Connected Technologies LLC, based out of Monument, Colorado, USA wants dealers to have it their way—so it’s changing the landscape of manufacturer support by providing additional customization services tailored to the security dealer. Knowing that one size does not fit all when it comes to project demands, the Connect ONE management interface in its original state is already highly customizable. Now, and because of popular demand, dealers can request additional integrations or capab...
Door and Hardware Federation (DHF) has announced that it will be launching a new safety seminar this year at the 2020 FIT Show at the NEC in May. The free seminar is specifically aimed at those with responsibility for automated gates and industrial doors and will take the form of a two-hour session. In addition, the pro-active federation has produced a free ‘owners guide’ entitled: Guidance for owners and managers of Industrial Doors, Garage Doors, Powered Gates and Traffic Ba...
Member companies and representatives of the Open Security & Safety Alliance (OSSA) will be present at the INTERSEC 2020 show in Dubai next month. OSSA – an industry body comprised of leaders, influencers and innovative organizations from all facets within the security, safety and surveillance space – formed to help the industry focus on creating new value by reducing market fragmentation and addressing common challenges. The aim is to bring together the industry to move forward...
Genea has announced that it has acquired cloud-based physical access control company, Sequr, Inc., thereby further expanding its portfolio of commercial real estate technology solutions. Submeter billing software solutions “Sequr is an ideal fit for us,” said Michael Wong, CEO of Genea. He stated, “Almost all of our customers who use our OTHVAC and/or submeter billing software solutions have been searching for help with access control. Similar to our other offerings, Sequr&rs...
Johnson Controls has announced the release of its new product offering, EntraPass v8.20 which will further simplifies how users remotely access the EntraPass go Mobile App. EntraPass v8.20 With EntraPass v8.20, EntraPass go Pass Mobile App users gain improved search capabilities and other efficient upgrades to deliver a remote and real-time access control solution. EntraPass go Pass requests will no longer be attached to a selected SmartLink, eliminating the need to configure every conne...
CNL Software, globally renowned developer of Physical Security Information Management (PSIM) software solution, is pleased to announce that it will be exhibiting at Intersec 2020. CNL will focus on the technology that is driving the digital transformation of control rooms across the Middle East region. CNL will be joined by Cepton Technologies, Inc. a developer of industry-leading 3D sensing solutions, who will be showcasing their latest correlation of LiDAR data with real time video visualizati...
March Networks, a global renowned video security and video-based business intelligence solutions company, is pleased to announce the expansion of its Retail Solution to include fraudulent return investigations through the Zebra Savanna data intelligence platform. March Networks’ new integration – between its Searchlight for Retail software and Doddle, which designs, develops and integrates consumer fulfilment technology – is powered by Zebra Savanna, a cloud-based platform that enables the real-time collection of data from Zebra Technologies’ sensors and devices. March Networks Searchlight March Networks Searchlight logs events from Zebra Savanna and other systems within the retail environment Through this unique collaboration, March Networks Searchlight logs events from Zebra Savanna and other systems within the retail environment, like Doddle, that are powered by the Zebra platform. Searchlight can then match those events with corresponding video clips for greater enterprise-wide visibility. For example, with the Searchlight-Doddle integration, retailers using Doddle can keep a record of all of their product returns in Searchlight. When a customer arrives in-store to return a product facilitated by Doddle’s returns technology, Searchlight records that event, allowing retailers to quickly and easily pull up the surveillance video associated with the return. This allows retailers to visually verify the details of all product returns, including the individuals involved and the condition of the product at the time of the return. Zebra Savanna cloud-based platform In addition, the integration also tracks other retail events such as coupon use at the point-of-sale (POS). Retailers offering coupons through fulfillment partners like Doddle that are powered by Zebra Savanna can track the full buying cycle in Searchlight. When a customer uses a coupon, it’s recorded in Zebra Savanna and visible in Searchlight, allowing retailers to track the success of promotions offered through third-party vendors. “As more consumers turn to online channels for their retail purchases and returns, these latest Searchlight capabilities bridge the gap between digital and in-store transactions, providing retailers with complete visibility into the buying cycle,” said Jeff Corrall, Director of Strategic Partnerships and Integrations for March Networks. “According to the National Retail Federation (NRF), 11% of retail purchases are returned and an average 8% of returns are fraudulent. With Searchlight, retailers can proactively detect and target this fraud, and recoup associated losses.” Power of integrated data and video “By working with leading retail manufacturers like Zebra Technologies and fulfillment technology companies like Doddle, March Networks is proving the true power of integrated data and video, and its ability to positively impact the retail bottom line.” Returns can have an impact on retailers’ margins, especially over peak periods" “Returns can have an impact on retailers’ margins, especially over peak periods,” said Gary O’Connor, Chief Technology Officer (CTO) at Doddle. “Working with partners like March Networks means the Doddle platform can provide deeper insight. Retailers have the ability to re-convert customers through personalized digital journeys, while also having access to more capability to prevent fraud.” Integration with RFID data from Zebra sensors March Networks’ Retail Solution is used by more than 300 retailers worldwide to facilitate improved efficiency and compliance, reduction in losses and risk management, thereby enhancing customer service and compete more successfully in the market. Searchlight is the centerpiece of the solution that helps retailers to improve performance and profitability through the integration of clear surveillance video, relevant business data, including POS transactions, and highly accurate analytics. March Networks’ Searchlight also integrates with radio frequency identification (RFID) data from Zebra sensors and devices for enhanced product tracking, loss prevention and inventory management. March Networks will showcase the Searchlight for Retail-Doddle integration powered by Zebra Savanna in Zebra Technologies’ booth #3301 at NRF 2020: Retail’s Big Show Expo, January 12-14 in New York, NY.
Trackforce Valiant announced its acquisition of Silvertrac Software. Silvertrac - Capterra’s highest-rated security guard management software - joins forces with the recent acquisition of Valiant Solutions by Trackforce to expand its portfolio in the security guard market. With over 2,500 customers, 300,000 users and 30,000 customer sites in 45 countries, Trackforce Valiant is recognized as a workforce management solution in the physical security industry. Trackforce Valiant is an all-in-one solution to automate security workforce management. It has a wide range of tools, including visitor management and command center (GSOC) as well as scheduling, payroll and billing management. Trackforce Valiant’s product offerings set it apart as the most comprehensive operations management solution available to the industry, helping enterprise security operations run more efficiently. Physical security industry Some of Trackforce Valiant’s most notable clients are Allied Universal, G4S, SecurAmerica, and Inter-Con Security Systems. With over 600 customers in North America, Silvertrac Software will continue to focus on servicing small to medium-sized businesses in the physical security industry. SMB manned guarding operations are looking for a technology solution that will increase guard accountability and improve reporting procedures but usually cannot utilize the full range of an enterprise-level solution like Trackforce Valiant. For over 12 years, we have worked very hard to provide a solution to small to medium guard firms looking for a robust solution" Silvertrac offers a streamlined, simple guard management software that focuses on top-notch customer service and support that is vital to the growth of these operations. “Our acquisition of Silvertrac follows Trackforce Valiant’s strategy of providing guard firms of all sizes with a purpose-built solution to run their business,” states George Wright, Trackforce Valiant CEO. Security workforce management “We are very excited about the security guard industry and the opportunity to offer visibility and control to companies of all sizes. The two companies share a solid objective of combining people, process, and technology to help our customers address the complexities of the market.” Chris Anderson, founder of Silvertrac Software, adds, “We see great synergies between Silvertrac and Trackforce Valiant and are looking forward to joining the global provider in security workforce management. For over 12 years, we have worked very hard to provide a solution to small to medium guard firms looking for a robust solution. The new relationship with Trackforce Valiant offers us the opportunity to continue this mission.”
Pulse Secure, the provider of software-defined Secure Access solutions, announces a new distribution partnership with SecureWave, a data security and IT infrastructure value added distributor, to grow its sales channel across the Israel to meet accelerating demand for Zero Trust access security. SecureWave, part of the Exclusive Networks Group is present in more than 30 countries around the world, and maintains an active community of more than 350 partners. The company will offer the integrated portfolio of Pulse Secure solutions, including virtual private network (VPN), software defined perimeter (SDP), network access control (NAC), and virtual application delivery controllers (ADC). Sales and technical enablement SecureWave will support Pulse Secure partners with sales and technical enablement The agreement will include Pulse Secure’s Zero Trust-based Access Suite which delivers protected connectivity, operational intelligence and threat response across mobile, network and cloud environments. “Pulse Secure has been a driving force behind the adoption of Zero Trust Secure Access and we look forward to helping our channel partners to benefit from its visionary position through our expertise, knowledge and experience within this market,” says Moran Gerassi, CEO for SecureWave. As part of the new distribution agreement, SecureWave will support Pulse Secure partners with sales and technical enablement, lead generation and a full educational program. Global distributor network “SecureWave is a highly respected distributor that is well suited to help us expand and support our partner community to match our growing solution portfolio,” said Laurent Delattre, Sales South EMEA for Pulse Secure, “The addition of SecureWave to our global distributor network is a recognition that the move to Zero Trust is prompting significant change in the security landscape and provides a major and untapped opportunity for the channel to capitalize upon.” The Zero Trust security market size is projected to grow from USD 15.6 billion in 2019 to USD 38.6 billion by 2024, at a CAGR of 19.9% from 2019 to 2024 according to MarketsandMarkets Research. Pulse Secure’s Zero Trust focus is delivered with the Pulse Access Suites. Virtual application delivery controller This approach extends the company’s foundation of Zero Trust access for hybrid IT with enhanced usability The Suites provide remote, mobile, cloud, network and application security with comprehensive VPN, mobile device management (MDM), single sign-on (SSO), endpoint and IOT device security, network access control (NAC) and virtual application delivery controller (ADC) functionality. Pulse SDP is a Suite add-on which activates software defined perimeter (SDP) components within existing Pulse solutions to provide direct device-to-application trusted connectivity only after successful user, device and security state verification. This approach extends the company’s foundation of Zero Trust access for hybrid IT with enhanced usability, deployment flexibility, automated provisioning and resource optimization. In November, Pulse Secure won the Software Defined Vendor of the Year at CRN Channel Awards 2019 recognizing its development of new software defined technologies to help the channel meet growing demand for Zero Trust security.
Allegion, a provider of security products and solutions, and CBORD, a provider of campus card technology solutions, announced a new integration that strengthens perimeter security across colleges and universities in the U.S. Allegion’s Von Duprin Remote Undogging (RU) and Remote Monitoring (RM) options will now extend the impact of CBORD’s card software system for greater control of secondary doors over perimeter access. The integration improves perimeter security by providing electronic override of mechanical dogging so lockdown can occur from the CBORD interface. To ensure peace of mind, remote monitoring capabilities are also available through the integration. Security issue on campus Colleges need to be able to lock down immediately if there is a security issue on campus" This integration also makes Allegion and CBORD one of the first to bring this solution to higher education campuses for access control at this scale. Higher education campuses face a unique challenge when it comes to security – they are larger, open by design, and tend to have more buildings than other learning institutions, making security a demanding task for facility personnel. “This is one of the most critical security hurdles universities face,” said Robert Lydic, Vice President of PACs OEM business at Allegion. “Due to the required circulation between buildings, colleges need to be able to lock down immediately if there is a security issue on campus.” Electronic access control system Yong Lacy, category leader of openings at Allegion, added, “It is not feasible for universities to leave perimeter doors locked during operating hours because students, faculty and visitors constantly need to move across campus buildings with ease. Remote undogging and monitoring can enhance security to avoid putting the college community at risk in emergency situations.” Many secondary doors are not connected to a campus’ electronic access control system, exposing universities to potential security breaches, especially during emergency lockdowns. The Von Duprin RU and RM options, coupled with CBORD’s software, are designed to extend the benefits of electronic access control to these openings. This integration provides higher education customers a wide range of affordable solutions to meet their perimeter electronic access control needs, seamlessly integrating with security systems like Schlage’s electronic locks, readers and credentials. Access control software The RM option is the sensor-only configuration for exit-only or fire-rated doors that require monitoring" “CBORD has been a provider of campus technology for more than forty years and works with partners like Allegion to design innovative solutions as security risks continue to evolve,” said Jim Hoefflin, CBORD president. “We’ve taken a best-of-breed in security solutions and integrated it with our industry-leading access control software for a smart integration that responds to the market’s increasing need for improved campus perimeter security.” The Von Duprin RU option is a retrofit kit for exit devices that enables remote undogging for centralized lock down and door status monitoring with integrated request to exit (RX), latch bolt (LX) and door position switch (DPS) signaling capabilities. The RU option connects wirelessly via BLE to the ENGAGE Gateway, providing real-time, bi-directional communication to the Open Options DNA Fusion software via IP network connection directly to the Gateway. Advanced access control adoption The RU option is a modular battery powered kit that can be added on to existing Von Duprin 98/99 and 33A/35A series devices. The RM option is the sensor-only configuration for exit-only or fire-rated doors that require monitoring. It provides visibility to door status with the same RX, LX and DPS signals as the RU option, without the centralized lockdown component. This integration is part of the next wave in Allegion’s quest to work with the leading players in the industry to spearhead advanced access control adoption, making seamless security the new standard at higher education institutions.
Ambarella, Inc., an AI vision silicon company, announced the CV22FS and CV2FS automotive camera system on chips (SoCs) with CVflow AI processing and ASIL B compliance to enable safety-critical applications. Both chips target forward-facing monocular and stereovision ADAS cameras, as well as computer vision ECUs for L2+ and higher levels of autonomy. Featuring extremely low power consumption, the CV22FS and CV2FS make it possible for tier-1s and OEMs to surpass New Car Assessment Program (NCAP) performance requirements within the power consumption constraints of single-box, windshield-mounted forward ADAS cameras. Other potential applications for the processors include electronic mirrors with blind spot detection (BSD), interior driver and cabin monitoring cameras, and around view monitors (AVM) with parking assist. Intelligent viewing platforms ZF is pleased to be working with Ambarella on the intelligent viewing platforms for Surround View Visualization" The two new SoCs are the latest additions to Ambarella’s successful CVflow SoC family that offers automotive OEMs, tier-1s, and software development partners an open platform for differentiated, high-performance automotive systems. ZF, a global technology tier-1 and supplier of systems for passenger cars and commercial vehicles, is working with Ambarella on viewing and sensing systems: “ZF is pleased to be working with Ambarella on the next generation of intelligent viewing platforms for Surround View Visualization, Driver Monitoring stand-alone vision processing, and e-mirror solutions for both the passcar and commercial vehicle markets,” said Aaron Jefferson, vice president of ADAS product planning at ZF. “The CVflow SoCs’ combination of high quality imaging and advanced AI processing enables ZF to offer a wide range of viewing and interior sensing applications.” visual perception software HELLA Aglaia, a global developer of intelligent visual perception software, has worked with Ambarella’s CVflow processors over the past year: “We chose Ambarella’s CVflow SoCs due to their ability to deliver extremely high computer vision processing performance with very low power consumption,” said Kay Talmi, managing director at HELLA Aglaia. “With the introduction of the CV22FS and CV2FS ASIL SoCs, Ambarella now delivers the functional safety features required by automotive OEMs for the mass production of safety-critical systems.” “Ambarella’s CVFlow architecture delivers an unparalleled combination of AI performance and power efficiency,” said Fermi Wang, president and CEO of Ambarella. “We are pleased to introduce these ASIL compliant CVflow SoCs, delivering on our promises to our partners and customers and further demonstrating our commitment to the automotive market.” Advanced stereovision applications Ambarella will also demonstrate a range of applications from other key partners running on the CVflow engine The CV22FS and CV2FS’s CVflow architecture provides computer vision processing in 8-megapixel or higher resolution at 30 frames per second for object recognition over long distances and with high accuracy. The SoCs each include a dense optical flow accelerator for simultaneous localisation and mapping (SLAM), as well as distance and depth estimation. Multi-channel high-speed sensor input and Ambarella’s image signal processing (ISP) pipeline provide the necessary camera input support, even in challenging lighting conditions. CV2FS also enables advanced stereovision applications by adding a dense disparity engine. Ambarella will demonstrate its CVflow SoC family during CES 2020 to select customers and partners. Demonstrations will include HELLA Aglaia’s deep learning ADAS algorithms and Ambarella’s EVA (Embedded Vehicle Autonomy) self-driving prototype vehicle. Ambarella will also demonstrate a range of applications from other key partners running on the CVflow engine. CV22FS and CV2FS are scheduled to sample to Ambarella customers in the first half of 2020. Wireless video streaming CV22FS and CV2FS SoC key features: CVflow architecture with DNN support Quad-core 1-GHz Arm Cortex-A53 with NEON DSP extensions and FPU Safety island with dual-core lock step (DCLS) Arm R52 targeting ASIL-C Dense optical flow engine Dense stereo disparity engine (CV2FS only) ASIL B functional safety level - High speed SLVS/MIPI CSI-2/LVCMOS interfaces Multi-channel ISP with up to 480-Megapixel/s input pixel rate Native support for RGGB, RCCB, RCCC, RGB-IR, and monochrome sensor formats Multi-exposure high dynamic range (HDR) processing and LED flicker mitigation Real-time hardware-accelerated fish-eye dewarping and lens distortion correction (LDC) 4-megapixel AVC encoding for video logging and wireless video streaming Rich set of interfaces includes CAN FD, Gigabit Ethernet, USB 2.0 host and device, dual SD card controllers with SDXC support, MIPI DSI/CSI-2 4-lane output Advanced security features, including OTP for secure boot, TrustZone, and IO virtualization AEC-Q100 grade 2 (-40C to +125C (TJ) operating temperature) 10 nm process technology
Ambarella, Inc., an AI vision silicon company, announces that it will demonstrate its new robotics platform during CES 2020. Based on Ambarella’s CVflow® architecture, it targets automated guided vehicles (AGV), consumer robots, industrial robots, and emerging Industry 4.0 applications. The robotics platform provides a unified software infrastructure for robotics perception across Ambarella’s CVflow SoC family including the CV2, CV22, CV25, and S6LM. It provides easy access and acceleration for the most common robotics functions including stereo processing, key points extraction, neural network processing, and Open Source Computer Vision Library (OpenCV) functions. Advanced image processing Ambarella will demonstrate the highest-end version of the platform during CES 2020: A single CV2 chip will perform stereo processing (up to 4Kp30 or multiple 1080p30 pairs), object detection, key points tracking, occupancy grid, and visual odometry. This high level of computer vision performance combined with Ambarella’s advanced image processing—with native multi-camera support (up to 6 direct camera inputs on CV2, and 3 on CV25)—enables robotics designs that are both simpler and more powerful than traditional robotics architectures. We are thrilled to introduce and demonstrate this high performance robotics platform during CES" “With all eyes on the future of home and industrial robotics, we are thrilled to introduce and demonstrate this high performance robotics platform during CES to our manufacturing partners and customers,” said Jerome Gigot, senior director of marketing at Ambarella. “Combining the best of Ambarella’s advanced imaging capabilities with our high-performance CVflow architecture for computer vision, the new platform will help enable a new breed of smarter and more efficient consumer and industrial robots.” Neural network porting The platform supports both the Linux operating system as well as the ThreadX® RTOS for systems requiring functional safety, and it comes with a complete toolkit for image tuning, neural network porting, and computer vision algorithm development. It also supports the Robotics Operating System (ROS) for easier development and visualization. A rich set of APIs makes it possible for application developers to efficiently run higher-level algorithms including optical flow, visual odometry, and obstacle detection. The new robotics platform and its related development kits are available today and can be paired with various mono and stereo configurations, as well as rolling shutter, global shutter, and IR sensor options. Ambarella will demonstrate the new platform to select customers and partners during CES 2020.
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorized personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognizing the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorized person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorized users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.
On November 2019 in Stockton, California, surveillance footage found that vandals shot out glass windows and doors in many places in a small business complex (FOX40). The intruders broke in only to leave with nothing, proving their intent was solely to vandalize the property. Meanwhile, it was reported that a trio of ATM thieves struck around 9 times across many different locations inside Brooklyn and Queens within just over a month in fall 2019 (ATM Marketplace). On average, the cost of vandalism to SMB is around $3,370 per incident (US Small Business Administration), including a staggering 692 vehicle vandalism claims per day. Likewise, the average cost of theft to SMB is about $300 per shoplifting incident and $1,500 per employee theft incident, which accounts for 38% and 34.5% of all theft instances, respectively (National Retail Security Survey). High-performance artificial intelligent systems can automate the monitoring tasks Vandalism and theft have proven time and time again to be inconvenient and deconstructively harmful towards SMB. However, these financial burdens can be prevented with the use of the right security system. AI-based security systems with Deep Learning contain many features that many SMB owners find advantageous in their pursuit to stop unwarranted and unwanted money loss. Intrusion and loitering detection The first of many features that can help with vandalism and theft prevention is Intrusion Detection. High-performance artificial intelligent systems can automate the monitoring tasks for high-risk sites to provide a high level of security and security personnel monitoring efficiency. Traditional intrusion detection systems detect objects based on size and location, but they do not recognize the type of objects. Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognize a plethora of different object types, can distinguish objects of interest, thus significantly decreases the false-positive intrusion rate. The more advanced AI-based systems, like those we offered at IronYun, enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customizable in particular systems, which allows for a range of detection options. Advanced loitering detection software as such can detect and trigger real-time alerts for both people loitering and/or vehicles that are illegally parked in certain areas of interest. A benefit, which only certain advanced systems contain, is the ability to send trigger actions to 3rd-party systems in reaction to receiving an alert of loitering and/or intrusion detection. These trigger actions can be set to contact authorities immediately and/or trigger a scare tactic alarm or announcement to intruder/loiterer. Certain Face Recognition and License Plate Recognition software can record individual people/vehicles Face and license plate recognition In addition to the activity detection solutions, certain Face Recognition and License Plate Recognition software can record individual people/vehicles and use pre-configured lists to identify particular faces or plates that may be of interest, such as those in watchlists. These systems can also enable the users to upload images of faces not in the lists and search for them in the camera recording. For instance, if a person is detected several times loitering outside a store, one may save one of the detection photos into the watchlist, and set up an alert when said face is recognized again outside the building in the future. The alerts will help to deter and prevent vandalism or theft, and notify the authorities to the scene before the troublemaker completes the act. The main attributes of high-performance Face Recognition systems which maximize assistance with vandalism and theft management include: Face match rate > 90% with good camera angles and lighting. Processing multiple streams and multiple faces per image. Live face extraction and matching to databases of thousands of faces within 3 seconds. State-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR cameras If the watchlist individual is wearing a mask or their face is not in view of the camera, their license plate may be a good indicator. If a particular car is detected several times loitering in the parking lot or street outside a store, the user can set the alerts for such car to get notified in the future. With an AI solution like this, common street cameras should be equipped with LPR capabilities. So, state-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR cameras. high-performance alert mechanisms A high-performance AI solution, in addition to having high accuracy, should be able to: Easily integrate with 3rd-party systems Work well with all ONVIF IP cameras including infrared and thermal ones (for Intrusion detection) Analyzes video streams in real time and trigger alerts within a few seconds Send alerts to multiple VMSs, connect with signaling devices such as loud speakers or flashing lights Send email notifications to security staff and police departments Send notification on mobile device using AI NVR mobile app Maintains a record of all alerts to provide evidence of intrusion and loitering instances for police and insurance agencies. To assist in theft and vandalism prevention, AI-based security systems with deep learning will do all of the tedious work for you. Their low cost and high performance also make them the most accessible security solutions in the market with large return on investment. Stopping crimes is a difficult, ongoing challenge, but with the right AI software, business vendors and police departments can do so with more ease.
As we surpass 2019, it’s high time we realize that by merging the digital and physical realm, IoT is destined to change the way we live and work. I have always been interested in the intersection between business and technology, and today it seems that the brave new technological world we have been dreaming over centuries has arrived. With everything from home appliances to smart vehicles, portable devices are connected to the internet and exchange crucial data. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices. IoT in every day life I must say the numbers are quite mind-boggling! And this leaves a lot of room for improvement by incorporating the Internet of Things in software development; whether it’s a cellphone app or web. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices It may interest you to know that the Internet of Things has the potential to touch every domain and nearly every aspect of human life. According to sources, impact on IoT leads to: By 2020, 50 billion devices are expected to connect to the internet In 2015, 3.5 connected devices per person have now reached almost 7 8 billion cellphone broadband access points by 2019 5 million IoT jobs by 2020 70 percent a year growth through 2018 in total sales of clothing and accessories incorporating computer technology, rising from $3 billion today to $42.5 billion $3.3 trillion market for ‘Smart City’ applications and services by 2025 The impact of smart homes Instead of saying the home is where our heart is; a home is where a bot is. However, IoT hasn’t entirely arrived in our homes. I mean, we are still required to order groceries the minute we run out of eggs and Greek yogurt. Slowly and steadily we are getting there; it seems the latest advancements in artificial intelligence and big data analytics will definitely work wonders for us. Smart homes are no longer a dream project; we can soon expect everything to be governed by the “brain” or a central platform. Moreover, bots will be seen tackling a certain set of functions related to more difficult tasks, and lastly niche bots, in charge of single tasks such as vacuuming the house or addressing more complex duties like accounting, coaching or household managing. Tech giants, or should I call them current development frontrunners like Amazon, Google, Samsung and Apple are expected to come up with something nerve-cracking. The benefits of IoT Other than this, with IoT, you will be able to work smarter and not harder. Artificial intelligence and advanced analytics can help create a more intelligent work environment. For example, the right AC temperature in shared office spaces help us book the most convenient meeting room, and moreover, take into account the room preference by setting the right temperature, lighting, and can automatically restock office supplies. This simply leads to: More efficient office operations Energy savings Comfortable work environments Consequently increased employee productivity The dark side of the Internet of Things The potential risks Every technology indeed comes as a boom, but that doesn’t mean the grass will be greener on the other side. Furthermore, we will uncover how even after offering so much convenience why IoT poses so much risk. Like I said before, IoT can be integrated into anything from coffee machines to fitness watches leading to make our lives more convenient. But what happens if they turn bad? When being unwillingly infected or hacked, these blessings can certainly turn into huge threats. IoT can be integrated into anything, leading to make our lives more convenient Devices, systems and the lack of security It may interest you to know that IoT devices can become bots that blindly follow commands to commit crimes as part of a botnet. What is a botnet, you may ask? Well, it is a network of infected devices that are mainly abused by the attacker to perform tasks such as carrying out DDoS attacks, Bitcoin mining and spreading spam emails. Mainly being used to carry out DDoS attacks and to mine for cryptocurrencies, these botnets have the potential to have a larger impact by making IoT devices do much more, such as send spam messages featuring dangerous malware. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices Much like most malware, botnets can be found on dark marketplaces. The source code can be purchased and leaked, depending on the type of service. In case, an IoT device is already infected, another bot can attempt to replace the infection with its code and in some cases also "repair" the security vulnerability. But most of the time it fails! No matter how innocent these proof-of-concept attacks may seem, one cannot deny the fact that IoT devices and systems aren’t properly secured. Hackers can easily gain control of them and cause complete chaos like never before. Collecting information at a cost But how much information can an IoT device collect? What I mean is that by hacking a webcam, one can see what they are pointed at without you even knowing it, smart TVs and personal assistants can pick up sound, and smart cars can give clues to whether or not someone is home. Honestly, the amount of information collected on these IoT devices cannot be determined at any cost. And with everything in the cloud, such information can be intercepted or rerouted to a malicious server and be abused if not properly secured. The more we surround ourselves with IoT devices, the more motivation cybercriminals receive to target us! With the time passing by, let’s simply hope that connected device security will dramatically improve.
In the banking world, the threat of unwanted intrusions into premises leading to loss of property and even risk to life is always present. Small wonder then that banking institutions take so much care over their security systems and also over their choice of suppliers for those products. In the retail banking sector, requirements for intrusion detection and related security measures are necessarily more stringent and more specialized than in most other areas of business and commerce. Data capture form to appear here! The banks clearly need to work with suppliers whose integrity is beyond question. They should also be looking for organizations that can offer expert advice, gained through their knowledge of design and manufacturing security products. Systems need specialist installer partners in order to provide a seamless solution. Systems need specialist installer partners in order to provide a seamless solution The special requirements of the banking sector These supplier organizations must also fully understand the special requirements of the banking sector and, ideally, should be able to demonstrate proven experience in that sector. They must also be willing and able to work with the bank as a partner, to find better ways of addressing old threats and to develop effective measures to counter new ones. Video is a big component of providing security, and variable lighting conditions pose a persistent challenge in video surveillance applications such as large banks and financial institutions. Typically, these venues include an abundance of windows. The resulting excessive light can damage video image quality, by flooding the image plane of the surveillance camera. Dramatic differences between light and dark areas complicate the ability of video cameras to view someone standing in the shadows. A contrasting lack of windows at teller stations can result in dim lighting, equally damaging video image quality, in critical surveillance areas where clear, detailed images are needed the most. Stark contrasts between white and black levels in video images can obliterate faces and finer details of a subject when in a darker area. Particularly, this happens when a person is amid dark internal lighting, with his/her back to the sun. Data capture form to appear here! A new network architecture When upgrading a bank’s digital security system, a new network architecture needs to be created. Usually, this means switching from DVRs to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Servers, networking and workstations provide enterprise-quality performance for all financial projects Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations is now possible in financial institutions, even for small projects. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Software is also part of the solution. A new software platform helps banks and credit unions simplify, modernize, and automate security, surveillance and fraud investigations across their enterprise. The platform eases the daily challenges security investigators face. It simplifies and reduces the time to access live and recorded video through an intuitive interface, empowering users to quickly find the data needed to eliminate risks while increasing productivity. With an enhanced user experience, investigators can reduce training time, align investigation workflow, streamline video sharing, and focus on more critical tasks. The fraud and security challenges banks contend with can be overwhelming, but prompt action is necessary to limit the damage that can greatly affect customers, employees, and the brand. When an incident occurs, investigators must turn to innovative security tools to be able to swiftly locate and analyze data. But these solutions are typically complex to use and manage. Investigators must turn to innovative security tools to be able to swiftly locate and analyze data Changing work environments The changing work environment of financial institutions is impacting security needs. A credit union in Australia operates an innovative, modern working environment that utilizes flexible workspaces in place of traditional desks. Staff are not allocated a specific desk but instead choose where they wish to sit each day. To facilitate the operation of the flexible work environment and provide employees with storage for their personal effects (work-related material is stored elsewhere), the credit union uses banks of brightly colored lockers that are managed by electronic access control. Using Gallagher’s smartcard, multi-technology T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker. With the readers communicating with Gallagher’s Command Center software management platform, the credit union has a simple-to-operate, customizable system that enables staff to carry just one card on site. Read part one and part three of our banking security mini series.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
Established in 1976, Meghna Group of Industries (MGI) is a conglomerate in Bangladesh. MGI operates out of a large campus in Dhaka that houses its head office, 45 different manufacturing plants, and maintenance workshops, all under one roof. MGI has a turnover of over USD 3 billion, and an employee strength of over 30,000. Being an established and trusted group, it required operations to be suitably monitored, in order to ensure uninterrupted production, adherence to quality standards, and timely delivery of supplies to customers. So far, it had been monitored by manned security, with accompanying risks ranging from damage to assets, misuse of equipment, thefts, leakage of confidential information, employees’ safety, poor record keeping for vehicles entering or exiting the premises, and more. Providing investigation-Friendly monitoring software Enabling IVA at various locations has helped in the monitoring of infrastructure Designing of the solution started with a joint site survey by Videonetics, MGI IT heads, and the system integrator. After extensive research, Videonetics developed a unified solution encompassing Intelligent Video Management Software (IVMS), Intelligent Video Analytics (IVA), and a customized ANPR system to read and capture license plates in Bengali language. Key aspects of the solution included the following: Videonetics’s IVMS has been deployed to help in viewing and recording feeds from over 500 cameras installed in multiple factory locations. This is enabled over IP network in an efficient and elegant way. In addition, the solution provides investigation-friendly monitoring software at the front-end, while relegating all the complexity of the server software to the back-end. Enabling IVA at various locations has helped in the monitoring of infrastructure, vehicles, people, crowds and objects, for automatic detection and analysis of events of interest. Manned security to address safety The operators get a bird’s eye view of various sites from their centralized location, enabling them to respond quickly and effectively when an incident occurs. The solution has been installed on Red Hat® Enterprise Linux® which makes the overall system more secure and maintainable. Videonetics’s Automatic Number Plate Recognition (ANPR) system has been customized to read license plates in Bengali. Regardless of the lighting conditions, the Bengali ANPR accurately captures with timestamp the license plate of any vehicle as it appears in the camera’s field of view (FoV). The new implementation enables security operators to be deployed at the unified interface In addition, the system is integrated with the IVMS at the command and control center, for viewing and analyzing vehicular movements, and taking action, if required. THE IMPACT Prior to the installation of Videonetics’s solution, MGI used to rely on manned security to address safety, security and operational risks. However, the new implementation enables security operators to be deployed at the unified interface, for monitoring multiple sites such as assembly plant, warehouse, process, dispatch area, vehicle movement, and so on. Personal protection equipment detection So now, MGI operators can handle incidents of thefts, potential break-ins, unauthorized intrusions, and conduct investigations, without having to leave their desks. This has helped MGI in maximizing resources and significantly reducing costs. But the biggest benefit has been to be able to provide a safer environment to its employees, and to secure its workplaces with optimization in day-to-day operations. The open architecture of the solution allows MGI to continue adding, in a single interface, more AI & DL powered applications such as personal protection equipment detection, facial recognition, fire & smoke detection, workers slip/ fall detection, workers head count, vehicle movement management, to name a few. This makes it possible for the company to address all its security concerns with a holistic approach.
Universities push traditional access control to its limits. The more one asks of it, the tougher it gets. If one wants to monitor access all over campus. To know who comes and goes to computer rooms and classrooms. One would like to filter access to conference and seminar rooms according to the time — lecturers all day, cleaners and contractors after hours. Meanwhile, one wants students to be safe 24/7, without compromising the sense of freedom they enjoy on campus. Traditional electronic door security Our Aperio wireless locks integrate seamlessly with more than 100 different security systems" Mechanical lock-and-key security cannot do this. Managing keys weighs facilities staff down. Students lose them all the time, and they’re expensive and laborious to replace. The traditional solution — wired doors with card readers — is costly to fit and run. There is an alternative. “Battery-powered electronic locks with inbuilt RFID readers are a cost-effective way to upgrade existing access control and bring it to more doors,” says Lars Angelin, Business Development Manager for Wireless Locks at ASSA ABLOY Opening Solutions EMEA. “Our Aperio wireless locks integrate seamlessly with more than 100 different security systems. You don’t even need to change your smart-cards. They fit all kinds of doors.” “And because they are battery-powered and wire-free, they’re much more cost-effective to install and run than traditional electronic door security.” It sounds great in theory. But what about the real world? These 5 universities have experienced an impact already. University of Liverpool, England A BREEAM sustainability rating of ‘Excellent’ was reward for innovative architecture that combines aesthetics with environmental awareness. Vine Court’s sustainable features include rainwater harvesting, solar water heating and battery-powered Aperio wireless electronic locks. Unlike wired access control, Aperio wireless locks use little electricity. Catherine Anderson at the University of Liverpool called Vice Court ‘a new and exciting benchmark for the Student Accommodation Sector.’ Lund University Faculty of Law, Sweden Convenience is king: with Aperio wireless locks, security managers block lost cards without traipsing to every door The Law Faculty wanted to replace their access system without asking 50,000 students and staff to return existing smart-cards for reprogramming. Aperio made the process almost invisible from a user perspective. They didn’t even need to revalidate at a reader. Convenience is king: with Aperio wireless locks, security managers block lost cards without traipsing to every door. A Pacom Unison security platform handles everything seamlessly. Facilities staff spends less time on admin and more on security. Aberdeen University, Scotland At Aberdeen’s refurbished Student Village, Aperio online cylinders and certified security locks cover doors requiring different grades of security. Cost efficiencies came at installation stage — no cabling to the doors means no expensive electrical contractors — and will continue through the locks’ operational life. Unlike standard wired access control that requires ‘always-on’ mains electricity, Aperio wireless locks are powered by batteries. These typically need replacing every couple of years — and that’s it for maintenance. HafenCity University Hamburg, Germany Aperio electronic cylinders filter access to the media centre, library, cafeteria and offices A partnership between SIEMENS and ASSA ABLOY provides intelligent, transparent electronic access control at a new docklands hub for the university. Aperio electronic cylinders filter access to the media centre, library, cafeteria, seminar rooms, staff rooms, laboratories and offices. Locking with these wireless RFID devices enables the university to remain an open, welcoming space without sacrificing staff and student safety. University of Birmingham, England Two new accommodation blocks at the university’s Vale Village complex needed locks to integrate seamlessly with a pre-existing campus security system, including Gallagher Command Centre software. Aperio locks now secure almost 1,800 doors with a low-cost solution that eases the key management workload for facilities staff. Everything is controlled from the Gallagher interface. And because Aperio is scalable, they can add new doors and buildings whenever they choose.
Bluebird House is a specialist UK inpatient facility, providing treatment and care for young people with complex mental health problems which mean they pose a risk to themselves or others. Run by Southern Health NHS Foundation Trust, the center also houses adolescents detained under the Mental Health Act, so the highest standards of care, protection and security are required. As part of a wider review of security and safety across the trust, Bluebird House was earmarked for a comprehensive video surveillance upgrade and IDIS technology was chosen as the best-fit for this major project. Providing comprehensive coverage All IDIS equipment uses true plug-and-play set up, which minimizes disruption and disturbance to patients Galeco engineers installed 110 IDIS 12MP Super Fisheye cameras in communal and therapeutic areas inside the facility and over 40 bullets and 13 PTZ cameras cover the exterior. All the cameras are connected to six 32-channel NVRs and managed via IDIS Center video management software (VMS). All IDIS equipment uses true plug-and-play set up, which minimizes disruption and disturbance to patients, while protection against gaps in footage is provided by IDIS Smart Failover ensuring 24/7 continued recording even during network instability or drop-out. Implemented across three secure wards and two high care units, the 12MP IR Super Fisheyes provide comprehensive coverage much more affordably than two or more fixed lens cameras. Advanced IDIS video capture technology delivers complete high-definition scene coverage in all lighting conditions and allows staff to de-warp in live view as well as playback. Automatic object detection The 5MP bullet cameras, deployed around the building exteriors provide coverage of gardens, courtyards and car parks. IR LED that allows night-time image capture at distances up to 30m and includes intelligent functions such as active tampering alarms and trip zones and will notify the security team to any breach. Each camera is set to perform virtual guard tours at specific times throughout the day and night IDIS 31x Zoom IR PTZ cameras are installed along the perimeter to provide clear night-time image capture at distances up to 200m. Each camera is set to perform virtual guard tours at specific times throughout the day and night. Featuring automatic object detection, the cameras recognize and automatically track objects, people or cars capturing useful footage and alert operators of any suspicious activity. To meet patient privacy requirements, access to live and recorded footage, is limited to staff according to their ward and role. Access to advanced features and functionality Staff can only view and review footage from their area of responsibility at designated monitoring stations using specialist IDIS monitors designed for high-performance surveillance operations. To meet future requirements, the new IDIS solution can be linked to the trust’s local area networks (LANs) without increasing cyber- security concerns, thanks to IDIS’s use of proprietary software which is inherently resilient. The totally cost-free IDIS Center video management software (VMS) gives security managers and senior staff a complete overview of the entire site from a 24/7 manned and centralized control room. Using the intuitive IDIS Center interface, operators have complete command and control of each camera and access to advanced features and functionality to ensure the secure and smooth day-to-day running of the site. Authorized monitoring and access of footage IDIS technology made this easy, and it was also the quickest and least disruptive to install Video surveillance is a key resource for clinicians, Sr. managers and security staff at Bluebird House as they need to work closely together to deal with incidents and reduce risks of harm. Improved video coverage was needed as it would allow ongoing review of care standards and full investigation of any alleged incidents. Patient privacy is also of paramount importance, so specialist integrator Galeco Communications was selected to implement a solution that would allow authorized monitoring and access of footage for specific rooms and wards. IDIS technology made this easy, and it was also the quickest and least disruptive to install, the most secure against cyber-attacks - in compliance with NHS requirements – and yet would deliver the lowest total cost of ownership (TCO). Ensuring better safety and security Replacing the centre’s aging camera system, the IDIS solution would give complete coverage of corridors, wards and other high-risk areas in all lighting conditions. The IDIS solution has improved security, safety and care at Bluebird House by providing a complete video record of events. Exterior cameras ensure better safety and security in outdoor communal areas Footage from the 12MP Super Fisheye cameras give a full 360 view without any blind spots with a choice of 6 view modes and crucially provides staff with the ability to de-warp footage retrospectively. Now, if incidents need to be investigated it’s a simple task to retrieve video and provide any high-definition evidence required. Exterior cameras ensure better safety and security in outdoor communal areas, while security operators can quickly detect and respond to any suspicious activity on the perimeter. Access and review recordings "A key benefit for us is that this new system is so easy to use, and particularly for our clinical staff who can now access and review recordings to help them improve patient care. This video technology gives us extra confidence that our patients and staff are safe and protected” said Tracey Edwards, Head of Security at Southern Health NHS Trust. With minimal disruption, and working in this sensitive location, Galeco engineers were able to replace an outdated system with an affordable, high-performance, cybersecure solution that is easy to maintain and operate without any ongoing license fees.
HID Global, global provider of trusted identity solutions, has enabled BigWise, a global provider of wise solutions worldwide, to bring the security and convenience of biometrics to its retail and restaurant customers. BigWise went from concept to a pilot of its new biometric-enabled Stellar POS platform at a major customer within 30 days using the HID DigitalPersona fingerprint biometric solution. HID DigitalPersona fingerprint biometric solution HID’s fingerprint biometric solution significantly shortened our path for secure fingerprint biometric authentication" “HID’s fingerprint biometric solution significantly shortened our path for adding secure fingerprint biometric authentication services to our Stellar POS platform,” said Jose Rivas, founder and CEO, BigWise Corporation. He adds, “We were able to move very quickly to give our customers valuable new capabilities for stopping internal theft and fraud while simplifying employee access to the Point of Sale (POS) terminal. We expect our lead customer to roll out this new biometric-enabled Stellar POS solution in their operations in the very near future and are excited about the product’s broader market opportunities for us.” EikonTouch fingerprint biometric readers Taking advantage of DigitalPersona’s intuitive biometric software development tools, BigWise added fingerprint biometrics to their POS offering in a matter of weeks. The new solution allows customers the flexibility of choosing the HID Fingerprint biometric reader that meets their requirements, including the DigitalPersona 4500 and EikonTouch fingerprint readers. With the addition of fingerprint biometrics, Stellar POS gives organizations not only a more convenient way to login to their POS terminals but also allows them an effective way to stop labor hour fraud as well as POS theft due to unauthorized manager overrides and approvals. Stellar POS end-to-end solution “We are pleased to have helped BigWise complete this biometric authentication pilot and shorten time to market for its exciting new offering,” said Wladimir Alvarez, senior director of Sales LAM, Extended Access Technology Business Unit with HID Global. “In addition to securing their POS systems DigitalPersona fingerprint biometrics finally allows Bigwise customers to eliminate their dependence on insecure and costly passwords and swipe cards.” Stellar POS provides an end-to-end solution from the store floor or restaurant counter Stellar POS provides an end-to-end solution from the store floor or restaurant counterStellar POS provides an end-to-end solution from the store floor or restaurant counter through the full range of inventory, logistics and production processes and makes it easier to manage offers and promotions, loyalty programs, and accounting and treasury operations. BigWise sells the Stellar POS solution primarily in Colombia, Chile, Argentina and Peru. Identity management HID DigitalPersona biometric readers along with the DigitalPersona software development kit (SDK) solves security and identity management challenges for hundreds of millions of users around the world. To get developers off to a quick start, HID’s DigitalPersona developer kit includes hardware samples, downloadable royalty-free SDKs, sample code, documentation and membership in HID Global’s Crossmatch Developer WebPortal.
There are many matters that must be taken into account when organizing a casino. A top priority is the security of the entire workforce and clientele. An access control system that is reliable and easy to operate provides the basis for that. Casino Baden-Baden is open 358 days a year. In addition to various different pay scale groups and work-time models, a variety of bonuses need to be assigned. Pay may therefore be partly exempt of tax or liable to tax, with holiday bonuses and weekend pay. Recording staff work timings Intensive workshops and consultations were conducted to establish the specific requirements of the casino, so that the best possible solution could be developed. The main focus was on recording work times and transmitting that data to the casino's own specially developed shift schedule program. Given the various different work time models and wage types in numerous variants, complex manual procedures must be automated in future. IF-4735, IF-810, and IF-800 access control terminals Employees can use their passes for cashless payment in the cafeteria and at the vending machines In 1991, a solution for physical access control and time recording was implemented in the form of the IF-5020 software. Since 1998, the IF-6020 software solution has been in use. The hardware terminals IF-4735, IF-810, and IF-800 ensure smooth recording of work times and grant authorized employees access to the various separate areas. Also, the employees can use their passes for cashless payment in the cafeteria and at the vending machines. The system solution from Interflex, with its hardware and software components, now brings employees and administrators substantial time savings and a great deal of convenience. Central access control system All access permissions and work times are now recorded and controlled in one central system, eliminating the disruption of transferring from one system to another, such as to the program for pay and shift planning. This has brought considerable improvement in transparency and in the freshness of data, and paper has been completely banished from work time control.
Genetec Inc., globally renowned technology provider of unified security, public safety, operations, and business intelligence has announced that the city of New Orleans (NOLA) is relying on Security Center, the company’s unified IP security platform, to improve public safety and enhance city-wide collaboration. With about 400,000 residents, New Orleans (NOLA) is the most populous city in the State of Louisiana. Like other big cities, NOLA is focused on enhancing public safety for its citizens and the 1.2 million visitors who flock to the city’s French Quarter for Mardi Gras celebrations. Using Security Center, the NOHSEP agency has saved police officers about 2000 hrs of investigative work in just a year Genetec Security Center As part of a Citywide Public Safety Improvement Plan that included the deployment of a new citywide public safety system and the construction of a Real-Time Crime Center (RTCC), the New Orleans Homeland Security and Emergency Preparedness (NOHSEP) chose the Genetec Security Center unified platform to support all city agencies. Using Security Center, the NOHSEP agency has saved police officers about 2000 hours of on-foot investigative work in just one year. “It might take a police officer over an hour to visit business locations, speak with owners, look through video, find what they are looking for, get a copy of video onto USB keys, drive back to the precinct, and then submit that into evidence." said George Barlow Brown, IT Manager at the New Orleans Real Time Crime Center. Video and ALPR cameras He adds, “So, we have essentially saved the department over 2000 hours of manual labor in physically collecting and storing video evidence. That’s more time for officers to respond to calls of service and be present in our many neighborhoods, which helps build community confidence. The ROI is there for us in terms of the efficiency,” The team can now easily retrieve evidence from over 325 city-owned video cameras and 100 automatic license plate recognition (ALPR) cameras (60 of which are Security Center AutoVu cameras) from the Real-Time Crime Center. The new security platform is integrated with other public safety solutions such as a Briefcam analytics system and a computer-assisted dispatch (CAD) system. All this information gets routed through to a central command center, speeding up emergency response. Share video access with RTCC “Our operators do the full investigative work right from within Security Center. It’s just one of the most intuitive solutions that I have ever seen. We can display up to six video tiles and hit ‘synchronize video’ to see various angles of the same scene playing at the same time. We can then select the segment of video we need and hit export. Each 10-minute segment from all the video tiles is then archived for viewing later on,” said Brown. NOLA is also leveraging Security Center to foster a true public-private partnership. The city launched a platinum version of the SafeCam project, which allows businesses to share access to external video cameras with the RTCC. Motion-detection alarms Using the Genetec Federation feature, the NOHSEP team can access video from participating companies’ systems Using the Genetec Federation feature, the NOHSEP team can access video from participating companies’ systems. Participating businesses can be identified by discrete signage at their front entrances. This tells on-the-ground officers that this business has shared their outdoor cameras with the RTCC, and there is no reason to disturb the establishment or their customers. The officer can simply call RTCC operators to get the evidence they need. Brown and his team also have motion-detection alarms set up on cameras facing some known illegal dumping sites. As soon as someone dumps refuge in these locations, the team can proactively notify the Sanitation Department so they can collect the debris. Mining video and data NOLA is making the most of its security investments to improve city life too. For one, the RTCC operates a backup emergency operations center for the city of New Orleans. The NOHSEP team has also shared video feeds with other city departments such as the Sewage and Water Board, so they can determine the rate at which an intersection floods. As plans continue to evolve, the RTCC team is taking full advantage of the new technology to keep NOLA safer. “As far as investigations and the ability to mine video and data, Security Center is hands-down the best product out there. With this platform, we’re extending greater efficiency to responding officers, and we’re also forging stronger partnerships with our community. Together, we’re all working smarter and faster to keep New Orleans safe,” concluded Brown.
Round table discussion
Cloud applications are an everyday facet of business these days, exemplified by systems such as Office 365, Salesforce.com and Dropbox. The physical security market is also embracing the cloud after overcoming some initial concerns and thanks to improvements in cloud offerings. We asked this week’s Expert Panel Roundtable: Which security markets are likely to embrace the cloud?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
Security software: Manufacturers & Suppliers
- ACT Security software
- Milestone Security software
- Vicon Security software
- DSX Security software
- Hanwha Techwin Security software
- Gallagher Security software
- HID Security software
- TDSi Security software
- Bosch Security software
- Nedap AEOS Security software
- CEM Security software
- Software House Security software
- CCTV Software Security software
- PAC Security software
- Honeywell Security Security software
- FLIR Systems Security software
- Panasonic Security software
- Dallmeier Security software
- Geutebruck Security software
- IDTECK Security software