Altronix Corp. announced that it has received Lenel factory certification and joined the Lenel OpenAccess Alliance Program (OAAP). Altronix’s LINQ technology interfaces with the OnGuard access control system and facilitates the remote monitoring and reporting of power diagnostics. These alerts minimize system downtime and eliminate unnecessary and costly service calls. "Altronix has completed required factory testing at Lenel to validate the functionality of its interface to OnGuard. This...
The Board of Directors of Digital Systems Corporation, the parent company of Galaxy Control Systems, a provider of integrated access control and security solutions, announces the appointment of Rick Caruthers to the position of President at Galaxy Control Systems. Effective immediately, this appointment reflects the company’s long-term planning and succession strategies. “Rick has essentially been working in the capacity as president of Galaxy Control Systems for the past several ye...
Convergint Technologies, globally renowned service-based systems integration company, has announced the acquisition of Firstline Security Integration (FSI). Founded in 1992, Firstline Security Integration is a provider of cutting-edge, customized integrated security solutions to the western United States. Firstline Security Integration Headquartered in Anaheim, Calif., FSI has built strong relationships with many key customers throughout the west, including those in the energy, utilities, muni...
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announced a new line of off-the-shelf analytics appliances within its Streamvault portfolio. Designed to analyze more camera streams per unit than traditional security appliances, the new devices come pre-loaded with Genetec Security Center and unified analytics modules, reducing the cost and time required to deploy video analytics in new and existing systems. Available immedi...
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this p...
Maxxess Systems introduces new enterprise software that combines security, communications, business intelligence and data integration into a single, easy-to-use platform called Maxxess InSite. Maxxess InSite, Unified Interface Platform Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure" Nothing operates, functions or looks like Maxxess InSite. It combines systems intelligence and human intelligence to detect and respond to...
Evolv Technology, creator of the Evolv EdgeTM people screening system that detects weapons and bombs, today announced the addition of Alan Cohen and David Orfao of General Catalyst to its Board of Directors. Both have deep experience scaling sales, marketing and distribution, ultimately building organizations that have created new multi-billion-dollar disruptive companies. Most recently, Cohen was a Board Member and Chief Commercial Officer at Illumio. A long-time enterprise tech veteran, his prior two companies, Airespace (acquired by Cisco for $450 million) and Nicira (acquired by VMware for $1.26 billion), were the market leaders in software-driven, cutting-edge technologies. Experience In Organizational Scaling Allaire grew from a venture-backed start-up to a $119 million public corporation trading Prior to Airespace, Cohen held executive roles at Cisco and IBM. He is well known for his experience in marketing and organizational scaling in several industries including networking, security, Software-as-a-Service (SaaS), and enterprise software. Cohen also serves as an advisor at Cohesity, Mist, and Netskope. Before co-founding General Catalyst, Orfao led Allaire Corporation from 1997 to 2000 as president, CEO and member of the Board of Directors. During his tenure, Allaire grew from a venture-backed start-up to a $119 million public corporation trading on the NASDAQ. Successfully Completing IPOs On The NASDAQ The company pioneered the internet application server market before merging with Macromedia. Prior to Allaire, Orfao held executive positions at Frame Technology Corporation, Claris Corporation and SQA Corporation, successfully completing Initial Public Offerings on the NASDAQ with Frame Technology and SQA Corporation. Orfao sits on the Board of Directors for several General Catalyst-backed companies including Circle, Envoy, OG Systems and RStudio. Their extensive experience scaling and transforming businesses will be invaluable" “We welcome Alan and David to the board – their extensive experience scaling and transforming businesses will be invaluable as we expand beyond the initial markets we have developed in 2018,” said Mike Ellenbogen, CEO at Evolv Technology. “These additions and the rest of our board and team of advisors share the same passion for applying technology to help solve important challenges. With their support and influence, we are well-equipped to extend our reach.” From battle-hardened security personnel, to former CIA and FBI operatives, Evolv’s list of advisors and board members includes the following experts that are helping improve the people screening experience with technology to keep people safe from mass shooting and mass casualty events. Advisors: David Cohen, one of the world’s leading authorities on intelligence analysis and operations from the CIA and NYPD. Juliette Kayyem, who has spent over 15 years working to make our nation more secure as Massachusetts’ Homeland Security Chief and Assistant Secretary at the U.S. Department of Homeland Security (DHS). John Pistole, former Transportation Security Administration (TSA) Administrator who helped transform the organization from a one-size fits all agency, to a risk-based, intelligence-driven agency. Board Members: Mark Sullivan, a federal law enforcement agent for nearly 35 years and former Director of the U.S. Secret Service. Bilal Zuberi, a partner at Lux Capital and former entrepreneur focused on backing entrepreneurs who imagine and build the world they want to live in. Mike Ellenbogen, co-founder and CEO of Evolv Technology focused on applying advanced technology to help make our world a safer place. Evolv Edge is used by a variety of venues including Oakland International Airport, a top NFL sports stadium, performing arts venues in New York City, iconic tourist attractions and airports across the U.S. and Europe.
Interlogix, a provider of security and life-safety solutions, introduced TruVision Navigator version 8.0. This latest release of the popular unified security software includes enhanced video streaming capabilities, integration with the Interlogix UltraSync Modular Hub systems and tighter integration with IFS networking switches. Interlogix is part of UTC Climate, Controls & Security, a unit of United Technologies Corp. The TruVision Navigator version 8.0 system is now a 64-bit application that supports a separate graphics processing unit (GPU) to provide smoother rendering of live and recorded video. The powerful updated software lets end users display more than 50 full-resolution mainstream video tiles. The embedded device manager setup tool enables TruVision Navigator 8.0 users to easily discover TruVision devicesIntegration with the UltraSync Modular Hub panels and Interlogix security sensors provide alarm notifications directly from intrusion system components to the user interface. The increased connectivity with IFS switches allows the system to remotely recycle specific ports to reboot connected cameras for troubleshooting. Better Performance And Additional Integrations “Users can now manage an entire family of connected Interlogix security platforms including TruVision video, TruPortal access control, UltraSync intrusion and IFS network switches,” said Edward Hamilton, video product management leader – Americas, Interlogix. “This software update provides greater performance and additional native integrations to meet a wider range of end-user security and performance needs.” The embedded device manager setup tool enables TruVision Navigator 8.0 users to easily discover TruVision recorders, cameras, TruPortal and UltraSync panels and IFS network switches when configuring the system. Once configured, each component’s icon can be dragged and dropped on a computer map interface to help users manage facilities at a glance. Users can also interact directly with different parts of the system, such as opening a door or accessing a camera by double-clicking on the icon. Insight Into Operations Pop-up live video on event monitor when triggered by an alarm eventThe IFS switches help users better manage their systems by providing additional insight into operations such as bandwidth usage of connected devices. The latest release also allows users to create their own device names for easier identification. The TruVision Navigator system builds upon its robust video application and with this release launches additional features such as: Pop-up live video on event monitor when triggered by an alarm event Built-in TruVision 360o camera de-warping Task scheduling and main video stream control that helps reduce bandwidth needs during peak network traffic periods Automatic health diagnostic service to maintain system uptime. “With its powerful new video streaming capabilities and added integrations, the TruVision Navigator 8.0 unified security solution is well-positioned to manage small- to mid-commercial applications such as warehouses, schools or multi-store franchises,” said Hamilton.
ievo Ltd, global provider of biometric fingerprint recognition products, announced that it received Lenel factory certification and joined the Lenel OpenAccess Alliance program. ievo biometric fingerprint recognition products can now interface with the OnGuard access control system, providing a streamlined approach to fingerprint enrollment. “ievo has completed required factory testing at Lenel to validate the functionality of its interface to the OnGuard system. Having this interface will provide our customers with a great biometric option to enhance their security,” said John Marchioli, OAAP product management, Lenel. “We look forward to their continued involvement in the Lenel OpenAccess Alliance Program.” ievo Biometric Fingerprint Recognition Solution ievo developed, designed and tested the specialized integrated fingerprint enrollment software in-house ievo developed, designed and tested the specialized integrated fingerprint enrollment software in-house, which was then certified by Lenel engineers, verifying that it interfaces with the OnGuard access control system. The fingerprint enrollment software connects to the Lenel server for user information, as well as the ievo Sync server for enhanced management of the control boards and distribution of the fingerprint templates. The interface also allows for easy enrollment of new templates, along with template management. With the increasing cost and complexity of managing security, the integration is a cost-effective method for systems migration and the protection of legacy investments. Not only is the interface efficient but it allows simultaneous fingerprint enrollment at multiple locations - providing directors and managers with the ability to remotely oversee the business. Should your company boast multiple premises, those templates will be securely stored on the ievo control board and can be accessed at each location. Biometric Fingerprint Access Control Systems The biometric fingerprint access control systems are a viable alternative to the more traditional cards and PINs systems, substantially reducing the risk of any security breaches. This announcement for ievo also marks another strong interface for the company, and a larger, worldwide presence in the security industry. Shaun Oakes, Managing Director of ievo Ltd says, “2018 has been a fantastic year for us at ievo as we expand our reach and make our products more accessible to the wider access control segment. The interface with the Lenel OnGuard access control system will enable an efficient and cost-saving system migration and further protection of legacy investments. The opportunity also helps to boost the presence of the ievo brand worldwide.”
Feenics Inc., a provider of the access control as a service (ACaaS) Keep by Feenics cloud-hosted platform, continues to expand its reach globally, adding an office and representative in Beirut, Lebanon. Nancy Abou Eid, who holds a Master’s Degree in Computer Science and a Bachelor’s Degree in Software Engineering will lead the new Middle East location in Beirut and target additional growing areas including Dubai and Abu Dhabi in the United Arab Emirates. Educating Resellers About Keep With the addition of this office, Feenics now has an established presence in North America, Latin America and the Middle EastAbou Eid was one of the first employees of Feenics and an architect of the original Keep by Feenics solution. Her focus will be on educating value-added resellers, consultants and users on the advantages of the scalability, flexibility and advanced security available in the cloud-based ACaaS solution. With the addition of this office, Feenics now has an established presence in North America, Latin America and the Middle East. “I’m excited to be an integral part of the Feenics team again,” Abou Eid said. “The Keep solution has progressed dramatically since the company’s start up in 2010, as has acceptance of the cloud for safe and secure access control management. It’s where the future is going and the Middle East region is receptive and open to the advantages of cloud computing.” As the cloud has become a more comfortable environment for North American users and with many of those customers managing global locations, Feenics can now more fully support additional customers in the Middle East. Expanding Footprint To Support Customers Abou Eid will handle sales and regional technical support for Feenics from the Beirut office“We have many global customers and that requires us to expand our footprint,” said Sam Shalaby, Chief Executive Officer of Feenics. “Nancy hit the ground running and she’s out to make things happen. She was one of our engineers and we had kept the lines of communication open, so when the opportunity presented itself, she was perfect for the role. “Being successful is about having the right people so you can expand properly. It was an easy transition and opportunity for us to open an office in the Middle East. The location will be a natural extension of our efforts in our home office.” Abou Eid will handle sales and regional technical support for Feenics from the Beirut office, which is also staffed with two technicians and a software engineer. Low Cost Advanced Security Solution Keep V3 provides extreme scalability, unprecedented flexibility and advanced security in a cloud-based ACaaS solutionFeenics most recently was recognized with two prestigious security industry awards for innovation: 2017 Security Industry Association New Product of the Year and 2017 Most Valuable Product from Security Sales and Integration magazine, both for the latest Keep by Feenics Enterprise V3. Keep V3 provides extreme scalability, unprecedented flexibility and advanced security in a cloud-based ACaaS solution. It integrates native visitor management and a RESTful API that allows systems installers simple integration of a wide array of complementary systems and open hardware devices, generating new revenue streams while creating a path for customers to lower their total cost of system ownership. Keep by Feenics gives users the choice of on-site servers or offsite cloud deployment, hosted by the public cloud Amazon Web Services. Keep significantly minimizes costs through simple, maintenance-free and automatic upgrades, patches, disaster recovery and back up.
Altronix announced it has added SALTO Systems to its expanding portfolio of Trove Access and Power Integration Solutions, which simplify access system design, configuration and installation, greatly reducing time and labor. The new Trove1SA1 from Altronix seamlessly accommodates SALTO access controllers providing a highly-efficient and scalable access solution. Direct Control Of Access Controllers “Our collaboration with SALTO Systems provides integrators with even more versatility,” said Alan Forman, President, Altronix Corporation. “Trove facilitates flexible access control configurations, which are ultimately more profitable for systems integrators and more cost-efficient for their customers.” We’re excited to announce SALTO Systems’ controllers are compatible with Altronix Trove access and power integration solutions" The Trove1SA1 accommodates up to 4 SALTO XS4 CU42E0, CU4200 and/or CU4EB8 controllers for direct control of up to 8 wired doors and/or 65,000 electronic locks. In addition to providing added design and configuration versatility, Trove1SA1 includes a removable backplane that allows systems integrators to test and configure SALTO access and Altronix power solutions prior to on-site installation. Trove1SA1 includes a tamper switch, mounting hardware and cam lock, along with ample room for wiring to accommodate backup batteries. SALTO-Altronix Integration We’re excited to announce SALTO Systems’ controllers are compatible with Altronix Trove access and power integration solutions,” said Bill Wood, President of SALTO Systems North America. “This partnership provides installers with a highly efficient access control configuration and installation solution.” SALTO Systems is a globally renowned developer and manufacturer of electronic locking and access control solutions. Its hardware and software technologies are in use in more than 15,000 installations worldwide with an estimated 20 million daily users.
Aiphone has announced significant improvements to its full IP IX intercom and security solution. The new and upgraded features built into the new IX2 series include improved audio and camera functionality, large touch screen monitors and communication with up to 9,999 door stations. IX2 IP Intercom And Security Solution “With no server or license fees, the IX2 system offers highly affordable P2P full IP video entry security, internal communication and multicast paging,” said Wyatt Taylor, Managing Director of Aiphone UK Ltd. “Utilizing its ability to connect directly to a network, all these functions can be implemented between remote locations over large areas.” “However, what elevates IX2 above other traditional and IP intercom systems currently available for large scale installations, is the ease at which it can be integrated with third-party systems. As a result, we are able to provide a totally integrated intercom and security solution, including access control, IP network cameras and video management software (VMS), such as Avigilon, ExacqVision and Milestone, as well as Lenel Onguard access control management software out of the box and without the need to buy any licenses.” Scalable Solution Offering Video Entry Security IX2 has the capacity to provide communication with a practically infinite number of intercom stations IX2 has the capacity to provide communication with a practically infinite number of intercom stations. Video entry security, internal communication, emergency stations and multicast paging are all able to be implemented between remote locations over large areas and distances, making the IX2 system an ideal solution for education campuses, as well as any other type of application involving multiple locations such as airports, railway stations and parking facilities. Key features of IX2 include: No wiring-distance limitations: LAN and VPN connections enable implementation over extensive areas and between remote locations. Peer-to-peer configuration results in space savings, reduced installation time and lower cost. Simply connect the units to Power over Ethernet (PoE) switches. No need for a dedicated server, with the additional benefit of eliminating the risk of system downtime due to server malfunction. 7-inch handset with a touchscreen which can be used in domestic and commercial environments. Hands free touch screen monitors. Picture in picture video can show the door station camera and an overhead camera simultaneously. Video intercom between master monitors. Newly designed IX panels which comply with DDA regulations, e.g. offer clear visual guidance and a blue halo button. Audio and video SIP Integration with Cisco IP phone systems. ONVIF compatibility provides the option for images captured by call panel cameras to be integrated with a video surveillance system. SD card slots on panels and monitors enable video and audio data to be recorded and backed-up. Call log facility on each handset provides data trails. IX2 is also equipped with some advanced functionality rarely found in other IP Intercom POE systems. These include: Call Queuing Up to 20 calls can be queued and prioritised on an IX-MV7 master station When multiple calls are made to the same monitor station, the IX2 system places the calls in a queue which is displayed on the LCD screen. On the calling end, users are given notification that their calls are in the queue. Up to 20 calls can be queued and prioritized on an IX-MV7 master station. The importance of each call, e.g. normal, priority or urgent, can be indicated by the display of respective red, amber or green colors on the master station. Higher priority calls are moved automatically to the top of the list. Call Transfers Calls and conversations within the IX2 system can be transferred to up to 10 other IX-MV7 monitor stations. The transfers can be done manually or through a variety of system settings. With Delay Transfer, for example, the system automatically transfers calls which are not answered within a pre-set time. An Absent Transfer feature immediately calls another IX-MV7 master station when someone is away from their desk, while Scheduled Transfer automatically transfers calls to another IX-MV7 master station during pre-determined times, e.g. out of hours.
In today’s market, efficient use of bandwidth and storage is an essential part of maintaining an effective video surveillance system. A video management system’s ability to provide analysis, real time event notifications and crucial image detail is only as a good as the speed and bandwidth of a surveillance network. In the physical security industry, H.264 is the video compression format used by most companies. Some companies also employ H.264 enhancements to compress areas of an image that are irrelevant to the user at a higher ratio within a video stream in order to preserve image quality for more important details like faces, license plates or buildings. The H.265, H.264’s successor, will be increasingly used for compression in the future. Some companies are already using H.265 in their cameras and video management systems, while a host of other manufacturers are certainly preparing for its broader adoption in the years to come. Video Compression Technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies. In some cases, H.265 can double the data compression ratio of H.264, while retaining the same quality. Increased compression rate translates into decreased storage requirements on hard drives, less bandwidth usage and fewer switches – all of which reduce overall costs of system ownership. H.265 compression delivers a lower bitrate than H.264, which is relevant to end users and integrators because the lower bitrate reduces strain on hardware and can reduce playback issues. It’s very important that the compression format that is used is supported in all of the different components of a system: cameras, desktop computers on which the VMS is running and the VMS itself. It is also good for end users and integrators to understand the basics of video compression. Having a basic understanding of compression allows users to tweak settings to reduce bandwidth usage even more. Many cameras come with default settings that can be changed to ultimately reduce costs. ONVIF Physical Security In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 but is not directly involved in developing the compression standards themselves. With Profile T, the new ONVIF video profile released will employ a new media service that is compression agnostic. This means that it can support new video compression formats, including H.265, as well as new audio compression formats, with the ability to include new video and audio codecs as needed in the future without having to redesign its media service. In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 Standardization organizations that are directly addressing new compression standards include the International Telecommunication Union (ITU), the Moving Picture Experts Group (MPEG) and a joint commission of the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), which is addressing the coding of audio, picture, multimedia and hypermedia information. Other compression formats on par with H.264 and H.265 are being developed by companies such as Google. H.265 Compression Formats Using products that employ H.265 compression will reduce costs through bandwidth reduction, as will changing default settings on cameras, which are often conservative. Having a basic understanding of compression formats and how to tweak camera factory default settings also gives integrators the ability to further reduce bandwidth for added costs savings and increased system performance. These enhancements will analyse which parts of an image are most important and adjust local levels of compressions accordingly It is also worth noting that H.265 enhancements will likely be developed by camera manufacturers to further reduce bandwidth, as was the case with H.264. These enhancements will analyze which parts of an image are most important and adjust local levels of compressions accordingly. While H.265 itself is ready for prime time, its value as a tool for IP-based surveillance systems is dependent on support for the codec in all parts of the system – the VMS, server hardware, graphics cards and camera. Though widespread H.265 adoption is predicted, providers of these components are jumping on the H.265 bandwagon at different rates of speed. ONVIF is including support for H.265 in its new video profile, Profile T, because it believes it will become the most widely used compression format and ONVIF recognizes the need to anticipate that migration as a future need of the industry. The new media service, which will be implemented with Profile T, will be future-proof in that when new compression formats are released in the future, ONVIF can adopt them very quickly. That flexibility will definitely help integrators.
Facial recognition has a long history dating back to the 1800s. To track down criminals, such as infamous bandits Jesse Woodson James and Billy the Kid, law enforcement would place “Wanted Alive or Dead” posters advertising bounties and soliciting public cooperation to help locate and even apprehend the alleged criminals. In addition to the bounty, these posters would include a photo and brief description of the crime, which would then be circulated to law enforcement agencies around the country and displayed in every US Post Office to speed up apprehension. Facial Recognition Advancements in artificial intelligence and biometric technology have led to the widespread use of computerised facial recognitionToday, technology such as social media, television and other more specialized communication networks play a more influential role in the recognition process. Advancements in artificial intelligence and biometric technology, including the development of Machine Learning capabilities, have led to increased accuracy, accessibility and the widespread use of computerized facial recognition. The significance of this means that facial recognition can occur on an even larger scale and in more challenging environments. This article will explore key milestones and technological advances that have resulted in the modern incarnation of facial recognition, before discussing the capabilities of cutting-edge “one-to-many” technology which is increasingly being used by counter-terror defense, police and security forces around the world. Technology Inception And Developments The technology was able to match 40 faces an hour, which was considered very impressive at the time The 1960s marked the start of computerized facial recognition, when Woodrow Wilson (Woody) Bledsoe developed a way to classify faces using gridlines. Bledsoe’s facial recognition still required a large amount of human involvement because a person had to extract the co-ordinates of the face’s features from a photograph and enter this information into a computer. The technology was able to match 40 faces an hour (each face took approximately 90 seconds to be matched) which was considered very impressive at the time. By the end of the 1960s, facial recognition had seen further development at the Stanford Research Institute where the technology proved to outperform humans in terms of accuracy of recognition (humans are notoriously bad at recognizing people they don’t know). By the end of the century, the leading player in the field was a solution that came out of the University of Bochum in Germany – and the accuracy of this technology was such that it was even sold on to bank and airport customers. From this stage on, the facial recognition market began to blossom, with error rates of automatic facial recognition systems decreasing by a factor of 272 from 1993 to 2010 according to US Government-sponsored evaluations. The aim for facial technology is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware Modern Usage Of Facial Recognition Fast-forward to the modern day and facial recognition has become a familiar technology when using applications such as the iPhone X’s Face ID capability or MasterCard Identity Check, passport e-gates at airports and other security and access control points. These solutions implement a consensual form of identity verification, as the user has a vested interest in being identified. This is a “one-to-one” facial recognition event, one person in front of the camera being compared to one identity either on a passport or the app. In these scenarios, the hardware is specifically developed for the application at hand, therefore technically much easier to accomplish. Facial recognition can now be used in a variety of governmental and commercial environments The safety and security world brings a much more complex problem to solve – how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve. It’s even more challenging when the aim is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware. And unlike in the 1960’s where identifying a face every 90 seconds was acceptable; the safety and security market requires near instant feedback on who a person matched against a watchlist is. Security And Safety Applications The idea behind all facial recognition technologies is broadly the same: you start with an image of a person’s face (ideally a high quality one, although machine learning means that to a point we can now even use video without reducing accuracy). A fully front facing image is best, think a passport photo, but machine learning and new software has made this more flexible. An algorithm converts this image into a numeric template, which cannot be converted back to an image and so represents a secure one way system. Every numeric template is different, even if it started out as an image of the same person, although templates from the same person are more similar than templates from different people. The accuracy of facial recognition continues to increase alongside deployments in more challenging and complex environments What happens next sounds simple although the technology is extremely complex: templates of people’s faces are taken in real time and compared to those in the database. The technology identifies individuals by matching the numeric template of their face with all the templates saved in a database in a matter of seconds or milliseconds. To put this into perspective, imagine you are at the turnstiles of a busy train station looking for a person on the run. Today’s facial recognition technology would be able to identify that person should they pass in view of a CCTV camera, as well as notify the police of any additional persons of interest, whether they are a known terrorist or missing vulnerable person on an entirely separate watch list. Because of technical progression, facial recognition can now be used in a variety of governmental and commercial environments, from identifying barred hooligans attempting entry at a football stadium or helping self-excluded gamblers at casino to overcome addiction. Real-Time Assessments The latest evolution of facial recognition pits the technology against an even more challenging application – directly matching individuals from body worn cameras for real time recognition for police officers on the beat. This capability equips first responders with the ability to detect a person from a photo and verify their identity with assurance. The broader implication for this means that every interaction, such as stop and search or arrest, can be supported by real-time facial recognition which will see cases of mistaken identity driven down on the streets. First responders can now for the first time be deployed and furnished with the ability to identify wider groups of people of interest with a degree of accuracy that previously relied only on the fallible human memory. As the accuracy of the technology continues to increase alongside deployments in more challenging and complex environments, its ability to support government initiatives and law enforcement means the debate about the lawful and appropriate use of facial recognition must be addressed. Facial recognition should not be everywhere looking for everyone, but when used properly it has the potential to improve public safety and we should make the most of its potential.
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now. Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier Customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High Gross Profit Margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier To Provide Managed Services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running.Cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively Fix Problems Before They Occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased Valuation Of Business Companies that utilize cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new with ACRE? Grillo: We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player" ACRE is a company I founded in 2012, and since then we have had six acquisitions and one divestiture. We’ll never focus on ACRE as a brand, but we currently have more visibility of ACRE as a parent company with our two strong brands, ComNet and Vanderbilt. Last year was a very busy year [with the sale of Mercury Security to HID Global] because it takes as long to sell a brand as to buy one, maybe more so. Q: What’s next? Grillo: What you are seeing from us this year is that we are again in a buying mode. No announcement yet, but we expect one by the end of the year. We are well-funded, have great partners, and see an opportunity to continue to grow acquisitively as our highly fragmented space of access control continues to consolidate. From the standpoint of ACRE, with the ComNet and Vanderbilt brands, we are also doing more integration on the backside – not what the customer sees. We will continue to grow toward a $200 million business. We were there when we owned Mercury, and we will get there again. We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player. Because ACRE are owned by a private equity company, we are brought into every opportunity: ComNet is a good example" Q: Do you see the M&A market being more competitive – more companies looking to acquire? Grillo: There’s a lot of money chasing not-so-many deals, so evaluations can get expanded. But as interest rates creep up, it is definitely a challenge to find the right valuation, the right financing and the right strategic fit. It is a very strategic market. Q: There have been some big acquisitions lately. Were you guys involved at all in evaluating those opportunities? Grillo: Because we are owned by a private equity company, we are brought into every opportunity. An example of that was ComNet. I would not have been aware that the founder passed away two years ago and that there was this opportunity to own the business. So we look at everything; anything that’s out there we look at. The biggest recent announcement in our world was S2 (being sold to UTC/Lenel), and, yeah, we looked at that. It didn’t fit our profile – it was too expensive. Great business, and it’ll be interesting to see how it fits into the UTC environment. There was also Isonas [which was recently sold to Allegion], but the size didn’t add enough scale, but I like the technology. ComNet sells communication networking solutions and products, which is more attractive than video systems for ACRE Q: So what are you looking for in an acquisition? Grillo: It’s hard for us to find something that moves the needle, and you have to find that right balance. Is it something we can digest and have the financing for, and also is there room on the back end? We are private equity-owned, so we know there will be an exit for our investors, too. So we have to find the right balance, good valuations, the right size and digestible. If you look at our acquisitions, we have done two “carve outs.” The Vanderbilt name didn’t exist until we bought the business from Ingersoll Rand, and then we bought the [intruder] business from Siemens. That’s how Vanderbilt came about. You get a lot of value when you carve out a business, but there’s a lot of work. In the case of Mercury or Access Control Technology (ACT) that we acquired; they were growing and profitable but they stretch your finances a lot more. So you have to find the right mix in there. Q: Does video interest ACRE at all? Grillo: We have to find the right balance, good valuations, the right size and digestible"ComNet is our video play. ComNet sells communication networking solutions and products, and 70 to 80 percent of that is used for video systems. But unlike cameras, which don’t interest us, it’s actually good margins, highly specialized repeat business and with good channel partners. So where are we going to play? Cameras – no (because of commoditization). We have some recorder technology (from the Siemens acquisition) and we have the communication networking technology (with ComNet). On the software side, we have looked at a lot of the VMS companies, and a lot of them have been on the market. But the valuation expectations can be high because they are software companies. And we really believe in partnering as a good thing, too. If we integrate to Milestone or Salient or some of these companies, we will never lose an access control client because they chose a particular VMS. Q: ACRE is also looking to grow organically, isn’t it? Grillo: From a technology perspective, we are a product company and we are continuing to bring new products to the market with the ComNet communication networking business and the access control business. And in Europe, we have a third leg of the stool, which is the very successful intrusion and burgular alarm business we acquired from Siemens (SPC products now sold under the Vanderbilt brand). That business continues to do well and is now one of the highest performing segments in our portfolio.The intrusion and burgular alarm continues to do well and is now one of the highest performing segments in our portfolio" Q: But you don’t have to own a company to make it part of your solution. Grillo: An important word is integration. We have to integrate to all the wireless locks. We have to integrate to the VMS systems. But we don’t have to own them. Q: How has the Mercury Security divestiture impacted the rest of your business? Grillo: It has opened up the opportunity for us to look at Mercury partners as possible acquisition targets without worrying about conflicts with the very good business of Mercury. We have more flexibility now compared to the Mercury era. Q: How will the economic cycle impact the security market? Grillo: Interest rates are a much bigger issue than the overall economic cycle. We talk a lot about it with our owners – clearly interest rates are tightening up. If you go out to do acquisitions or to borrow money to do something with your business, it will be tougher than it was two years ago, and it may get worse in the next two years. Security is less impacted by the economic cycle than some industries.
ISC East is making a name for itself as a must-attend regional conference and trade show in New York City that brings together the large community of law enforcement and private sector security professionals from the Tri-State area. ISC East, being held Nov. 14-15 at New York’s Javits Center, is emerging from the long shadow of its sister show – ISC West in Las Vegas in the spring – and making its own mark on the industry. ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300. Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar, Bosch Security Systems, and Seagate Technology. In all, there are 115 new exhibitors compared to 2017.Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar and Bosch Security Systems “We purposefully make sure we reflect the region we are in,” says Will Wise, Group Vice President, Security Portfolio, Reed Exhibitions. “It’s not a mistake that both our keynote speakers have New York-centric backgrounds and have topics to reach a larger market. We want to tap into the strengths of the region.” ISC East (International Security Conference & Exposition) has come a long way in the last five years. In 2014, the show was a mere 28,000 square feet, and this year it has grown to 44,000 square feet of exhibit space. One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA). The two-day event is characterized by “good energy” on both days, says Wise. There is less than 10% duplication of attendance with ISC West. Liability Issues Of Event Security A big topic for New York and surrounding areas is event security, and one session covers “Confined Space Protection & Risk Mitigation for Today’s Industry Leaders.” The session will focus on safeguarding event organizers’ brands, protecting them from liability, and balancing the need for security that doesn’t negatively impact the “guest experience.” One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA) Liability issues of event security are especially timely now, given MGM Resorts' recent lawsuit asking the courts to protect it from legal liability in the wake of the Las Vegas massacre last October. “Event security is integration of physical security with smart technology and not being overzealous,” says James DeMeo, Founder, President and CEO of Unified Sports & Entertainment Security Consulting LLC. DeMeo’s presentation on event security is one of the “back by popular demand” sessions at ISC East – there was a big turnout for his previous sessions at last year’s ISC East and at ISC West. “A big part of event security is integrating technology, but we also need the human element,” says DeMeo. “Good guest security and harmonious relationships require a level of training that includes escalation, behavioral analysis, and communicating more harmoniously.” ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300 Holistic Approach And Technology Integrations From the session, DeMeo hopes attendees will take away awareness of the need for responsible social media monitoring, integration of technology, threat behavior analysis and early attack indicators, proactive risk mitigation, and staff training. The emphasis is on a holistic approach “from the top down and the bottom up,” says DeMeo. “It’s a sophisticated niche based on potential liability, and we must do everything possible to protect fans and patrons.” Crowd security is another ISC East topic that is tailor-made to the New York location of the show Crowd security is another ISC East topic that is tailor-made to the New York location of the show. A session on installation of safety and security barriers to protect pedestrians and crowds is another session that is “back by popular demand.” Rob Reiter, co-founder of the Storefront Safety Council, will present the session on protecting urban environments. Another return session is about drone security and regulations. It will provide an overview of current policy and regulatory framework and provide understanding of how to get involved in the discussion to enable drone use in security applications. Converged Security And Smart Cities A new session at ISC East this year will be “Smart Cities, Smart Buildings and the Evolution of the Converged Security Approach.” Pierre Bourgeix, president of ESI Convergent, will help attendees understand converged security and how it relates to the smart cities and smart buildings movement. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems SIA and ASIS International will present findings from a study on how successful individuals can gain experience and skills they need to advance their security careers. Co-locating with ISC East will be the Unmanned Security Expo, which focuses on Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions and software applications to support them. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems. Also co-locating with ISC East will be Infosecurity North America, which includes a conference program with well-respected industry speakers, an expo floor and networking opportunities.
Security and Safety Things GmbH (SAST) is a new company that has announced its vision for an Internet of Things (IoT) platform for the next generation of security cameras. The Bosch startup plans to build a global ecosystem for the development of innovative security camera applications. Based on the Android Open Source Project (AOSP), SAST provides libraries, an API framework, and codecs for developers to work with. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications. We presented some questions to Nikolas Mangold-Takao, VP Product Management and Marketing, about the new venture, and here are his responses: Q: Why a new company now? What technology innovations have made this a good time to launch this company? The time is right to bring market needs and technological innovations together on one platform"Mangold-Takao: From a technical perspective we see two main drivers: increasing computing power at the edge and increasing internet connectivity, which will enable devices to directly communicate with each other and bring new technologies such as artificial intelligence also to the security and safety industry. At the same time, we see that this industry and its users are hungry for more innovative solutions – addressing new security needs while at the same leveraging the possibility to improve business operations for specific verticals, e.g. retail and transportation. The time is right to bring market needs and technological innovations together on one platform for this industry. Q: Why does SAST need to be a separate entity from Bosch? Mangold-Takao: SAST is setup as a wholly owned subsidiary of the Bosch Group. We wanted to make sure that SAST is able to underline its role as an industry standard platform across multiple players. SAST is open to get additional investors and is being setup as a startup in its own offices in Munich to foster the environment where speed and innovation can more easily take place. Having said that, several entities of the Bosch Group are very interesting partners for SAST. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications Q: Please explain your "value proposition" to the industry. Mangold-Takao: We will bring new innovations and possibilities to the security and safety industry by providing an open, secure and standardized Operating System for video security cameras, to also address pressing issues such as cyber security and data privacy concerns. Devices that run then with the SAST operating system will work with an application marketplace provided and operated by SAST. Integrators and users can then use these apps from this marketplace to deploy additional functionality on these devices. With our platform we will be able to build up a community of app developers, including the ones not yet developing for this industry who have expertise in computer vision and artificial intelligence. Q: It seems what you are doing has parallels with the Apple and Android "app" stores. How is your approach the same (and how is it different) than those approaches? We are setting up SAST as a user-centric company and involve selected users very early on in the process"Mangold-Takao: The approach is similar in the way that we plan to generate revenue by operating the application marketplace and thus participate in the app revenue. The difference is that there is much more needed than apps and cameras to create a complete working solution addressing a user problem in this industry – we need to make sure that our own platform as well as the new applications being created will work as a part of an end-to-end solution. Q: "Critical mass" and wide industry participation seem to be requirements for your success. How will you achieve those goals? Will you involve integrators, consultants, or other parties in addition to manufacturers (to drive awareness)? How? Mangold-Takao: SAST is in close exchange with device manufacturers, integrators and consultants, as well as application developers and large end-users at the moment to ensure that we are building the right platform and ecosystem for this industry. We are setting up SAST as a user-centric company and involve selected users very early on in the process. We will run dedicated programs and hackathons to attract app developers, already active and new to our industry. We will also run selected pilots with end-users throughout 2019 to ensure we have all partners involved early on. SAST sees the industry is hungry for more innovative solutions – with the retail vertical market a target for these solutions Q: What timeline do you foresee in terms of implementing these initiatives? Mangold-Takao: While we start with first app development programs and plan our first pilots already for this year, we are planning our commercial launch for end of 2019. Q: How does your new company relate to the new Open Security & Safety Alliance (OSSA)? Mangold-Takao: The Open Security and Safety Alliance has been working very closely with SAST over the past year, defining some important concepts and elements required. One of the most important elements is an open and standardized Operating System, specific to this industry, which will then bring forward new innovative technologies and solutions. SAST is actively working on this Operating System, based on Android Open Source Project (ASOP), but is evolved and hardened with industry-specific features. Q: What's the biggest thing you want the security industry to understand about SAST? What is your "message" to the industry? Mangold-Takao: Our message is simple: let’s build better security and safety systems – together! But for real, innovating an industry is a joint effort, we can only bring new innovation to this industry with partners who share our vision and are excited about new technology. At the same time, we strongly believe that our platform allows every partner to bring forward what they do best but also invite new partners to our industry.
Globally-renowned Pay on Foot parking systems manufacturer, DESIGNA, has worked with the White Rose shopping center in Rhyl, North Wales, to update its car parking system to the company’s advanced ABACUS software and equipment. Contactless Card Payment The installation included new state-of-the-art entrance and exit terminals accepting tap in/tap out contactless card payment technology After many successful installations abroad, the shopping center is the first DESIGNA site in the UK to have installed its new tap in/tap out contactless credit card technology. The installation included new state-of-the-art entrance and exit terminals accepting tap in/tap out contactless card payment technology. There are also three full pay stations, a DBS server, manual pay station and intercom. All of this helps to improve the efficiency and security of the car park, which is popular with shoppers due to its seafront location. As the first part of the shopping experience, the convenience and availability of a car park is crucial to the overall service and satisfaction of a customer. DESIGNA recognized this and developed ABACUS, an advanced car park access system that intelligently integrates various elements to create the ultimate system that is highly reliable and requires less maintenance. It can also cope with large volumes of traffic while providing the highest level of monitoring to ensure a secure parking environment. ABACUS Car Park Access System The parking system is barrier controlled and makes use of DESIGNA barcode ticket technology. In addition to the standard ticket technology, the car park offers the facility to tap in/tap out using a contactless credit card. This operates with a unique identifier from the credit/debit card as a substitute for a ticket for the duration of the stay at the car park. When the customer presents a contactless card on entry, it recognizes them and by tapping again at the exit it automatically calculates the tariff and allows payment to take place at the exit. The system has three pay on foot machines which accept coins, notes and credit cards. With more than 30 stores, White Rose shopping center, Rhyl’s number one shopping destination, has a wide range of quality stores. Located in the center of the town, White Rose is a short walk from Rhyl’s seafront, railway station and sea aquarium, and has direct access car parking for 300 vehicles. The center previously had a chip coin solution installed on site. Advanced Ticket Machines The biggest advantage of having the DESIGNA system in place is the easy payment method" Sue Nash, Center Manager at the White Rose commented, “The biggest advantage of having the DESIGNA system in place is the easy payment method. The advanced ticket machines make it possible to pay using several means, therefore reducing the problem of queuing at the pay machines and having to pay with change. Another payment option we now have is the facility to pay through mobile devices and via contactless cards.” She continued, “The majority of people move around with credit cards rather than cash and having a versatile payment option in the car park makes for a painless process. The maintenance of the system at our local level was extremely important to avoid costly and timely engineer callouts. Simple things like ticket and coin jams, system resets are now extremely easy to resolve as is the exchange of entry tickets when required. I would certainly recommend the DESIGNA system to others and we are extremely pleased with the results.” Car Parking Ease And Convenience Specifier Andrew Bailey, of Parking Ideas, commented, “Parking Ideas is a complete car parking and transportation consultancy that helps institutions, property owners, landlords and managing agents develop and optimize their assets. I have worked with the White Rose shopping center for a number of years and following a competitive tender found that DESIGNA’s systems best suited the client’s requirements.” He continued, “The ABACUS system is good value, commercially viable and ticked all the right boxes for the White Rose. It is very important to have the facility to pay by card, so the payment terminals having this feature are vital to the center and have made all the difference to the running of the car park. Parking Ideas has been in the parking industry for more than 15 years, so we have worked with DESIGNA before and are very happy with the end result.” DESIGNA Ticket Terminals The car park’s entrance and exit are installed with DESIGNA In+ and Out+ ticket terminals so that using the site is fast and easy The car park’s entrance and exit are installed with DESIGNA In+ and Out+ ticket terminals so that using the site is fast and easy. The advanced terminals operate on the lowest energy consumption of their class with the ability to hold more tickets than before, with the bin adapting itself to the fill quantity. Customers are greeted with excellent user-friendliness due to the simplicity of the equipment and illuminated display with clear instructions. The four-way barcode readers also ensure visitors can insert their ticket any way round into any of the pay stations around the site. DESIGNA Pay On Foot Machines For payment, three of DESIGNA’s new Pay on Foot machines are in place in the car park. This allows customers to pay for their visit before returning to their car and exit the car park more quickly. The pay station is deliberately designed to allow disabled customers to pay freely without assistance. Each of the pay stations is installed with an interactive monitor that makes it easy to pay and offers several different languages. Shopping center management has full control of the ABACUS system through the DBS server, with a manual pay station (MPS) to allow them to create or override payments. The control room also links with the ticket and payment terminals via a DESIGNA VoIP Intercom to assist customers if required. Global Implementation DESIGNA has more than 15,000 systems installed globally across a wide range of car park situations DESIGNA’s parking systems are used in a number of impressive shopping centers around the world. These include the Dundrum shopping center in Dublin, the Mid Valley Megamall in Malaysia and the Mall of Emirates in Dubai. In the UK the Belfry shopping center in Redhill, the Woolshops shopping center in Halifax and the Wellgate center in Dundee have also benefited from the ABACUS system. Recognized worldwide for its high quality and intelligent systems, DESIGNA has more than 15,000 systems installed globally across a wide range of car park situations, including shopping centers, airports and hospitals. ABACUS is one of the company’s innovations and demonstrates the endless possibilities available to car park operators. The future-proof technology allows for expansions of premises or new property acquisitions by allowing additional systems to be added to the network. In its many global applications, ABACUS has proved to be an effortless system for both operators and users and is a great investment for companies looking to the future.
ASSA ABLOY Access Control, a UK division of ASSA ABLOY, the provider of door opening solutions, has partnered with NetNodes to deliver assured and secure access to a huge new innovation center in London. Based at Queen Elizabeth Olympic Park, Plexal is a new £15 million project, acting as a base for an ‘innovation community’ that brings together startups, enterprises and academics all under one roof. Plexal sits within the larger Here East complex, which is transforming the former press and broadcast centers for the London 2012 Olympics Games into new spaces for technology companies, universities, startups and creatives. Aperio Technology Integrated With DoorFlow In total, 59 Aperio L100 wireless high-security door locks were installed across the siteThe innovation hub has been fitted with Aperio wireless, access card-based locking technology, which is fully integrated with DoorFlow, an online platform for managing and auditing building access created by NetNodes. In total, 59 Aperio L100 wireless high-security door locks were installed across the site. These lock solutions provide Plexal with the highest levels of physical protection and transmit comprehensive information on door status to DoorFlow in real time. A further 31 HiD R10 mobile access locks were also provided where wired solutions were necessary, such as for the main office entrances, and for elevators. For organizations looking to invest in a new access control system, Aperio is an effective, straightforward alternative to a wired, high-end solution. It was installed quickly and easily at the Plexal site without cabling, and will drastically reduce the innovation hub’s maintenance costs and energy consumption going forward. Cost-Effective Security Upgrade Aperio can upgrade existing mechanically locked doors and wirelessly connects them to new or existing access control systemsAperio can also upgrade existing mechanically locked doors and wirelessly connects them – online or offline – to new or existing access control systems. This can be achieved with minimal modification to doors and premises, offering a cost-effective and simple security upgrade. John Herbert, Facilities Manager at Plexal, said: “What really appealed to me about ASSA ABLOY Access Control’s products was the aesthetics. We have a futuristic-style open plan design here at Plexal – our offices are predominantly glass-fronted, so we needed an effective stylistic design which was not only robust but adaptable too. We foresee change in the not-too-distant future and are delighted at our options to modify.” Discreet And Adaptable Locking Solution Stewart Johnson, Director at NetNodes, explains: “Aperio offers a hardware solution that is well-suited to our online platform, DoorFlow. Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install Aperio with minimal disruption. We are delighted to partner with NetNodes to deliver an easily integrated access control system for this new innovation center in central London"“The open-plan layout of the space and the high glass doors installed throughout the site meant Plexal needed an access control solution that was discreet and adaptable, with Aperio perfectly meeting these demands. Should any additional doors need to be added to the system in the future, this can be done easily, without modifying or changing the aesthetics of the environment. This also minimizes future installation costs, offering a cost-effective and straight-forward access control upgrade.” Integrated Access Control System David Hodgkiss, National Sales Manager for ASSA ABLOY Access Control, adds: “We are delighted to partner with NetNodes to deliver an easily integrated access control system for this exciting new innovation center in central London. With up to 800 entrepreneurs using the space to devise, create and launch new products and services, Plexal required a solution that was tried and tested. Aperio enables easy access around the site while providing assured security. “Aperio is a fantastic hardware partner to door security software, such as NetNodes’ DoorFlow. It has been great to work with NetNodes on this project, and we expect to work together on many more successful installations in the future too.”
The Hong Kong-Zhuhai-Macao Bridge relies on customized security solutions from Bosch to ensure safe operations. The world’s largest sea-crossing bridge was opened by Chinese officials late October 2018. Spanning 55 kilometres in length, the Hong Kong-Zhuhai-Macao Bridge directly connects Hong Kong to Macao and then to the Chinese city of Zhuhai for the first time. At a total cost of USD 20 billion, it is a major boost for China’s Greater Bay Area, an emerging industrial and technological hotbed that is home to 68 million people and a showcase project for Bosch Building Technologies. Equipping Critical Infrastructures The large-scale project was built over the course of eight years using 400,000 tons of steel and includes underwater tunnels and two artificial islands that serve as customs ports. Ensuring the security of these two islands, where drivers need to present special permits to use the new bridge and pass customs checkpoints, was a priority from the start. Bosch Building Technologies won the contract to provide the artificial islands with video surveillance, intrusion alarms With a proven track record of equipping critical infrastructures such as airports, hotels, commercial buildings and underground metros, Bosch Building Technologies won the contract to provide the artificial islands with video surveillance, intrusion alarms, as well as public address and voice evacuation systems. On the island between Zhuhai and Macao, the Bosch partner Shanghai SAGA Electronic Technology Co., Ltd. installed more than 5,700 Bosch loudspeakers and over 260 amplifiers which are all managed via the PRAESIDEO Digital Public Address and Emergency Sound system. Custom-Ordering Solutions Fulfilling a key customer request, the installation incorporates 15 different models of ceiling, wall mount, and line array speakers to blend in with the facility’s modern interior. Furthermore, Bosch was able to match Macao’s local standards by custom-ordering solutions with British power cord, programmed with graphic interfaces in traditional Chinese lettering. On the island outside of Hong Kong, which is home to a customs clearance port, Bosch partner Pro-United Co., Ltd. installed 2,200 public address speakers of various models, including outdoor speakers for the travel inspection building. Experts also adjusted 200 vari-directional array loudspeakers to balance sound variations from different building materials. Live Voice Announcements “The Bosch technical team and partners used professional software to simulate the sound pressure level of a specific area and comprehensively simulate the entire project to ensure that the selected products can meet the requirements of different areas in the actual application,” said Lin Lizhi, Bosch Building Technologies. Bosch also covered the island with more than 2,000 HD cameras including the FLEXIDOME, DINION, and AUTODOME series. The PRAESIDEO systems on both islands enable security staff to broadcast live voice announcements via security call points Monitored from a security control center on the Hong Kong-side of the island, these cameras support 24/7 surveillance of the customs clearance port, travel inspection building, Immigration Department and Hong Kong Customs Office. The PRAESIDEO systems on both islands enable security staff to broadcast live voice announcements via security call points, while multiple sets of intrusion alarm systems protect personnel and property. Broad Customization Options “We added the supporting intelligent call station PRAESIDEO, which is usually used for airport projects, in order to ensure that the staff can directly perform voice broadcasts throughout the call station during operation, thus making the security management more convenient,” said Wang Yiping, Deputy General Manager of Shanghai SAGA Electronic Technology Co., Ltd. The high-profile infrastructure project highlights the flexibility and broad customization options offered by Bosch Building Technologies as a one-stop solutions provider. Now that it is fully operational, the Hong Kong-Zhuhai-Macao Bridge is already considered a key asset in the Greater Bay Area, also known as ‘China’s Silicon Valley’. The bridge reduces the travel time between Zhuhai and Hong Kong from four hours to a mere 30 minutes. It also creates a new gateway for travellers between vital transportation hubs such as Shenzhen and Hong Kong airports with the integrated Bosch security solutions ensuring a safe passage.
New security and surveillance upgrades have been announced at Manchester Arena, with the first phase expected to be complete by mid-autumn. The system upgrade includes the installation of next generation camera technology combined with cutting-edge access control and is set to be rolled out ahead of a number of high-profile events that are being staged at the arena this autumn. Following the installation of the latest state-of-the-art security cameras, developments include super high definition 4K resolution images and enhanced video analytics with appearance search, plus self-learning analytics with presence/absence detection and the ability to detect unusual motion events. Similar Effective Solutions Reflex systems was chosen by SMG Europe having looked at similar effective solutions designed and installed by them at the award-winning Leeds The new facilities will also see an improvement in data management and delivery, and form part of an expanding security network which enables remote monitoring off-site at venues across the UK. The large-scale upgrade will be implemented by South Yorkshire-based firm Reflex Systems, a security system installer whose previous projects include providing deployable security systems for the G8 Summit, as well as work at off-park venues at the Olympics, Wimbledon, and Wembley Stadium. Reflex Systems will be leading on the Manchester Arena upgrades. The specialist firm was chosen by SMG Europe having looked at similar effective solutions designed and installed by them at the award-winning Leeds first direct Arena and other large capacity public venues. Intelligent Video Stream Lee Sinnott, senior facilities manager at SMG Europe, said: “The scope of the project was to deliver a powerful scalable end-to-end surveillance solution over an IP network, employing the latest HD/4K cameras, video analytics at the edge and through an intelligent video stream data management system.” Results allow us to actively monitor & effectively manage large crowds in differing light conditions both in real time and forensically “The challenge to find the right surveillance system with state-of-the-art technology that operates in a harsh light environment was realised through a detailed study and product testing with temporary camera deployments during Arena events. The results allow us to actively monitor & effectively manage large crowds in differing light conditions both in real time and forensically, post event. Providing video evidence of the highest quality was an important deliverable on the project.” Public Venue Applications “The planned installation of an expanded access control solution with system integration into the CCTV was a key part of the project. The electronic access control system will now provide us with the capability to respond to national threat levels and dynamically deploy a range of security measures through a powerful user interface.” John Pye, managing director of Reflex Systems, said: “Some of the technology involved in the upgrades at Manchester Arena is very new in terms of its features, and is a convergence of security with IT and advanced management software.” “We have significant experience in the area of public venue applications, and through our expertise and technology partners we deliver solutions which allow venue owners, whatever scale, to provide safer and more secure environments for everyone.”
AxxonSoft technology speaks to product simplicity, ease-of-use and advanced functionality during the FIFA World Cup in Russia. Within the framework of preparation for the 2018 FIFA World Cup in Russia, AxxonSoft's tech support customized settings on more than 1,350 video channels at 3 stadiums and at a central monitoring station to meet the Ministry of Internal Affairs' needs through a centralized monitoring system. AxxonSoft, in collaboration with this global high caliber event, launched this state-of-the-art technology system within just 1 month, utilizing team members to rollout. Videos were streamed from stadiums and surrounding territories, fan zones, and other locations deemed critical from the point of security Situational Video Analytics AxxonSoft's Intellect software managed a total of 960 video surveillance channels at Samara Arena, Mordovia Arena, and RZD Arena — the latter of which was used as a training base for referees. 250 of those channels employed AxxonSoft's situational video analytics to monitor the stadiums, 41 license plate recognition channels to monitor vehicle traffic, and 9 facial recognition channels to monitor for individuals prohibited from accessing the stadiums. Video monitoring was also integrated with access control, fire and security alarm systems. The Ministry of Internal Affairs' central monitoring station, powered by AxxonSoft's Intellect PSIM platform, pooled over 390 video channels from all 11 World Cup host cities with video feeds displayed on an interactive map. Videos were streamed from stadiums and surrounding territories, fan zones, and other locations deemed critical from the point of security for participants and guests of the World Cup. Integrated Access Control Software The World Cup stadium security project included requests to integrate access control software, as well as develop a screen manager to adaptably manage camera layout and the video wall. These functions were successfully implemented at the World Cup stadiums and will be incorporated in Intellect 4.11.0. Over 9,000 Intellect-powered video surveillance cameras were used to monitor the security of over 2 million spectators The Intellect PSIM platform was employed in various areas of 10 out of the 12 stadiums where 49 World Cup matches were played. Over 9,000 Intellect-powered video surveillance cameras were used to monitor the security of over 2 million spectators who attended the games. AxxonSoft software was also widely used at training camps, fan zones, transportation infrastructure, and other sites where teams and fans arrived and moved around the country. Advanced Stadium Security Technology “The team at AxxonSoft were really excited to be part of a project of this caliber. We were able to demonstrate product simplicity, ease-of-use and advanced functionality through our stadium security technology. The FIFA World Cup was a great success in Russia and just proves how we can work together with top agencies and companies to provide a safe environment for all,” says Global Marketing Director for AxxonSoft, Colleen Glaeser. FIFA president Gianni Infantino called the 2018 World Cup the best in its history. In addition to commenting on match attendance and television viewership numbers, Infantino gave high praise to the quality of infrastructure and security.
An initial investment of $100 million launched the first American public university campus in Mexico: Arkansas State University Campus Queretaro (ASUCQ). Within five years of its 2017 opening, around 7,500 staff and students are expected to use the site, including campus accommodation for up to 1,500 students. To accompany such a high-profile development, the university needed security and access control systems with a trusted and proven track record protecting staff, students and other university assets. They sought a technology-based solution to reduce security risks across the campus, and specifically an access control system able to monitor multiple spaces and monitor all access points in real time. System software and hardware should make it fast and intuitive to generate or modify access rights for any campus user. A single solution needed to work across both common university facilities and separate areas with student accommodation. Monitoring Campus In Real Time With the SMARTair Wireless Online option, facilities managers monitor the campus in real time, with live updating of who enters where, and when ASUCQ turned to SMARTair to protect its investment and site users. So far, around 600 SMARTair battery-powered online escutcheons have been installed across campus. High traffic flows through many campus doors required robust access control devices. With the SMARTair Wireless Online option, facilities managers monitor the campus in real time, with live updating of who enters where, and when. Intuitive SMARTair software enables all day-to-day administration from a central control point. "SMARTair is a very secure access control system that is also very intuitive for user and access management,” says Jose Alfonso Suarez Torres, Operations Chief at ASUCQ. Future plans for ASUCQ envision a ‘university city’ with up to 20,000 students — all protected in real time with SMARTair access control. And because a SMARTair system is wireless, expanding and upgrading access control will never disrupt the daily work or campus life at this fast-growing university. SMARTair Mobile Solution Openow A single interaction with the SMARTair TS1000 software is all it takes to make a virtual key disappear automatically from a user’s Openow app The new SMARTair mobile solution, Openow also gives facility managers the option to send, revoke and amend the validity of users’ keys, wherever they (or the keyholder) may be — with no need for physical credentials like keys or smart-cards. Students and staff save time, with no access cards to collect or validate. Each user installs and validates their Openow app and collects keys virtually. Tap a SMARTair escutcheon with your phone... and the door unlocks, if you are authorized to enter. Administrators save time and resource at the end of a student or staff member’s time on campus. A single interaction with the SMARTair TS1000 software is all it takes to make a virtual key disappear automatically from a user’s Openow app. A simple, secure, modern solution to university access control.