Avigilon to add value for their customers.”
Southwest Microwave has expanded its suite of intelligent microwave sensor technologies with the introduction of the IP-based INTREPID Model 336-POE Long Range Digital Microwave Link. This all-weather, Power over Ethernet (POE) sensor makes reliable perimeter security more accessible than ever, coupling field-proven RF detection performance with secure network connectivity. With a range of 457 meters (1500 feet), operating at K-band frequency, Model 336-POE is ideal for the protection of fence lines, open areas, gates, entryways, walls or rooftops. The sensor employs advanced digital signal processing algorithms to optimize discrimination between intrusion attempts and environmental disturbances, mitigating risk of site compromise while preventing nuisance alarms. Reducing Wiring Requirements The system recognises unique profiles of intruders walking, running or jumping through the detection field, offers enhanced crawl and vehicle detection, and optimizes performance in narrow corridors. Along with instantly triggering an alarm when an intrusion attempt is detected, the sensor alerts on unexpected changes in microwave alignment signal. A configuration security feature also provides notification when changes to device settings are attempted, ensuring that only approved modifications are implemented. The sensor features an on-board network server for set-up and control that supports multiple ports and sessions Employing a single Ethernet cable for power and data transmission, each Model 336-POE sensor operates as a network element, significantly reducing wiring requirements and seamlessly integrating with other IP/POE-based security devices, such as cameras and access control systems. The sensor features an on-board network server for set-up and control that supports multiple ports and sessions. Intrusion Detection Capabilities Sensor configuration, alignment and testing are handled using an embedded, browser-based Installation Setup Tool (IST), eliminating the need for software installation and simplifying device administration or diagnostics. “This sensor integrates security with convenience by successfully pairing Southwest Microwave's superior microwave intrusion detection capabilities with the ability to access and manage a sensor, at any time, from any location by any authenticated PC or handheld device connected to the network.” Maira Zanrosso, Director of Sales and Marketing Alarm monitoring is handled via Southwest Microwave’s server-based POE control module (CM-POE) or through an available no-cost SDK that simplifies high-level interface to third-party physical security information management (PSIM) or video management systems (VMS). Learn more about INTREPID POE System Controllers. “This sensor’s inherent POE capabilities and IP connectivity for communications allow us to deliver measurable cost and time-savings benefits to our customers,” said Zanrosso. “These network-based technologies successfully address today’s risk mitigation requirements, while achieving the goal of simplified security infrastructure.”
Eagle Eye Networks, the provider of cloud video surveillance worldwide, announces the Eagle Eye Mobile Camera MC01 which is available immediately via its reseller partners. The MC01 is a small 4G/LTE camera for use in locations that have difficulty with standard internet access. Eagle Eye Networks is also making mobile data plans available so that channel partners can provide a complete solution to their customers. The Eagle Eye MC01 is designed specifically for remote applications, temporary installations, or changing environments where standard Internet connectivity is not easily available. The MC01 is ideal for temporary installations. The MC01 provides direct camera to cloud connectivity, plug and play installation, advanced person detection analytics and state-of-the-art cyber security. Cloud Managed Solution The MC01 is a 2 Megapixel camera that records directly to the cloud, provides alerts and notifications, and can be viewed from full featured mobile apps The MC01 is a 2 Megapixel camera that records directly to the cloud, provides alerts and notifications, and can be viewed from full featured mobile apps. “The Eagle Eye Mobile Camera MC01 is another step on the path of bringing all the security camera video that customers have and need, into a single secure cloud managed solution” said Dean Drako, CEO of Eagle Eye Networks. The Eagle Eye Mobile Camera MC01 will be fully integrated into the Eagle Eye Cloud VMS platform later this year, until then the new camera operates on a stand alone cloud recording system. The Eagle Eye Mobile Camera MC01 has the following specifications: Indoor and Outdoor capabilities, 2.43 MegaPixel Resolution, 3G/4G and Wifi connectivity, 2.8 mm Lens, Wide Angle View (138º), Night Vision IR Led with 10m range, Waterproof, Two Way Audio. Home Care Applications The Eagle Eye Mobile Camera MC01 has been utilised in many applications including: Remote industrial sites Remote storage facilities Crop monitoring Temporary construction Garages Building stairwells Festivals Oil and gas pumping stations Remote water cleaning facilities Ship locks Health and home care applications Comprehensive Data Plans The Eagle Eye Mobile Camera can be used indoors and outdoors on 4G, or on Wifi and 4G combined The Eagle Eye Mobile Camera can be used indoors and outdoors on 4G, or on Wifi and 4G combined. When combined, the 4G is used as a back-up to the Wifi connectivity. The Eagle Eye MC01 can function with a customer’s mobile data plan or with a data plan available from Eagle Eye Networks. The Eagle Eye MC01 is a simple to install plug and play camera derived from the successful consumer focused NuboCam. NuboCam, launched in 2015 was the world’s first 4G / LTE camera and remains available to consumer customers on the NuboCam website. The new commercial Eagle Eye Mobile Camera MC01, however, has additional capabilities, robustness, integrations, more flexible recording plans, and more comprehensive data plans. It has been upgraded and designed to meet the needs of commercial customers.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the check. What First Brought The Issue Of Alarm Verification To Your Attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What Is The False Alarm Rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why Did This Issue Resonate So Strongly With You? When I first investigated this issue, I was sure that the security industry would have already recognized this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who Is Affected By This? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a check for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What Is The Average False Alarm Fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why Do You Believe Audio Is The Ideal Technology For Secondary Source Verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How Would A Secondary Source Verification System Work With Audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are There Any Additional Resources You Would Suggest Looking Into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting Existing Hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect Anomalous Data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make Critical Decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyze more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple Camera Streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing color. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion Detection Scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyze video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
ISC East is making a name for itself as a must-attend regional conference and trade show in New York City that brings together the large community of law enforcement and private sector security professionals from the Tri-State area. ISC East, being held Nov. 14-15 at New York’s Javits Center, is emerging from the long shadow of its sister show – ISC West in Las Vegas in the spring – and making its own mark on the industry. ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300. Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar, Bosch Security Systems, and Seagate Technology. In all, there are 115 new exhibitors compared to 2017.Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar and Bosch Security Systems “We purposefully make sure we reflect the region we are in,” says Will Wise, Group Vice President, Security Portfolio, Reed Exhibitions. “It’s not a mistake that both our keynote speakers have New York-centric backgrounds and have topics to reach a larger market. We want to tap into the strengths of the region.” ISC East (International Security Conference & Exposition) has come a long way in the last five years. In 2014, the show was a mere 28,000 square feet, and this year it has grown to 44,000 square feet of exhibit space. One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA). The two-day event is characterized by “good energy” on both days, says Wise. There is less than 10% duplication of attendance with ISC West. Liability Issues Of Event Security A big topic for New York and surrounding areas is event security, and one session covers “Confined Space Protection & Risk Mitigation for Today’s Industry Leaders.” The session will focus on safeguarding event organizers’ brands, protecting them from liability, and balancing the need for security that doesn’t negatively impact the “guest experience.” One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA) Liability issues of event security are especially timely now, given MGM Resorts' recent lawsuit asking the courts to protect it from legal liability in the wake of the Las Vegas massacre last October. “Event security is integration of physical security with smart technology and not being overzealous,” says James DeMeo, Founder, President and CEO of Unified Sports & Entertainment Security Consulting LLC. DeMeo’s presentation on event security is one of the “back by popular demand” sessions at ISC East – there was a big turnout for his previous sessions at last year’s ISC East and at ISC West. “A big part of event security is integrating technology, but we also need the human element,” says DeMeo. “Good guest security and harmonious relationships require a level of training that includes escalation, behavioral analysis, and communicating more harmoniously.” ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300 Holistic Approach And Technology Integrations From the session, DeMeo hopes attendees will take away awareness of the need for responsible social media monitoring, integration of technology, threat behavior analysis and early attack indicators, proactive risk mitigation, and staff training. The emphasis is on a holistic approach “from the top down and the bottom up,” says DeMeo. “It’s a sophisticated niche based on potential liability, and we must do everything possible to protect fans and patrons.” Crowd security is another ISC East topic that is tailor-made to the New York location of the show Crowd security is another ISC East topic that is tailor-made to the New York location of the show. A session on installation of safety and security barriers to protect pedestrians and crowds is another session that is “back by popular demand.” Rob Reiter, co-founder of the Storefront Safety Council, will present the session on protecting urban environments. Another return session is about drone security and regulations. It will provide an overview of current policy and regulatory framework and provide understanding of how to get involved in the discussion to enable drone use in security applications. Converged Security And Smart Cities A new session at ISC East this year will be “Smart Cities, Smart Buildings and the Evolution of the Converged Security Approach.” Pierre Bourgeix, president of ESI Convergent, will help attendees understand converged security and how it relates to the smart cities and smart buildings movement. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems SIA and ASIS International will present findings from a study on how successful individuals can gain experience and skills they need to advance their security careers. Co-locating with ISC East will be the Unmanned Security Expo, which focuses on Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions and software applications to support them. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems. Also co-locating with ISC East will be Infosecurity North America, which includes a conference program with well-respected industry speakers, an expo floor and networking opportunities.
Open architecture in physical access control is built around Mercury Security’s access control panels, the de facto standard embraced by more than two dozen access control original equipment manufacturers (OEMs). Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments related to the Mercury platform. MercTech4 highlighted a new generation of access control products, which are increasing the capabilities for Mercury OEMs in areas such as two-way communication and encryption. Enhancements include use of the OSDP (Open Supervised Device Protocol) v2 communication standard instead of the older (and less flexible, less secure) Wiegand standard. Other advantages are relay count activations, a crypto memory chip and default encryption, a critical feature ensuring greater cybersecurity. Integration Of Hardware With Physical Security Mercury hardware is sold exclusively through OEM partnerships. The new LP4502 controller and access control platform use the Linux operating system. Mercury also provides hardware integration at the controller level with elevator manufacturers such as Otis, Kone and Thyssenkrupp, including “destination dispatch,” which groups passengers going to the same floors into the same elevators, thus reducing waiting and travel times. Mercury hardware is sold exclusively through OEM partnerships. The new LP4502 controller and access control platform use the Linux operating system Integration of Mercury controllers with LifeSafety Power’s IP-based intelligent power supplies enables system health and diagnostic data to be shared for preventive maintenance. Mercury also offers several “bridge” products to enable its OEMs to transition installed proprietary systems from outdated Casi-Rusco (GE), Software House I (Tyco) and Infographics (GE) technologies to an open platform using Mercury hardware. Business As Usual Other recent news for Mercury is the company’s acquisition by HID Global last fall. Mercury Security President Matt Barnette says the acquisition will not impact how Mercury goes to market. “It’s business as usual,” he says. “It’s 130 days into the acquisition, so it’s still early on, but we are continuing to do what we do.” HID will develop a roadmap for improved combined solutions among the controller, reader, credential and cloud Steve Carney, HID Global’s vice president of product marketing for physical access control, provided an update from the HID Global perspective to MercTech4 attendees. He reiterated that there would be no change in Mercury’s OEM go-to-market strategy. He emphasized that Mercury’s team and talent remain core to the brand, and HID will develop a roadmap for improved combined solutions among the controller, reader, credential and cloud. Open architecture companies throughout the access control industry – Mercury’s OEM partners – are incorporating the new boards into their products, each putting their “spin” on those capabilities and expanding the functionality of their systems. At MercTech4, seven of those OEMs hosted small groups of consultants in focused meetings to highlight what’s new with their products. Lenel Honored As 'Platinum Premier' Partner Lenel, Rochester, N.Y., has been a Mercury's OEM partner since 1995. Lenel is Mercury’s first-ever "Platinum Premier" partner. In recent years, Lenel’s OnGuard system has evolved into a fully browser-based system providing both alarm and cardholder management through web browsers, and access to the platform on a computer, laptop or tablet. OnGuard WATCH (Web Access Trending and Comprehensive Health) provides system monitoring tools and health checks, such as tracking CPU usage and logging error files. Lenel has introduced its own BlueDiamond mobile credentialing system based on Bluetooth Low Energy and deploying mature technology previously used by sister UTC companies for real estate locks and in the hospitality market. Feenics, an Ottawa, Ontario, cloud-based access control company, was also among the Mercury OEMs participating in MercTech4. The Keep by Feenics platform is scalable from a single door to a global enterprise environment. A RESTful API provides easy connection of third-party applications. Feenics emphasizes cybersecurity in the cloud, using Amazon Web Services, Transport Layer Security (TLS) encryption, and Veracode penetration testing. They use MongoDB open source database replica sets instead of Microsoft SQL. Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments Integration And Encryption RS2 Technologies, Munster, Indiana, is another Mercury OEM highlighted at MercTech4. Their top vertical markets are K-12 schools, utilities, healthcare and government. RS2’s features include a PSIA-compliant interface, compatibility with BACnet and the Pinwheel DME (Data Management Engine) for bi-directional database integration. RS2 offers web-based support, and each edition of the Access It! software implements features suggested by customer RS2 offers web-based support, and each edition of the Access It! software implements features suggested by customer. Product enhancement is a focus of RS2’s engineering. Open Options, Addison, Texas, is a Mercury Platinum Elite partner whose customer base spans every vertical, and whose feature set reflects customer feedback. Open Options offers Mercury hardware mounted inside a sleek plastic enclosure, among other form factors. The company emphasizes an open business culture and dedication to customer service. Customer support is a direct phone line to speak with a live person every time to get any issue resolved. Open Options’ DNA Fusion Version 7 platform includes new features such as an updated user experience. DNA Fusion interfaces seamlessly with security technologies — including video, biometrics, wireless locks, and more. Last year, Open Options marked 20 years of partnership with Mercury Security. Engineering For The Masses Avigilon, Vancouver, B.C., is embracing new Mercury products in its completely browser-based Linux platform that can scale from entry-level to enterprise systems. The ACM (Access Control Manager) software is engineered for IT professionals and is updated every 60 days.The Linux-based system uses features such as the Avigilon “Appearance Search” capability to shift operation of security systems from a reactive to a proactive stance For Avigilon, access control is a component of a broader approach that uses analytics and self-learning to manage massive amounts of data and provide the information an operator needs. The system uses features such as the Avigilon “Appearance Search” capability to shift operation of security systems from a reactive to a proactive stance. Genetec, Montreal, Canada, emphasizes the value of its “unified” approach that combines video, access control and automatic license plate recognitions into a single platform – designed from the ground up – that incorporates communications, intrusion detection and analytics. Cybersecurity failures prominent in the news often occur because of negligence – the customer had not implemented a software patch, for example. Genetec helps to manage such concerns. When cameras are deployed in the Genetec platform, the system provides an alert if a new camera firmware version is needed. The Genetec Update Service (GUS) notifies customers of any needed software updates. Prominence Of Cybersecurity Honeywell’s Win-Pak access control software is integrated with the Pro-Watch security management suite. Cybersecurity is a corporate priority for Honeywell, whose products follow the SDLC (systems development life cycle) process with security requirements based on the ANSI/ISA 62443-3-3 standard. Microsoft's Threat Modelling tool identifies entry and exit points of systems that an attacker could exploit, providing the development team an attacker's viewpoint. The secure product development process includes static code analysis, secure code review, code signing, binary scanning and component inventory. Products are thoroughly tested by the Product Security Assurance Team and at times by an Advance Independent Testing Team. If vulnerabilities are identified after release, they are handled by the Product Security Incident Response Team. Cybersecurity issues dominated a consultant roundtable event on the second day of MercTech4. There was plenty of spirited discussion and some valuable insights among the 40 or so participating consultants. More to come on that in another article in the next couple of weeks.
Deliveroo, one of the world’s fastest-growing tech businesses, has chosen AEOS access control by Nedap to protect its staff across the world. Nedap’s Uk Expert channel partner, Hunter Group, completed the installation at the first site, in Dubai, and an ambitious rollout will see Hunter install AEOS at around 50 more Deliveroo sites, plus new locations, over the next 12-18 months. Deliveroo was founded in the UK and is proud to export British-born technology around the world. Its ‘Frank’ algorithm is based on powerful predictive technology that evaluates the most efficient way of distributing orders based on the location of restaurants, riders and customers. Global Security Platform With 650% year-on-year growth, Deliveroo’s development has been explosive and the company now has at least 200 offices across 47 countries. Staff security is paramount for Deliveroo and it wanted a global security platform and technology partners capable of keeping up with its expansion. Naturally, Deliveroo is keen to embrace new technologies and innovations too, and wanted to move forward with companies like Nedap and Hunter that have the same future-facing mentality. AEOS will enable Deliveroo to centralize security and will be able to manage its global security system AEOS will enable Deliveroo to centralize security. It will be able to manage its global security system, and closely monitor staff safety at each location, from its London headquarters. Access control reporting will, for example, show that drivers have arrived safely and CCTV footage will enable offices to be viewed from across the world. Central Security Policy Some Deliveroo sites are in areas where staff need more robust protection. AEOS gives the flexibility to adapt security settings and solutions according to the site, while still adhering to a central security policy. Deliveroo can, for example, choose which identifiers its staff can use at each site, and can easily change this whenever it chooses to. AEOS also scales easily – both at individual sites and across new locations. So as Deliveroo continues to grow, its security system can too. Over the coming months, AEOS will be installed at Deliveroo sites in London, Paris, Amsterdam and Brussels, with sites in Madrid, Melbourne and Singapore following soon afterwards.
Parekh Integrated Services Pvt. Ltd (PISPL) is in the business of providing high-quality logistics services that give customers a competitive advantage in the Indian market. Established in 1981, PISPL is a one-stop shop logistics and supply chain service provider in India offering storage and distribution services, freight forwarding, transportation, information technology and cold chain management solutions along with other value added services to multiple industry verticals. Video Surveillance Systems Parekh Integrated Services Pvt. Ltd (PISPL) has established their operation with more than 1,500 warehouses and distribution setups to cover all the major cities in India for their services. With this expansion, IT infrastructure equipment was procured, including IP video surveillance systems of different reputed brands from different vendors. Cost of operation has also gone up due to technical expertise required for each individual system Over a period, it was becoming costly and difficult to manage different brands procured separately at different locations. Cost of operation has also gone up due to technical expertise required for each individual system. PISPL was looking for a centralized solution, which can work with different reputed brands as well as give them a common control of all the video surveillance systems to reduce the technical manpower cost for different systems. Occupancy Control System Due to low bandwidth at some of the remote locations, PISPL were not able to secure video evidence at a central location. It was required for any kind of post analysis or dispute resolution. PISPL were looking for an occupancy control system in each warehouse/storage area to manage and control the worker's presence in sensitive areas. It was getting difficult to do it manually at each location with the increase in number of employees over the last few years. Matrix provided video management software (VMS) as a centralized platform to monitor and manage all the cameras from a central location on a single platform. It worked as a common platform for all the surveillance cameras from different brands, which leads to reduction in operation cost. Matrix VMS supports all the camera models of major brands including ACTI, Samsung, SONY, Mobotix, Panasonic, Vivotek, etc., along with ONVIF protocol. Crowd Management Feature PISPL enabled the centralized schedule backup at an even lower bandwidth from all locations to the central location Using Matrix VMS Solution, PISPL enabled the centralized schedule backup at an even lower bandwidth from all locations to the central location. This made it easy to go through the video evidence at a central location and resolve the issue in short time. Another issue of maintaining occupancy a certain limit in each zone was addressed by the Matrix VMS crowd management feature. All the entry/exit points were covered with a camera to count number of heads passing through the points. From central control room, using Matrix smart client, security can monitor the total occupancy of an area and instruct the team accordingly. Thus, it provides a common platform to connect multi-brand cameras, secure video evidence at central location and control zonal occupancy, which were the major challenges. Control Zone Occupancy Why did PISPL choose Matrix? Matrix VMS architecture supports centralized / decentralized monitoring and management Matrix VMS interoperable with most of the reputed brands Possibility of scheduled backup at central location even at lower bandwidth People counting feature to control zone occupancy Benefits: Centralized control and management Ease of use Secure evidence Improve productivity Products: SATATYA SAMAS GE PLATFORM - VMS Platform with 50 camera licenses SATATYA SAMAS CAM20 – 20 camera additional licenses SATATYA SAMAS CROWD - 20 camera additional licenses management cam5
Sony’s ultra-sensitive SNC-VB770 4K network cameras are helping maintain the safety of bridge users – and the physical integrity of the structure itself – at river crossings between the neighbouring states of Pennsylvania and New Jersey. A total of twenty cameras have been installed by Delaware River Joint Toll Bridge Commission (DRJTBC), a Bi-State commission of Pennsylvania and New Jersey. This self-funded agency ensures safe, efficient and dependable journeys for road users and pedestrians. Potentially Dangerous Collisions A principal application for the cameras is the reliable 24/7 identification and monitoring of hazardous floating debris Several of the bridges controlled by DRJTBC are in areas, where homes are nearby, and local municipalities request not to use powerful artificial illumination at night to limit light pollution. This restriction made the SNC-VB770 an obvious choice for monitoring and surveillance, with its highly sensitive 35mm full-frame Exmor CMOS image sensor capturing crisp 4K color images in conditions of near total darkness. A principal application for the cameras is the reliable 24/7 identification and monitoring of hazardous floating debris. Objects like fallen trees or discarded gas tanks heading down river – especially in winter when water levels are high – pose the risk of impacting with the bridge supports, making early warning of potentially dangerous collisions essential for operational staff. Low-Light Performance In addition to monitoring for signs of loitering and other suspicious activity around the bridge supports, the cameras also help ensure the safety and security of pedestrians using walkways to cross the bridges, especially at night and in adverse conditions of rain and snow when visibility is poor. Supplied and installed by Schneider Electric, all cameras are mounted in weather-resistant housings and integrated with DRJTBC‘s Genetec Security Center network video management system platform. We subsequently put them through their paces in a live demo at two of our bridge locations" “We first previewed the Sony 4K cameras' capabilities at ISC West” explains Eric Freeman, Director of Public Safety & Bridge Security at Delaware River Joint Toll Bridge Commission. “We subsequently put them through their paces in a live demo at two of our bridge locations. Analyzing video from the SNC-VB770 and comparing it against our existing cameras, the difference was immediately clear in terms of Sony’s extra detail and low-light performance.” Video Surveillance Applications "4K is an increasingly popular solution in a wide range of video surveillance applications” says Allen Chan, Manager Application Design for Sony Video Security at Bosch. “Many other 4K cameras currently on the market trade extra resolution for decreased sensitivity, and that’s a big issue in environments where available light is limited. The SNC-VB770 side-steps this challenge with its unprecedented sensitivity of ISO 409600 – giving an impressively clear view at night and in situations where other 4K cameras aren’t viable without installing costly additional illumination”.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces that the Bradley Business Center, located in Chicago, has installed a 3xLOGIC infinias CLOUD access control system throughout the redevelopment project. HTML Global, an IT Managed Services Provider (MSP), oversaw system installation and continues to provide remote system management. Bradley Business Center (BBC) is the largest redevelopment project on Chicago’s north side, comprising over 500,000 square feet, spread over 22 acres. The BBC offers a unique shared office environment for entrepreneurs and professionals and boasts a wide array of features and amenities. Controlling Common Areas Both organizations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions At present, the 3xLOGIC infinias system manages a total of 43 internal doors throughout the complex, split between BBC-managed doors and those for a tenant company, Compass Health Center. The two organizations manage their own access separately but use some of the same network and PoE switches. BBC doors managed are mainly those controlling common areas and shared amenities— parking, fitness facility, rooftop terrace, and others—but also data rooms and other sensitive areas within the office space. Both organizations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions when requested. “When we started with BBC, they were looking to us for our knowledge base, and we installed a few doors at that time. Then, we built out the system as they added new offices and common areas to be managed,” explained William Hunt, Managing Director, HTML Global. Cloud-Based System “The distributed Ethernet network can easily handle all the doors and that simplified installation and on-going management. The BBC property management staff don’t want a server onsite, so a cloud solution nicely fits their needs. Another advantage for BBC is our RMR services and the fact that a cloud-based system is mainly operating expenses, not hardware capital expenses—that’s economically advantageous for a property management business.” “There are so many other advantages to a cloud-based system, especially our ability to add doors when any of the resident companies want to join the system, or to expand the number of doors for existing customers—we can add one door or hundreds of doors upon request,” said Hunt. “Compass likes the system functionality and ease-of-use so much, they recently expanded it to their Northbrook location, too. That way, when staff move between the two facilities, they only need one set of credentials.” Access Control System Such high-level control and ease of use is accomplished with minimal hardware on site BBC controls access by zone and/or amenity for each credential holder, administrators can add zones and close access to other zones with a few keystrokes. Door control is granular, making it easy to provide all-areas access to senior staff and highly-limited access, for example, for contractors and temporary workers. Such high-level control and ease of use is accomplished with minimal hardware on site. Many administrators were up and running on the infinias system with very little training, if any. With a cloud-based access control system, new tenants can join the system with ease, or a tenant can be removed from the system in a matter of minutes. Fix Things Remotely Hunt again, “As an MSP, we are overseeing a system that updates itself automatically, and because BBC management doesn’t have a full-time IT person, that’s where we come in.” The future looks bright for HTML Global with the Bradley Business Center. Current office space is nearing fully-leased status, and BBC management is looking to expand their property offerings into additional buildings located on the same parcel. Hunt is impressed with another feature of the cloud-based system, “The network is set up on PoE switches, so if a door isn’t acting properly, we can fix things remotely, we don’t need to roll a truck—that’s very cost-effective.”
Pomelit Door Entry has been specified as the stylish system of choice at the much anticipated, Renaissance Retirement’s new luxury independent living, Fleur-de-Lis site in Marlborough. The development of 28 superior one and two bedroom apartments, built on the former Old Yard is the first new build site of its kind in the town for over 10 years. Designed in part by ex-England Heritage consultants, it adopts an ‘arts and crafts style’ consisting of sweeping, sprocketed roofs, Voysey dormers and large chimneys. Door Entry Panels With Orestone Controls Limited being the preferred and specialist installer for Renaissance Retirement Limited With Orestone Controls Limited being the preferred and specialist installer for Renaissance Retirement Limited, the complete specification for the Fleur de Lis development right through to Comelit’s bespoke door entry panels, had to work with the ambition to present an independent lifestyle in a contemporary setting, and a modern and stylish environment. Says Paul Williams, Construction Director for Renaissance Retirement: “Fleur de Lis stands as one of our major new home launches. Not only does it look aspirational from the outside, but each apartment presents a real opportunity for those seeking to maintain a quality standard of independent living and uphold a luxury style of life.” Fully Integrated Solution “Throughout the project, from initial design through to specification and works completion, we have relied upon our trusted suppliers to advise on how to deliver on our vision. From a security perspective, it was integral that each of the properties connected to emergency call systems and 24-hour response, as well as an on-site concierge who is on hand to assist owners and oversee the development’s daily operation.” Orestone Controls worked with Renaissance Retirement right from the initial design and specification of security and fire systems on site, to installation, ensuring a fully integrated solution. For smart door entry, Comelit’s 2-wire SimpleBus system with mini handsfree monitors were selected to operate with KMS Access Control and FAAC gate control kit, installed to control the front gates and main entrance to the site. Seamless Security Experience And Fleur-de-Lis even takes this to the next level; to provide an exceptional standard of independent living"Richard Chadd, Orestone Controls’ Engineering Manager added: “We have worked with Renaissance Retirement Limited long enough to understand their requirements and high expectations to deliver luxury as standard. And Fleur-de-Lis even takes this to the next level; to provide an exceptional standard of independent living.” “Here, we had to consider each aspect of its specification in considerable detail, to ensure an impeccable finish. Comelit Group is globally renowned as a stylish door entry manufacturer and high specification solution. Its ability to integrate with selected gate and access control systems ensured we can create a seamless security experience.” At the Fleur-de-Lis development, warden and nurse call systems, operated through a specialist PA system presents residents with complete peace of mind that necessary services can be called in case of emergency. Independent Retirement Lifestyle Gareth Goodall, Comelit Business Development Manager concluded: “Renaissance Retirements’ exceptional Fleur-de-Lis development, in its provision of age-exclusive apartment living close to all the local amenities, is the ultimate choice for those desiring a peaceful and independent retirement lifestyle.” “To ensure success, security right from the perimeter through to apartment door entry, incorporating all community facilities, must be carefully balanced between ease of use for downsizers, integrated technology and with no compromise to quality or style. It’s something Comelit worked closely with Orestone to create a bespoke door entry solution.”
Six CNI utilities sites across South West England and Wales have been secured from terrorist attacks and ongoing criminal threats in a £3.25 million security project. Gas distributor Wales & West Utilities appointed principal contractor Chubb Systems and Littlewood Fencing to work collaboratively on a fully-integrated perimeter protection upgrade. Littlewood secured the perimeter with a Lochrin Bain ‘Combi’ CPNI Approved palisade fence system enhanced with Gallagher monitored pulse fencing (MPF) to 4m high. They also installed Crime & Fire Defense Systems MAP vault panels, CCTV towers, security and field marshalling kiosks along with associated concrete and civil works. Collaborative Project Management Littlewood Security Division manager David Jackson said: “We’ve worked with Wales & West for many years as the incumbent supply and installation partner for perimeter security systems, but this latest project with Chubb also included the integration of access control, CCTV cameras, reporting systems and networks that enable remote monitoring from a central control station.” A large element of the package involved civil works that had to be completed mainly by hand In total, more than 2500m of fencing were installed along with twelve CPNI BASE vehicle gates and six Crime & Fire MAP vaults. With a number of sites located on the Brecon Beacons, access issues and inclement weather conditions made collaborative project management essential. A large element of the package involved civil works that had to be completed mainly by hand. This was achieved with a strong emphasis on health & safety ahead of program and to a high standard. Strategically Important Sites Gallagher business development manager Jason Hunter said: “A Gallagher MPF delivers safe and controlled, energised pulses. If seeing the fence and warning signs isn’t enough of a deterrent then receiving a short sharp shock should definitely deter. “The system is also connected to our Command Centre, which will alert the security team that there has been a breach so they can react quickly and effectively.” Wales & West Utilities security manager Ian Raclette said: “Gallagher’s MPF meets the CPNI criteria we demanded and helps us to detect criminal or terrorist activity in real time, reducing further any threat on these strategically important sites.” Wales & West Utilities covers a sixth of the UK, serving a population of 7.5 million. It launched on 1 June 2005, having formerly been part of National Grid Transco, and is now valued at £1.2billion.
Round table discussion
Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Products are the building blocks of systems and solutions. How those products are combined, and where the integration happens, is a variable in the physical security market. Before the advent of open systems, a single manufacturer typically combined his own products, using proprietary connections, into end-to-end solutions for customers. Open systems undermined that paradigm to some degree and made it possible for customers to pick and choose products from multiple manufacturers to be integrated into a solution. Lately, the pendulum has again swung toward “system solutions,” or end-to-end systems provided by a single manufacturer … Or has it? We asked this week’s Expert Panel Roundtable: Is the industry shifting from a focus on products to emphasizing end-to-end solutions? How is that a good (or bad) thing?