Security monitoring system
Infusion Direct Marketing, a public relations firm specializing in the security industry, announced that the company has kicked off 2020 with a new sales representative agreement in the Florida territory with Security Network Associates (SNA) of Colorado. In this new sales role, Infusion Direct will be responsible for supporting SNA’s sales efforts for IPVideo Corporation’s HALO IOT Smart Sensor in the state of Florida. HALO has taken off this year in response to the nationwide youth...
360 Vision Technology, a UK CCTV manufacturing company, has announced that with effect of 15th January 2020, Sales Director Ashley Knowles has retired from the company, and the Security Industry. “Ashley has been a founding director of the business since 2003, having previously worked at Video Controls Ltd, and has thoroughly enjoyed being part of the 360 Vision team,” says Mark Rees, 360 Vision’s Managing Director. “Over the years he has contributed to make the co...
Swan Island Networks, a SaaS security intelligence provider, announced TX Global, a breakthrough global intelligence alerting service. The all-new TX Global alerting service is built on TX360, a robust global platform for intelligence monitoring and situational awareness, deployed on the Microsoft Azure Cloud, and built for high-performance security intelligence teams. TX Global now offers easy access as a subscription service of critical global alerts aimed at corporate security, business conti...
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security....
Professional security installers are the essential lifeblood of IFSEC and FIREX International, so they are delighted to announce their long-standing partners SSAIB as the official Installer Partner for the 2020 shows, taking place once again at London’s ExCeL from May 19-21. As the certification body for security and fire alarm installation professionals, manned guarding services and monitoring, SSAIB-approved companies are exclusively invited to IFSEC International and FIREX Internationa...
Ambarella, Inc., an artificial intelligence (AI) vision silicon company, announced that Ambarella and Amazon Web Services, Inc. (AWS) customers can now use Amazon SageMaker Neo to train machine learning (ML) models once and run them on any device equipped with an Ambarella CVflow-powered AI vision system on chip (SoC). Until now, developers had to manually optimize ML models for devices based on Ambarella AI vision SoCs. This step could add considerable delays and errors to the application deve...
Allegion, a provider of security products and solutions, and CBORD, a provider of campus card technology solutions, announced a new integration that strengthens perimeter security across colleges and universities in the U.S. Allegion’s Von Duprin Remote Undogging (RU) and Remote Monitoring (RM) options will now extend the impact of CBORD’s card software system for greater control of secondary doors over perimeter access. The integration improves perimeter security by providing electronic override of mechanical dogging so lockdown can occur from the CBORD interface. To ensure peace of mind, remote monitoring capabilities are also available through the integration. Security issue on campus Colleges need to be able to lock down immediately if there is a security issue on campus" This integration also makes Allegion and CBORD one of the first to bring this solution to higher education campuses for access control at this scale. Higher education campuses face a unique challenge when it comes to security – they are larger, open by design, and tend to have more buildings than other learning institutions, making security a demanding task for facility personnel. “This is one of the most critical security hurdles universities face,” said Robert Lydic, Vice President of PACs OEM business at Allegion. “Due to the required circulation between buildings, colleges need to be able to lock down immediately if there is a security issue on campus.” Electronic access control system Yong Lacy, category leader of openings at Allegion, added, “It is not feasible for universities to leave perimeter doors locked during operating hours because students, faculty and visitors constantly need to move across campus buildings with ease. Remote undogging and monitoring can enhance security to avoid putting the college community at risk in emergency situations.” Many secondary doors are not connected to a campus’ electronic access control system, exposing universities to potential security breaches, especially during emergency lockdowns. The Von Duprin RU and RM options, coupled with CBORD’s software, are designed to extend the benefits of electronic access control to these openings. This integration provides higher education customers a wide range of affordable solutions to meet their perimeter electronic access control needs, seamlessly integrating with security systems like Schlage’s electronic locks, readers and credentials. Access control software The RM option is the sensor-only configuration for exit-only or fire-rated doors that require monitoring" “CBORD has been a provider of campus technology for more than forty years and works with partners like Allegion to design innovative solutions as security risks continue to evolve,” said Jim Hoefflin, CBORD president. “We’ve taken a best-of-breed in security solutions and integrated it with our industry-leading access control software for a smart integration that responds to the market’s increasing need for improved campus perimeter security.” The Von Duprin RU option is a retrofit kit for exit devices that enables remote undogging for centralized lock down and door status monitoring with integrated request to exit (RX), latch bolt (LX) and door position switch (DPS) signaling capabilities. The RU option connects wirelessly via BLE to the ENGAGE Gateway, providing real-time, bi-directional communication to the Open Options DNA Fusion software via IP network connection directly to the Gateway. Advanced access control adoption The RU option is a modular battery powered kit that can be added on to existing Von Duprin 98/99 and 33A/35A series devices. The RM option is the sensor-only configuration for exit-only or fire-rated doors that require monitoring. It provides visibility to door status with the same RX, LX and DPS signals as the RU option, without the centralized lockdown component. This integration is part of the next wave in Allegion’s quest to work with the leading players in the industry to spearhead advanced access control adoption, making seamless security the new standard at higher education institutions.
Ambarella, Inc., an AI vision silicon company, announced the CV22FS and CV2FS automotive camera system on chips (SoCs) with CVflow AI processing and ASIL B compliance to enable safety-critical applications. Both chips target forward-facing monocular and stereovision ADAS cameras, as well as computer vision ECUs for L2+ and higher levels of autonomy. Featuring extremely low power consumption, the CV22FS and CV2FS make it possible for tier-1s and OEMs to surpass New Car Assessment Program (NCAP) performance requirements within the power consumption constraints of single-box, windshield-mounted forward ADAS cameras. Other potential applications for the processors include electronic mirrors with blind spot detection (BSD), interior driver and cabin monitoring cameras, and around view monitors (AVM) with parking assist. Intelligent viewing platforms ZF is pleased to be working with Ambarella on the intelligent viewing platforms for Surround View Visualization" The two new SoCs are the latest additions to Ambarella’s successful CVflow SoC family that offers automotive OEMs, tier-1s, and software development partners an open platform for differentiated, high-performance automotive systems. ZF, a global technology tier-1 and supplier of systems for passenger cars and commercial vehicles, is working with Ambarella on viewing and sensing systems: “ZF is pleased to be working with Ambarella on the next generation of intelligent viewing platforms for Surround View Visualization, Driver Monitoring stand-alone vision processing, and e-mirror solutions for both the passcar and commercial vehicle markets,” said Aaron Jefferson, vice president of ADAS product planning at ZF. “The CVflow SoCs’ combination of high quality imaging and advanced AI processing enables ZF to offer a wide range of viewing and interior sensing applications.” visual perception software HELLA Aglaia, a global developer of intelligent visual perception software, has worked with Ambarella’s CVflow processors over the past year: “We chose Ambarella’s CVflow SoCs due to their ability to deliver extremely high computer vision processing performance with very low power consumption,” said Kay Talmi, managing director at HELLA Aglaia. “With the introduction of the CV22FS and CV2FS ASIL SoCs, Ambarella now delivers the functional safety features required by automotive OEMs for the mass production of safety-critical systems.” “Ambarella’s CVFlow architecture delivers an unparalleled combination of AI performance and power efficiency,” said Fermi Wang, president and CEO of Ambarella. “We are pleased to introduce these ASIL compliant CVflow SoCs, delivering on our promises to our partners and customers and further demonstrating our commitment to the automotive market.” Advanced stereovision applications Ambarella will also demonstrate a range of applications from other key partners running on the CVflow engine The CV22FS and CV2FS’s CVflow architecture provides computer vision processing in 8-megapixel or higher resolution at 30 frames per second for object recognition over long distances and with high accuracy. The SoCs each include a dense optical flow accelerator for simultaneous localisation and mapping (SLAM), as well as distance and depth estimation. Multi-channel high-speed sensor input and Ambarella’s image signal processing (ISP) pipeline provide the necessary camera input support, even in challenging lighting conditions. CV2FS also enables advanced stereovision applications by adding a dense disparity engine. Ambarella will demonstrate its CVflow SoC family during CES 2020 to select customers and partners. Demonstrations will include HELLA Aglaia’s deep learning ADAS algorithms and Ambarella’s EVA (Embedded Vehicle Autonomy) self-driving prototype vehicle. Ambarella will also demonstrate a range of applications from other key partners running on the CVflow engine. CV22FS and CV2FS are scheduled to sample to Ambarella customers in the first half of 2020. Wireless video streaming CV22FS and CV2FS SoC key features: CVflow architecture with DNN support Quad-core 1-GHz Arm Cortex-A53 with NEON DSP extensions and FPU Safety island with dual-core lock step (DCLS) Arm R52 targeting ASIL-C Dense optical flow engine Dense stereo disparity engine (CV2FS only) ASIL B functional safety level - High speed SLVS/MIPI CSI-2/LVCMOS interfaces Multi-channel ISP with up to 480-Megapixel/s input pixel rate Native support for RGGB, RCCB, RCCC, RGB-IR, and monochrome sensor formats Multi-exposure high dynamic range (HDR) processing and LED flicker mitigation Real-time hardware-accelerated fish-eye dewarping and lens distortion correction (LDC) 4-megapixel AVC encoding for video logging and wireless video streaming Rich set of interfaces includes CAN FD, Gigabit Ethernet, USB 2.0 host and device, dual SD card controllers with SDXC support, MIPI DSI/CSI-2 4-lane output Advanced security features, including OTP for secure boot, TrustZone, and IO virtualization AEC-Q100 grade 2 (-40C to +125C (TJ) operating temperature) 10 nm process technology
Ambarella, Inc., an AI vision silicon company, will demonstrate advanced ADAS and AD applications based on Ambarella’s CVflow® SoC family at a private event during CES 2020 in Las Vegas. Ambarella will perform autonomous driving and parking demonstrations using its Embedded Vehicle Autonomy (EVA), a self-driving vehicle, on Las Vegas roads. EVA builds upon 20 years of autonomous vehicle research and utilizes CVflow embedded processors to run AI-based computer vision algorithms. Its camera perception and 8-megapixel stereovision are implemented using Ambarella CV2 processors. Vision-Powered self-Driving vehicles “With EVA our goal is to continue to push the limits of what’s considered achievable with computer vision-powered self-driving vehicles,” said Dr. Alberto Broggi, general manager of Ambarella, Italy. “CV2 provides the needed computational power with up to 20 times more AI performance compared to our previous generation CV1 chip.” Key third-party demonstrations are as follows: Mercedes-Benz will demonstrate its CV2-based Cargo Recognition and Organization System (CoROS): A camera assistant in the cargo space automatically recognizes registered parcels using barcodes and the symbols on the outside of the parcels. This process is done in fractions of a second, replacing manual, time-consuming scanning and sorting of each shipment. Germany-based ADAS software supplier HELLA Aglaia will feature its latest suite of deep learning ADAS algorithms including multi-class object detection, detection of driving area limitations, depth estimation, and classification of traffic lights and traffic signs. Running on a single Ambarella CV22 CVflow SoC, this ADAS platform supports the development of single-box, forward-facing ADAS cameras. Korea-based StradVision will demonstrate its suite of front ADAS and driver monitoring system (DMS) algorithms running on a single CV22. Connected to an 8-megapixel front-facing camera and an additional interior facing camera, this system will be installed and running in a vehicle. Israel-based EyeSight’s driver monitoring solution (DMS) will be shown on a system with three cameras. In this demonstration, Ambarella’s CV25 simultaneously processes a monochrome driver-facing camera, and two RGB-IR in-cabin cameras (each with a different field of view). Israel-based Brodmann 17’s ADAS solutions suite will showcase the company’s deep learning algorithms which include vehicle detection, distance estimation, and real-time forward collision warning running on a CV22 SoC. Other live demonstrations will include camera-based electronic mirrors with blind spot detection (BSD) and intelligent around view monitoring (AVM).
So many business processes are controlled, tracked, measured or monitored by software. So, it’s frustrating when multiple systems create double or triple the work. Unfortunately, not all of a user's software plays nice together. Web-enabled software for a CLIQ key-based access control system is an exception. No matter what the user’s business, the CLIQ Web Manager helps the user manage their access control quickly and efficiently. Now the user can also integrate their powerful access management features with their existing business process software. Thanks to the CLIQ Web Manager’s open architecture, the user can build a single interface to control everything. Key access control system CLIQ Web Manager will help the user streamline everyday operations, while also managing a CLIQ key access control system to its full potential. Integration works in two distinct ways. The user can plug the CLIQ Web Manager directly into an existing platform, making access control one node in their current control panel. There is an SDK, if they wish to add CLIQ Connect remote access control management to a company app. Time- and cost-saving measures are baked into every CLIQ Web Manager integration Alternatively, CLIQ Web Manager can be the hub for multiple business processes. The user manages HR, support ticketing, financial reporting and more alongside daily access control tasks like validating and revalidating credentials, cancelling lost keys and ordering automated audit trails for locks or users. With CLIQ Web Manager web services, the user can build a comprehensive, customized integration with their existing software to help the business operate more efficiently. Access control software Time- and cost-saving measures are baked into every CLIQ Web Manager integration. Cutting back data double-entry reduces database errors and minimizes tedious data entry. The user's internal workflows in security and beyond are streamlined when one interface enables them to answer multiple questions. Plus, they can customize integration functionality to suit their business. How best should the CLIQ Web Manager integrate with the user's existing software? CLIQ lets them choose. The user can save IT costs if they also select a CLIQ Web Manager Software as a Service (SaaS) package. Security infrastructure budgeting becomes more predictable. The user's data enjoys complete redundancy. And their company’s CLIQ software is always, automatically up to date — a bonus for cyber-security resilience. CLIQ Web Manager enables a wide range of controlled security workflows, including real-time access control management. Now it integrates easily with all kinds of business software, helping the user work smarter, too.
AES Corporation, the manufacturer of wireless mesh communication products and services designed for your monitoring needs, announces the appointment of Laura Wall to the position of Director of Product Management. Laura is the newest member of AES Corporations Leadership Team. She is an experienced and highly collaborative product management leader who specializes in conducting extensive market research. Her expertise in Voice of the Customer (VOC) data collection and strong analytical skill set will be vital in helping the organization to prioritize customer focus and define product requirements. Managing the complete product lifecycle In her new role at AES, Laura will work cross-functionally with all departments to align sales objectives, marketing strategy, and customer support with the engineering product roadmap. This involves managing the complete product lifecycle from concept, to design and development, product launch, and end of life products/components. Prior to joining AES, Laura worked in chain retail, global manufacturing, distribution, and start-up environments. I am excited to work on projects that will deliver high quality products and meet the needs of our customers" Her appointment supports the Company’s plan for growing revenue and market share by strengthening its product line. “This is an exciting time to join AES with many strategic plans and initiatives in place to grow the business not only in the alarm industry, but also into other new markets,” said Laura. “Having spent the past several years working in product management roles, I am excited to work on projects that will deliver high quality products and meet the needs of our customers." Successfully developing and delivering new products Jim Burditt, Vice President of Sales, commented, “Laura is a perfect fit for this new position. I am confident that her experience, knowledge, and leadership skills will help us to successfully develop and deliver new products with ongoing customer feedback.” Laura graduated with a Master of Business Administration from Simmons School of Management, a Bachelor of Science degree in Marketing from Bentley University, and holds an Insight for Innovation certification credential from IDEO U. She is an active member of several industry groups including Product Development and Management Association (PDMA), New Product Development and Agile Innovation (NPD), Product Management Professionals, and Boston Product Management Association.
Developed and launched in 2014, FERMAX FOR REAL, the Augmented Reality application for mobiles and tablets has now been released in a new improved version. It includes new products, a more modern design and a new marker to activate the augmented reality. End users can interact with the product as if it was real and see how Fermax video door entry systems would look like on the exterior and interior of their home. That is the great advantage of Augmented Reality: the possibility of combining the virtual world with the real world. End users can interact with the product as if it was real and see how Fermax video door entry systems would look like on the exterior and interior of their home DUOX 2-wire video entry system The renowned Spanish brand of video door entry systems has redesigned its application FERMAX FOR REAL with the aim of offering a more agile, interactive and functional user experience. In this version, the application includes a complete selection of DUOX (2-wire system) and MEET (IP system) outdoor panels and indoor terminals, Fermax's main video door entry technologies. It is no longer necessary for the installation’s company to visit properties with a suitcase full of samples. With a tablet or mobile phone in their pocket, the installers will be able to show their customers both the outdoor panels and the terminals (monitors and telephones) from the Fermax catalog. Users can see them on the wall as if they were already installed at the entrance or inside the house and interact with the products. MEET IP outdoor panels In order to access the Augmented Reality feature, the user needs to place the new marker on the wall When using the application, the users can see a menu in which the main elements of an installation are presented: the outdoor panel and the interior terminals. The users can select the product they wish to see so that the system shows an image of the product and they can read about its features or see the options and models available. They can even visualize the equipment in 3D and rotate it up to 360 degrees. In order to access the Augmented Reality feature, the user needs to place the new marker on the wall where the outdoor panel or indoor terminal will be located and activate the AR button. Users who have the old marker will have to download this new marker from the application itself, or from the Fermax website. The users can select the product they wish to see so that the system shows an image of the product and they can read about its features or see the options and models available Residential intercom and communication systems From that moment on, the tablet or mobile screen will generate the image of the virtual product over the real surface and the user will be able to interact with the product through the screen making a call from the outdoor panel, answering a call from the monitor, activating or deactivating the "Do Not Disturb" function, seeing the OSD menu of the monitors, incorporating installation accessories in the case of the Skyline and Cityline panels, there are multiple options so that the end user can see the product as if it was already installed. With this innovative commercial tool, Fermax once again shows its ability to position at the forefront of residential communication technology. You can download FERMAX FOR REAL for free from Google Play or the App Store.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From Kindergartens to Colleges Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognizes outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education. Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customized solution Chubb Sicli’s quality, capability, and security expertise provided a customized solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
ISC East continues to flourish as the Northeast’s largest security trade show. Focused on the big Tri-State market and overall Northeast sector vs. the flagship ISC West event in Las Vegas in the spring, the International Security Conference & Exposition at New York’s Javits Center will be held Nov. 20 and 21. “Anybody who has been to the show has commented and seen the growth,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. Ninety new exhibitors When the show opens, there will be around 90 new exhibitors, including Gunnebo, Mobotix, Liftmaster, Cypress Integration Solutions, SAFR from Real Networks and Security Brands. Because it is a regional show, some large companies have smaller exhibits that feature their local and regional personnelLarger exhibitors at the show include Brooklyn Low Voltage Supply (distributor), Axis Communications, DoorKing Inc., NAPCO Security Technologies, and All American Monitoring. Because it is a regional show, some large companies have smaller exhibits that feature their local and regional personnel eager to meet with security professionals from the Northeast corridor. ISC East will be co-located with the Infosecurity ISACA North America Expo and Conference. The combination provides a comprehensive approach to physical and cyber security products and services. Rapid growth in past three years The audience at ISC East is unique – about 90% of attendees do not attend ISC West. The show has seen rapid growth in the past three years, and attendees report a new energy and passion among exhibitors and attendees. By every measure, the show will be bigger than last year, while maintaining the intimate, smaller vibe of a regional show. A “Crack the Tap” cocktail reception will be held at the end of the first day on the show floor. A charity activity on the ISC East show floor will be presented in partnership with Mission 500, an organization that works to serve the needs of children and communities in crisis. At the Mission 500 booth which will be adjacent to the Main Stage, each exhibition attendee will be invited to create a “care package” of essential hygiene items that will be delivered to children and families in need, in partnership with Volunteers of America - Greater New York. Attendees may write a note of encouragement to be included in the package they assemble. Event will highlight security startups A Nov. 20 (Wednesday) session at ISC East will highlight startup companies in a format reminiscent of television’s “Shark Tank.” Four finalists will take to the main stage and provide a seven-minute pitch about their new product or service. After the “Tech Tank” presentations, audience members vote live on their mobile app for their top choice, and the winner will be announced during the “Crack the Tap” cocktail reception.Four finalists will take to the main stage and provide a seven-minute pitch about their new product or service “It’s a program that allows attendees to see and hear about cutting edge technologies,” says Nicole Miller, Senior Conference Manager, ISC Security Events. The four finalists, chosen from more than 40 exhibitor submissions, are Arrow Labs’ MIMS Smart Watch for mobile incident management; Cepton Technologies’ Helius Smart LiDAR System; SAFR from RealNetworks’ Facial Recognition system, and ZeroEyes’ Weapons Detection and Active Shooter Mitigation Platform. New partnership with ASIS New York Beginning in 2020, ISC East will be combined with the ASIS New York chapter’s annual conference and expo, which was held in May this year. Starting next year, the events will be rolled into one industry-wide expo and education event geared to serving the total security industry in the tri-state area (New York, New Jersey and Connecticut). In 2020 there will be an enhanced education program along with the combined event next fall. In recognition of the new partnership, ISC East is involving the ASIS NYC chapter in this year’s show, too, with a booth on the show floor, and promotional logos and signage. The ASIS chapter will have a table at the SIA Honors Night event on Nov. 20. “We are really involving them this year to show we are working together and partnering going forward,” says Shaughnessy.
PACOM Systems, which designs, develops, and manufactures security platforms for enterprise multi-site and campus environments, announces that Hancock Whitney Corporation continues to roll out the PACOM GMS security management platform to their growing number of bank financial centers and ATMs. Hancock Whitney Corporation operates bank offices and financial centers in Mississippi, Alabama, Florida, Louisiana, and Texas, offering comprehensive financial products and services, including traditional and online banking; commercial and small business banking; private banking; trust and investment services; healthcare banking; certain insurance services; and mortgage services. Multi-Site security management platform GMS meets end-user demands for a multi-site security system with multiple integrations PACOM’s relationship began with Hancock Bank in Mississippi and, after Hancock’s acquisition of Louisiana-based Whitney Bank in 2011, blossomed further still. Currently, the PACOM GMS software platform manages card access and intrusion monitoring at 258 locations and growing. Hancock Whitney does all its own 24/7/365 alarm monitoring from a central location in Gulfport, Mississippi. There are also two company data centers monitored and protected by PACOM GMS. GMS is a robust multi-site security management platform, providing integration between access control, intrusion, video, intercom and virtually any building management or security solution. Designed to manage thousands of locations simultaneously through a single interface, while providing industry-leading availability and redundancy. GMS meets end-user demands for a multi-site security system with multiple integrations. Third-Party monitoring companies “One of the biggest advantages of the PACOM system,” commented Al Tapper, CPP, Manager, Bank Protective Services for Hancock Whitney Corporation, “is it’s all-inclusive with integrated card access and alarms. We have our entire company on a single, integrated platform. We do our own alarm monitoring, which is a big plus because we can immediately verify what is going on in any of our financial centers.” One of our banking acquisitions had two third-party monitoring companies" Tapper continued, “One of our banking acquisitions had two third-party monitoring companies. It was one false alarm after another. That’s dangerous, and it can be quite expensive. With PACOM and self-monitoring, we avoid that. The PACOM system also helps with disaster recovery. We can see what’s going on in our financial centers and know if our alarms are working.” Central monitoring station Hancock Whitney has launched another phase to their company-wide security platform: video integration. When an alarm goes off in any branch, the central monitoring station will automatically be able to see events associated with that alarm. Eventually, all branches and ATMs will have video monitoring with a number of integrated cameras at each location. The system currently provides access to more than 5,000 card holders with varying levels of access privileges. Alarm protocols are in place for each location, with Tapper and his team managing and monitoring the system. “PACOM helps us adapt the system to our changing needs; and when we provide feedback, PACOM listens and will consistently respond directly to that feedback, said Tapper.”
As one of the most important provinces of Argentina, Buenos Aires Province has been seeking to improve work efficiency and emergency response speed of its police force. However, the local police was always lacking of evidence when performing legal actions towards violence, traffic accidents, and other social incidents. This created temporary loopholes in law enforcement that criminals and erring people took advantage of in order to escape legal sanctions. For this reason, the Ministry of Security of Buenos Aires Province required powerful security tools to assist the local police in patrolling and enhancing the overall level of safety throughout the province. Strong and modern security equipment The Ministry of Security of Buenos Aires authorized the Dahua team to conduct research The Buenos Aires police sought strong and modern security equipment that could monitor the roads during police patrol, while keeping records as evidence. Additionally, they required a management terminal on the dashboard of each patrol car to allow the user to view videos in real time and manage all the surveillance equipment via the system. The technical equipment must be installed in a suitable position to avoid damage in case of car accident or airbag activation, and to ensure passenger safety under adverse conditions, such as weather changes, vehicle temperature shift, etc. After presenting Dahua Mobile Solution that could fulfill the aforementioned requirements, the Ministry of Security of Buenos Aires authorized the Dahua team to conduct research and implementation of this project. Monitoring road conditions The Dahua Mobile Solution covered 400 patrol cars of the Buenos Aires police, each of which was equipped with six HD cameras, including two different models of 2MP Mobile HDCVI IR Dome Camera – HDBW1200F-M and HDBW2241F-M-A, 3MP Network IR Mini-Bullet Camera IPC-HFW1320SP, and 2MP Mobile HDCVI IR Cube Camera HAC-HMW3200. Five cameras were also installed outside each patrol car to monitor road conditions from every angle In addition, five cameras were also installed outside each patrol car to monitor road conditions from every angle: HDBW2241F-M-A on both sides; HDBW2241F-M-A and IPC-HFW1320SP on the front top; and HAC-HMW3200 at the back. All of the products support IP67& IP6K9K, shock-proof, and resistant to vibration and severe weather conditions. HDBW1200F-M was installed inside each car to monitor its situation and regulate police behavior. As part of the requirement, the management terminal was installed at the center of the dashboard and linked to the central server through a 10/100 wired Ethernet connection via an RJ45 connector. Automatic recognition technology In addition to the cameras, Dahua Mobile Video Recorder MXVR4104-GFW was also deployed for efficient video storage. Its embedded GPS positioning allows the user to track the vehicle in real time. In case of emergency, it will trigger the alarm and automatically upload the data on time. It also supports image capturing of suspected vehicles and uploads them to the management platform It also supports image capturing of suspected vehicles and uploads them to the management platform. Indeed, Dahua Technology has launched a smart police car solution to aid the police in identifying suspected vehicles and people. Featuring automatic recognition technology, the new device can compare suspected vehicles and people with the information in its database, achieving efficient mobile control and identification. Mobile video surveillance solution With the implementation of Dahua Mobile Solution, the Buenos Aires police can now manage social security better through a comprehensive monitoring system. The mobile surveillance system with high-definition image quality and other advanced functions enabled the police to obtain first-hand evidence, achieve timely intervention and control dangerous and detrimental activities during their patrolling. This significantly improved their work efficiency, stabilized social order, and helped build a safe and harmonious community. “We are very satisfied with Dahua products. The mobile video surveillance solution used in police cars enables our police to work more efficiently and safely because the surveillance center is available 24 hours a day, providing appropriate assistance in solving various issues or incidents that the police may encounter. ” Said Dr. Ignacio Greco, Deputy Secretary of the Provincial Ministry of Security, Buenos Aires.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Cold winter temperature requires high-performance equipment capable of operating in extreme environments Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Access ANPR Camera The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. Built-in intelligent video analytics When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. IR Mini-Bullet Network Camera The camera uses a set of optical features to balance light throughout the sceneFor both approaching and departing vehicles, the access ANPR camera takes a snapshot of the license plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Smart residential solution Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. "We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases”, said Arman, General Manager of BI Group.
Brienon-sur-Armançon is a city in the Burgundy-Franche-Comté region of north-central France, with a population of about 3,300. Located at the intersection of two rivers – Créanton and 'Armançon, Brienon-sur-Armançon enjoys an advanced road network which is vulnerable to illegal activities. To make the city safer, the local government, with far less than sufficient police force at hand, chose to secure its city and residents with Dahua Safe City Solution. There were two main pressing issues that needed to be addressed. Firstly, the city had far less than insufficient police force, only one policeman was supposed to look after the whole 3,300 dwellers. Secondly, Brienon-sur-Armançon had not prepared itself with necessary cables needed for modern surveillance systems, requiring the Dahua Team to design a tailored solution according to the unique local environment and limited human resources of this city. Wireless transmission device This solution aids them in obtaining video recordings that can be used as evidence in case of an incident To make up for the shortage of police force and network cables, Dahua Technology delivered a customized solution covering the whole city with various kinds of video surveillance devices. These equipment are linked by a wireless device combining PTZ camera and antenna that transmits all the collected information to the highest point in the city center. These data are then transmitted to the control center, making it easy for the police to achieve round-the-clock monitoring. To monitor major sections of the city, an array of modern devices were utilised including Starlight IR PTZ AI Network Camera, Multi-Sensor Panoramic Camera, Eyeball Camera, Thermal Camera, ANPR Camera, Wireless transmission device, keyboard, etc. From the control center in the police station, the police can check real-time situation and decide whether to take action. This solution also aids them in obtaining video recordings that can be used as evidence in case of an incident. Vehicles trigger detection In addition, the combined strength of the Dahua general camera and PTZ camera created a smart capture mechanism for the police. General cameras were installed to monitor fixed scenes, once human or vehicles trigger detection rules set by the operator (like tripwire and intrusion), the PTZ camera will automatically zoom-in and start tracking. For low-light applications, the Dahua Starlight Technology of the PTZ camera also offers outstanding light sensitivity, capturing color details even under ultra-low light condition. Moreover, ANPR Cameras were deployed for road safety enforcement on main roads. Embedded with License Plate Recognition (LPR) algorithm, the cameras have the ability to detect and recognize moving vehicle's plate number within low speed. Furthermore, installing Thermal Cameras took care of the job of monitoring the BBQ sites in the park with their built-in fire detection functionality that can detect fires even at long range distance. Effectively monitor major areas The police has solved a cemetery theft case with evidence recorded by the Dahua PTZ cameraWireless transmission device made it possible for all cameras in all locations to connect to the control center without the cost and trouble of wiring. NKB 5000 HD Network Control Keyboard was installed in the control center to help the police achieve split screen operation of both general and PTZ cameras. Some Seagate hard disks were also used to store recorded videos for future use. The Brienon-sur-Armançon police can now sit remotely in the control room and operate in an efficient way with the help of Dahua Safe City Solution, which allows them to effectively monitor major areas in the city and respond in time when an incident takes place. Dahua PTZ camera The recorded videos also serve as crucial evidence and help the police to crack a case with much less effort. In the first week of the test run of this smart system, the police has already solved a cemetery theft case with evidence recorded by the Dahua PTZ camera. “The origin of our cooperation with Dahua dates back to the visit to China a year ago. This visit to the Dahua headquarters in Hangzhou concluded with a reciprocal commitment – to equip the city of Brienon with video surveillance. We welcomed this agreement, which allowed the installation of the system and improved the daily life of our residents.” said Mr. Jean-Claude M.CARRA, Mayor of Brienon-sur-Armançon.
Established in 1976, Meghna Group of Industries (MGI) is a conglomerate in Bangladesh. MGI operates out of a large campus in Dhaka that houses its head office, 45 different manufacturing plants, and maintenance workshops, all under one roof. MGI has a turnover of over USD 3 billion, and an employee strength of over 30,000. Being an established and trusted group, it required operations to be suitably monitored, in order to ensure uninterrupted production, adherence to quality standards, and timely delivery of supplies to customers. So far, it had been monitored by manned security, with accompanying risks ranging from damage to assets, misuse of equipment, thefts, leakage of confidential information, employees’ safety, poor record keeping for vehicles entering or exiting the premises, and more. Providing investigation-Friendly monitoring software Enabling IVA at various locations has helped in the monitoring of infrastructure Designing of the solution started with a joint site survey by Videonetics, MGI IT heads, and the system integrator. After extensive research, Videonetics developed a unified solution encompassing Intelligent Video Management Software (IVMS), Intelligent Video Analytics (IVA), and a customized ANPR system to read and capture license plates in Bengali language. Key aspects of the solution included the following: Videonetics’s IVMS has been deployed to help in viewing and recording feeds from over 500 cameras installed in multiple factory locations. This is enabled over IP network in an efficient and elegant way. In addition, the solution provides investigation-friendly monitoring software at the front-end, while relegating all the complexity of the server software to the back-end. Enabling IVA at various locations has helped in the monitoring of infrastructure, vehicles, people, crowds and objects, for automatic detection and analysis of events of interest. Manned security to address safety The operators get a bird’s eye view of various sites from their centralized location, enabling them to respond quickly and effectively when an incident occurs. The solution has been installed on Red Hat® Enterprise Linux® which makes the overall system more secure and maintainable. Videonetics’s Automatic Number Plate Recognition (ANPR) system has been customized to read license plates in Bengali. Regardless of the lighting conditions, the Bengali ANPR accurately captures with timestamp the license plate of any vehicle as it appears in the camera’s field of view (FoV). The new implementation enables security operators to be deployed at the unified interface In addition, the system is integrated with the IVMS at the command and control center, for viewing and analyzing vehicular movements, and taking action, if required. THE IMPACT Prior to the installation of Videonetics’s solution, MGI used to rely on manned security to address safety, security and operational risks. However, the new implementation enables security operators to be deployed at the unified interface, for monitoring multiple sites such as assembly plant, warehouse, process, dispatch area, vehicle movement, and so on. Personal protection equipment detection So now, MGI operators can handle incidents of thefts, potential break-ins, unauthorized intrusions, and conduct investigations, without having to leave their desks. This has helped MGI in maximizing resources and significantly reducing costs. But the biggest benefit has been to be able to provide a safer environment to its employees, and to secure its workplaces with optimization in day-to-day operations. The open architecture of the solution allows MGI to continue adding, in a single interface, more AI & DL powered applications such as personal protection equipment detection, facial recognition, fire & smoke detection, workers slip/ fall detection, workers head count, vehicle movement management, to name a few. This makes it possible for the company to address all its security concerns with a holistic approach.
hagebau is an association of some 360 trading companies offering building products at more than 1700 locations across Europe. Employing around 500 staff, the Schneider group of companies has its headquarters in Erlstätt and runs 13 hagebaumarkt stores around Traunstein, most of them in the Upper Bavaria region. Thousands of customers visit these stores every day to browse the wide range of products on offer. Busy day-to-day operations and a high turnover of goods pose significant challenges in terms of the safety of customers and employees, as well as on-site inventory protection. Cybersafe and 100% GPDR-compliant “Introducing digital solutions into our locations is one of our biggest challenges,” explains Martin Wohlmayer, Head of IT and Organization at Jos. Schneider GmbH. “To do this, we need highly reliable solutions that are cybersafe and 100% GPDR-compliant.” User rights can be assigned, meaning that access to the video material is 100% GDPR-compliant"The in-store video surveillance system has an enormous amount to monitor on a daily basis. Theft, burglary and incidents in parking lots are just a few of the key sensitive issues. The company’s forward-looking strategy also means that any current investments need to be flexible, straightforward and expandable to tackle future challenges. Managed via MxManagementCenter The Traunstein store is the ninth hagebaumarkt in the Schneider Group to be fitted with MOBOTIX technology. 134 MOBOTIX cameras have been installed in total, 19 of them in Traunstein. Special MOBOTIX outdoor cameras monitor the outdoor area, delivering crystal-clear images at any time of year, day or night. This means that all incidents that occur in parking lots or in outside areas are captured. The cameras are managed via MxManagementCenter (MxMC.) Various levels of user rights can be assigned, meaning that access to the video material is 100% GDPR-compliant. MxMC also features an interface to the POS system so that any POS discrepancies can be immediately resolved. Customer counts and footfall analysis are also integrated to further optimize customer service and customer satisfaction. Monitoring the retail space Using just the MOBOTIX cameras that were monitoring the retail space in Traunstein hagebaumarkt, inventory discrepancies resulting from theft were able to be resolved. But MOBOTIX camera surveillance offers much more than anti-theft protection: The user can analyze the footage, allowing them to adjust the range of products as required and improve product positioning — an optimal approach for increasing sales potential.
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Security monitoring system: Manufacturers & Suppliers
- Dahua Technology Security monitoring system
- Vicon Security monitoring system
- Bolide Security monitoring system
- Hikvision Security monitoring system
- Seagate Security monitoring system
- BCDVideo Security monitoring system
- MobileView Security monitoring system
- LILIN Security monitoring system
- Pelco Security monitoring system
- Arecont Vision Security monitoring system
- Hanwha Techwin Security monitoring system
- Vanderbilt Security monitoring system
- TESA Security monitoring system
- CEM Security monitoring system
- VIVOTEK Security monitoring system
- Sony Security monitoring system
- DSC Security monitoring system
- Optex Security monitoring system
- FLIR Systems Security monitoring system
- Parabit Security monitoring system