Arteco Global starts a new chapter. The company – producer of Video Management Software and universally renown for its highly customizable offer – is now opening its first Latina American branch in Mexico and moves its borders to a constantly expanding market. After the exceptional growth in North America, with operation all over the US territory, Arteco is now aiming at strengthening its position in the second security market of the American continent – the first in Latin Ame...
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that it is partnering with Cylance, a business unit of BlackBerry, Limited, to bring AI-based antivirus protection to its appliances customers. Through this partnership, Genetec will offer additional cyber security protection to its Streamvault™ family of infrastructure solutions by including CylancePROTECT out-of-the-box at no additional cost to its customers...
Marking its European debut, Northrop Grumman Corporation’s Firebird product line will be showcased at the Royal International Air Tattoo at RAF Fairford, in the United Kingdom, July 19-21. The company is also announcing signed agreements with Tenax Aerospace and Grand Sky Development Company, LLC (‘Grand Sky’) for rights to purchase Firebird, the company’s new, optionally piloted intelligence, surveillance, and reconnaissance (ISR) aircraft system. Unmanned aerial vehic...
When it comes to security and to ensuring the integrity of gaming operations, today’s casino market is risk-averse. Regulations direct the required surveillance of table games and slot machines, while modern casinos are often sprawling complexes that have a variety of other risks to be addressed, too. We asked this week’s Expert Panel Roundtable: What are the challenges of the casino market relating to security and surveillance technology?
Whether it is video analytic platforms to monitor traffic patterns or cameras deployed to help law enforcement ensure public safety, many cities are looking at advancements in video technology. Upgrade costs and technology compatibility issues are often front-and-center when it comes to blending new technology with existing infrastructure. For example, if the city law enforcement officials want to improve video camera image quality, which can improve the evidentiary value of footage in prosecu...
After a period of rapid international expansion, the next step for Ajax Systems is to set deeper roots in each market and become more sustainable. The manufacturer of wireless security equipment will continue to extend the range of Ajax products and capabilities by responding to local requests. Smart home management options and automation scenarios will be a significant focus for the next year. Wireless security equipment The systems are resistant to false alarms, regularly update over the air...
LifeSafety Power Inc., Libertyville, Ill., announces deeper E4 and E8 enclosures are now ‘live’ across the product line, giving systems integrators and dealers more flexibility for their security and access control specifications. Growing connected system With this change, the interior depth of E4 and E8 enclosures increase from 4.5 to 6.5 inches—part of the company’s ongoing commitment to meeting installation needs in the field. With more interior space for batteries, wiring and equipment, security installers can comfortably keep pace with their growing connected system specifications. While the enclosures gain two inches of depth, width and length remain unchanged. The change applies to all E4 and E8 enclosures, including FlexPower® Unified Power and ProWire® Unified Power.
Trackforce announces the launch of its new Command Center, which removes the need for security companies to have onsite supervisors at each customer site. The Command Center achieves this with its ability to intuitively capture, process, and display essential information from the field required by supervisors to perform their duties on an easy to navigate screen, irrespective of their location. Security workforce management The Trackforce Command Center equips security supervisors stationed at a central location with the capability to remotely monitor and manage individual or multiple officers and various security situations. It also delivers a unified threat analysis across multiple sites. Security supervisors now have quicker access to existing security resources needed to manage a situation and improve response times. The Command Center also ensures that there is greater oversight and control over client sites. The Command Center is suited to security businesses with clients in various vertical market sectors As a component of the broader SaaS Trackforce security workforce management platform, the Command Center is suited to security businesses with clients in various vertical market sectors. It is scalable and will support the security company through all its growth stages without negatively impacting already tight profit margins. Customer service level The Command Center is provided with a full set of features to all security companies irrespective of size, and all users become fully operational within a few days of the Trackforce platform’s implementation and customization. “The Command Center changes the security environment from being reactive to pre-emptive, so, security teams don’t have to wait for something to happen and can make proactive decisions,” says Guirchaume Abitol, CEO and Founder of Trackforce. “It does away with disparate solutions that supervisors previously used to monitor and enhance their decision-making capabilities. This results in improved operational readiness and business efficiencies for security companies. Service standards are maintained, SLAs are met, and security companies are able to optimize the capabilities of their security supervisors. This is a win-win for security companies at a management level, supervisors at an operational level, and clients at the customer service level.” Real-Time monitoring Supervisors realize enhanced situational awareness through real-time monitoring of security officers With a responsive view of security officers and developing situations at every level, the Command Center empowers supervisors to go from a broad, regional display to site-level data. Management can also opt to zoom in and monitor individual personnel activity at any time and contact, assist, and communicate with even the most remote officers using push-to-talk and mass notification communication capabilities. Supervisors realize enhanced situational awareness through real-time monitoring of security officers. With enhanced command and control capabilities, an officer or developing situation can be tracked in no more than two clicks, on a single screen, with fewer actions than previously required. Privileged user capabilities The system has built-in security and privileged user capabilities controlling who has access to specific functionality, customer data, and officers on client sites. Supervisors have the ability to monitor and manage individual officers and teams of officers, individual sites, or a group of sites in a city, a state, across the country, or globally if needed. Over the past two decades, Trackforce has risen to become a recognized global market leader by improving security officer operations and productivity while reducing cost and risk via innovative mobile and desktop applications. The company implements solutions for clients such as Allied Universal, Whelan Security, SecurAmerica, Inter-Con Security Systems, SOS Security, G4S, and many others.
Napco Security Technologies, well-known for developing innovative technology and labor-saving solutions for security professionals, now offers dealers dramatically improved cellular transmission on all top radio brands, plus extra mounting flexibility, with its growing line of StarLink Omni Extended Range Exterior Cellular Antennas, each of which comes complete with premium low-loss cable and mounting hardware. The StarLink® SLE-ANTEX Series are marine-grade antennas, ideal for indoor or outdoor use, with Napco’s StarLink Cell &/or IP Communicator models, as well as universally-supporting most other popular radios, including Honeywell®, DSC®, DMP®, etc. Compact omnidirectional antennas All feature easy no-aim professional design, compact omnidirectional antennas, with long-life UV-stable polyurethane conical shape and physically resonant design; average gain of 4-9dBi and outstanding low VSWR, for maximum radiated power and maximum cellular signal range -ideal in difficult coverage areas throughout the country. Universal all-inclusive StarLink Omni Antennas include various brand-compatible-connectors, an L-bracket with stainless steel U-bolts for pole or wall mounting, and a ground fault isolation plate for fire applications. By popular demand, there are now 4 models available, differing only with choice of 4 premium low-loss cable lengths (supplied), 30’, 50’, 75’ or 100’, respectively. While they can be used to increase signal strength in all applications and cellular technologies: LTE, 4G, 3G, CLR, PCS, DCS, AWS, IMT, ISM, WCDMA, cellular, WiFi and WiMax; with LTE performance in particular, they’ve proven to have excellent field-performance at 700 MHz. Universal StarLink Omni SLE-ANTEX Series Extended Range Antennas are available at the Napco distributor.
Johnson Controls is introducing the integration of the Tyco Kantech EntraPass go Mobile App with the Tyco American Dynamics VideoEdge software, enabling remote management of access control, video and intrusion tasks for seamless, on-the-go security system operation from a mobile device. The American Dynamics VideoEdge integration with the EntraPass go Mobile App provides a single easy use interface for managing, responding and controlling aspects of your Video Management System infrastructure through the use of the EntraPass go Mobile App. Video management solutions Video management capabilities include the ability to view live video with PTZ control, video playback with manual search and the ability to view video linked to access and/or intrusion events. With the EntraPass go Mobile App, users can manage and create cards, lock and unlock doors, view live video, arm and disarm intrusion partitions and request reports. This free app enables you to interact with your EntraPass security management system software from anywhere, without being tied to the EntraPass workstation. The VideoEdge platform improves the efficiency of security personnel and daily business operations by creating powerful video management solutions allowing users to leverage high-performance video streaming, analytics and video intelligence. EntraPass go Mobile App is available on Android and Apple devices.
The Security Industry Association (SIA) has released the American National Standards Institute (ANSI)-approved ANSI/SIA CP-01-2019, a security systems standard for false alarm reduction features. The standard leverages technology, industry experience and common knowledge to pinpoint the causes of and decrease the frequency of false alarm dispatches, detailing recommended design features applicable to both residential and commercial properties protected by electronic security systems. The 2019 standard is a revision of ANSI/SIA CP-01 2014 and builds on the 2014 version in meaningful ways, including new guidance for handling informative signals and definitions for remote devices to reduce the frequency of false alarm dispatches and updated language throughout that minimizes the dependence on the term ‘control panel’, ensuring increased applicability to innovative security system approaches. Significant reduction in false alarms CP-01-2019 is intended for use or reference by all security industry professionals“When CP-01 was first released, we saw a significant reduction in false alarms, but as technology advances, so must the standards and processes that help reduce false alarms,” said Joe Gittens, director of standards at SIA. “There is still a great deal of work to do industry-wide, but this release is a step forward, and we are excited to continue furthering the mission of eliminating false dispatches.” The effort to update this keystone standard was led by SIA’s Intrusion Subcommittee with valuable input from The Monitoring Association and the Electronic Security Association. Addressing both user- and equipment-caused false alarms, CP-01-2019 is intended for use or reference by all security industry professionals. Areas covered by ANSI/SIA CP-01-2019 include event recognition, information handling sequences and provisions for system layout testing, installer programming options and recommended test procedures to help determine compliance to the standard.
Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the addition of Desjardins Technologies to its Authorized Manufacturer’s Representative Program to increase coverage for customers in Canada. Desjardins Technologies will deliver French and English pre-sales support in much of Eastern Canada, including the National Capital Region and the provinces of Quebec and New Brunswick. “Desjardins Technologies brings a wealth of experience in both the Ottawa area and throughout the provinces of Quebec and New Brunswick,” said Kyle Parker, Vice President, Americas, Arecont Vision Costar. “They offer expertise in both security and home automation systems that will be of benefit to our customers in this part of Canada, including for training and design assistance in both English and French.” Video surveillance products I look forward to the opportunity to bring the company’s solutions to customers throughout the Ottawa area" Based in Blainville, Quebec, CEO and Founder Jean Pierre Desjardins brings twenty-five years of experience providing outstanding pre-sales support and assistance to customers across the region. “Arecont Vision Costar and its web-enabled Total Video Solution are an ideal fit for those in the region who are looking for proven video surveillance products combined with an easy to deploy and manage offering,” stated Mr. Desjardins. “I look forward to the opportunity to bring the company’s solutions to customers throughout the Ottawa area and across both Quebec and New Brunswick.” Cloud-Enabled offering “Jean Pierre and his team will enable Arecont Vision Costar to reach many new customers in this region for the first time,” stated John Bujarski, Senior Regional Sales Director, Arecont Vision Costar. “Our Total Video Solution is proven, simple to deploy, and a truly modern cloud-enabled offering that will benefit those in this part of Eastern Canada, just as it has across the United States and around the world.” Desjardins Technologies and the other members of Arecont Vision Costar’s Manufacturer’s Representative Partner Program are focused on bringing the industry’s best, cyber-secure video surveillance offerings to their assigned regions. Participants in the program extend the reach of Arecont Vision Costar by providing expert pre-sales assistance while interfacing with and educating customers, system integrators, and distributors on available solutions for even the most challenging video surveillance requirements.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SecurityInformed.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organizations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organizations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritizes use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
The threat of drones is a growing concern around the perimeter and in the airspace surrounding airports. According to a UK Airprox Board report, the number of times a drone endangered the safety of an aircraft in the UK airspace rose more than a third in 2018 compared to the year before. The highest-profile recent drone incident was at UK’s Gatwick Airport, where a drone sighting last December triggered a three-day shutdown of the UK’s second busiest airport, disrupted the travel plans of 140,000 people and affected 1,000 flights. Unauthorized drone activity And there have been other recent incidents of drone disruptions at airports: At Heathrow Airport in January 2019, flights were temporarily stopped for about an hour ‘as a precautionary measure’ after a drone was reported. The UK Airprox Board recorded 39 dangerously close drone encounters at Heathrow in 2018. In the U.S., flights into Newark Liberty International Airport were disrupted for about 90 minutes in January after a drone sighting. Dubai International Airport, the world’s busiest for international travel, closed its airspace for about 30 minutes in February due to suspected unauthorized drone activity. In March and again in May, air traffic at Frankfurt Airport in Germany was grounded due to drone sightings – for about 30 minutes in the first instance and about an hour in the second. Drone detection systems Security has a role in preventing drone incidents, although pilots often report themSecurity has a role in preventing drone incidents, although pilots often report them. At Gatwick, the initial reports of a drone over the airfield came from airport security officers. After the incident, the UK government rushed through legislation to enlarge the drone exclusion zones around airports to a maximum of 5 km (up from the previous 1 km). In the U.S., the exclusion zone around airports is a radius of about 5 miles, and even more in sensitive areas such as the National Capital Region around Ronald Reagan Washington National Airport, where restrictions are 15 to 30 miles. Airports in the U.S. are allowed to deploy drone detection systems but may not use counterdrone technology (such as shooting down the drones), which is reserved for the Justice Department and Homeland Security. Dedicated new technology “News that drone threats to aircraft are increasing should come as no surprise,” says Simon Barnes, Business Development Manager – Airports Europe for Genetec. “Recent reported incidents are just the tip of the iceberg. As drones become increasingly ubiquitous – both from hobbyists and their growing use in professional arenas – we can expect to see many more incidents.” From speaking to airports across the world, Barnes has learned that two of the most pressing challenges they face are how they secure their perimeters (as intruders become increasingly sophisticated) and identifying ‘Friend from Foe’ as operational needs must be maintained. “When it specifically comes to drone detection, the short-term temptation can be to introduce a dedicated new technology to address this specific threat,” he commented. More comprehensive response We need to work with technology, not against it, in order to ensure public safety and security"“However, the last thing a functioning airport needs is an independent system that isn’t unified with all of the other security measures in place. Only when the data from all of these inputs is visualized in one place can an airport begin to make sense of its environment and enable a fast and efficient response to evolving challenges such as the insider threat and malicious drone activities. We fully expect airports to respond to this changing landscape, to help ensure a more comprehensive response.” Philip Avery, Managing Director of Navtech Radar, adds: “In today's current climate of increased national threats, we need to work fast to keep up with modern risks. However, creating new, complicated laws open to misinterpretation or enforcing a complete ban on privately owned drones seem like Luddite solutions that undermine the potential of innovative technology. We need to work with technology, not against it, in order to ensure public safety and security.” Help mitigate risk Navtech Radar sells the AdvanceGuard system for drone detection. Tavcom Training, part of the Linx International Group, has responded to requests from the security industry for expert training in order to be better prepared for and mitigate against the threat of Unmanned Aerial Systems (better known as drones). The company offers a two-day Drone Detection classroom-based course for £375+VAT. Our drone detection course gives security professionals advice from experts" “The responses to the [recent] airport drone attacks were played out in the spotlight, with much public debate regarding the seeming lack of a pre-defined plan of action to prevent or contain such an incident,” explains Sarah Hayward-Turton, Sales and Marketing Director at the Linx International Group. “Our drone detection course gives security professionals advice from experts in drone technology, to help mitigate risk and implement countermeasures to thwart unauthorized drone activity.” The course will be offered again in November 2019 and in February 2020.
Panasonic is selling off 80% of its video surveillance business to a private equity firm but will retain 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by new competition from large Chinese companies and lower prices of video surveillance equipment. Strategic business alliances Panasonic is establishing a new company made up of its security systems business, and Polaris Capital Group Co. will acquire 80% of the outstanding shares of the new company. The decision was approved by the board of directors on May 31, and the transaction is expected to be completed by Oct. 1.The new company’s security cameras and software will be sold under the Panasonic brand Polaris has experience in strategic capital alliances with manufacturers and large-scale companies. Based on that experience, Polaris expects to smoothly and rapidly build the structure necessary for an independent business while preserving the strengths and unique characteristics of the business. The goal is to 'maximize corporate value as an independent company toward IPO (initial public offering) in the future.' Panasonic brand name to continue The new company – named Panasonic i-PRO Sensing Solutions Co., Ltd. – will encompass the Panasonic Connected Solutions Company’s Security Systems Business Division and the industrial and medical vision compact camera R&D department of its Innovation Center. The Public Safety sales and development functions of Panasonic System Solutions Company of North America (PSSNA), and the security camera manufacturing factory in China – Panasonic System Networks Suzhou Co., Ltd. (PSNS) – will become subsidiaries of the new company. Polaris expects to smoothly and rapidly build the structure necessary for an independent business After establishment, the new company’s security cameras and software will be sold under the Panasonic brand. Sales will be handled directly by the new company in the U.S. market; through Panasonic System Solutions Japan Co., Ltd. (PSSJ) in the Japanese domestic market; and through existing Panasonic sales companies in other regions including Europe, China, Southeast Asia, Oceania and Canada, which will all sign sales agreements with the new company. Future outlook An announcement from Panasonic details plans for the new company: “It will build on the strengths of the Division while benefitting from management and resources of Polaris to seamlessly implement the necessary structure to operate as an independent organization. Strengthening its solutions capabilities with proactive alliances and M&As, the new company will aim to enhance its revenue and profitability globally centered on the North American market. With new and next-generation products and services, and a strategic growth plan to expand sales of medical camera modules, the new company will build a solid foundation as an independent entity.” The core business of video surveillance equipment is more competitive than eveThe Security Systems Business Division of Panasonic has a roughly 60-year history of developing security cameras and advanced edge devices and combining these with unique software such as facial recognition to meet the needs of the market. It has established itself as a top brand. Effect on U.S. market Panasonic in the U.S. broadened its business approach to increase systems sales with the acquisition of Houston, Texas-based Video Insight in 2015. The developer of video management software especially helped to boost business opportunities in the education market in North America. More recently, Panasonic has sought to differentiate itself with an emphasis on R&D and new product developments, including artificial intelligence. Last year, the company highlighted its FacePro deep learning facial recognition system using extreme sensing and enhanced detection technology to identify persons of interest and alert authorities of their presence in real-time. Developments in the offing The Security Systems Business Division of Panasonic has a roughly 60-year history of developing security camerasIn the near future, Panasonic is also looking to apply AI-based capabilities to vehicle recognition, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic announced last year its intent to transition its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved. Still, the core business of video surveillance equipment is more competitive than ever. As Panasonic looks to regain its former dominance, it will face an uphill battle. A sharper focus and new management, resulting from the acquisition, may help to turn the tides.
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-Line distance education Wintec’s programs and qualifications are nationally and internationally recognized Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programs and qualifications are nationally and internationally recognized and its degrees have equal status to those from universities. The degree programs include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognized nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organization, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analog and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrollment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilize Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilization of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organizations have yet to realize. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognizing the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilization (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilization reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximizing the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
Resort World Casino New York City, (RWNYC) is the only legalized gaming casino in New York City. Its location near JFK International Airport meets New York State gaming regulations regarding geographical requirements, in order to protect visitors, patrons, and the casino’s assets. With approximately 400 million dollars channeled through its facility each week, the casino’s concerns include security across multiple points of entry, vendor offices, cashier cages, count room areas, and high limit rooms. The casino has an average of 15,000 guests per day, approximately 1,000 employees and 6,500 parking spaces. The requirement to accurately monitor and protect Resort World’s guests, facility, and personnel, demanded a state-of-the-art solution that could meet its complex security needs. Comprehensive security and surveillance program Gallagher worked closely with Resort World to understand their unique challenges In order to create and maintain a safe and secure environment for all, Gallagher worked closely with Resort World to understand their unique challenges. A comprehensive security and surveillance program were implemented to seamlessly integrate people, processes, and technology. This program included: Integration with iTrak System, providing up-to-date information on personnel and incident reports from all departments. Synectics VMS Integration (with more than 2,000 HD cameras), to control doors, acknowledge alarms, link cameras to alarms, and alter the mood of the monitor room by changing the color of the lighting. If an alarm is activated the monitor room lighting turns red. Open Process Control Integration, to automatically generate VMS alerts. These alerts convert to a WAV (audio) file that announces the location of the alert and then directs cameras to the specific area of interest. Interface and automatic export of the Employee Dining Buffet record to payroll weekly. Scalable security solution Director of Surveillance at Resort World New York City, Jason Arnett, and his team have completed the Gallagher Access Technician Training Course and are qualified as first responders. A+ Technology & Security in Bay Shore, New York is Gallagher’s Certified Channel Partner and service provider for RWNY. “Security of the property is key to the success of our business,” says Jason. “Having a system that is capable of numerous customizations, while being scalable to the constant demand for growth, proves it is an all-around solid security system for our environment.” Customer inspired Resort World Casino New York City identified a need for a solution that would disable employee access cards at the end of their shift. Employees were required to pass through a security checkpoint at the start of their day to reactivate their access card. To streamline this process, Resort World selected Gallagher’s Action on Access integration. Jason explains, “This significantly enhanced the security of the property by taking fear out of the equation.” Gallagher Action on Access integration ID badges are no longer active while off property, activation of the ID is done in the presence of security ID badges are no longer active while off property, activation of the ID is done in the presence of security, meaning unauthorized access to the property due to a lost ID badge is no longer a concern. Additionally, in the event of an emergency, a report can be run producing an accurate account of who is in the building. Lastly, it requires staff to enter and exit the property though one particular entrance, limiting the possibility of internal theft. Ultimately, Action on Access delivers a two-fold protection plan. Cardholder selection is regulated by the state to ensure that no individual has full capability to create a complete cardholder credential or select access for the cardholder. In order to maintain compliance with state regulations, RWNYC utilizes features included with Gallagher Command Centre such as dual access point authorization, interlocks, and security alarms tied-in with output to control lights, as well as additional device notifications. Authorized and secure access control In order to provide enhanced protection and authorized access control, several mantraps were positioned in critical areas of the facility. These mantraps allow RWNYC staff to know who is on duty. This step, in conjunction with Action on Access, provides a significant safety measure as it allows for the enabling and disabling of card access with time restraints, in the event a card is lost or compromised.The Gallagher system is fully customisable to meet and exceed gaming regulations for this property" “With Gallagher’s latest software update, we’ve been creating more customized views for our staff to better monitor particular areas,” says Jason. Email alert notifications are used to inform Player Development that an invited guest is entering the private gaming space, allowing a greeter to welcome them and provide best in class customer service. Gallagher security system Gallagher’s security solution affords RWNYC a reduction of five to eight hours of labor per week by utilizing Command Center’s reporting and auditing capabilities. “The Gallagher system is fully customizable to meet and exceed gaming regulations for this property. It is modular and can be divided into multi-tenant features. Gallagher’s functionality and flexibility are only limited by your imagination,” Jason summarized. Gallagher Command Center is at the center of Resort World Casino New York City’s thorough and complex security program, helping protect their world class entertainment facility by safeguarding physical property, minimizing risk, and reducing operational costs.
Queensland University of Technology (QUT) is a major Australian university at the forefront of innovation and development in tertiary education. With a strong focus on research, technology, and sustainability, QUT has state-of-the-art facilities and equipment located across three campuses in Brisbane, as well as multiple remote research sites. With highly-valuable assets and facilities, open campuses, and a combined population of approximately 58,000 staff and students, it is imperative for QUT to have a robust yet discreet security and site management system operating 24/7. In 1995, QUT selected Gallagher as their technology partner to develop and implement a seamless security and site management solution. More than 20 years on, this partnership remains strong as QUT continues to seek new and innovative technology to manage their campuses and simplify operations. Intelligent access control readers QUT’s three campuses have diverse physical environments which are essentially open to the general public. One campus is situated between the Brisbane River and Brisbane Botanical Gardens, another is located in the center of an urban retail village, residential area and high-school. “The QUT campuses, while tertiary education institutions, are open to the public. This open and accessible environment presents a challenge when trying to protect the people and property of QUT” says Tracey Bartlett, Security Systems Officer. We have high expectation of the Gallagher system to manage the security of the non-public domain" “We have high expectation of the Gallagher system to manage the security of the non-public domain whileallowing staff, students and authorized visitors the access they require.” To do this, QUT operates 1500 intelligent access control readers across their sites. Integration with Command Center With the readers communicating directly with Gallagher’s site management software platform, Command Center, QUT is able to manage, monitor, and report on facility access. “We have buildings that are open until 10pm and others that are accessible 24 hours a day, 7 days a week.” says Bartlett. “Our security staff in the CMS (Central Monitoring Stations) are able to create building and cardholder schedules, quickly lock down areas, grant immediate access and generate report. These reports assist the QUT Space Management Team on exactly how and when our facilities are being used.” Key objectives Secure multiple campuses that have open perimeters Protect staff and students and assets Ensure quick identification and response to alarms from multiple systems Streamline cardholder administration processes Staff and Students Security The safety of students and staff is the number one priority for QUT and the university works hard to ensure they operate safe and secure campuses. Through Gallagher’s site management solution, QUT is able to integrate multiple systems – including emergency control points and alarms for temperature change, fire, and flooding - and feed the information into Command Center. Having one central monitoring platform ensures staff quickly identify, locate, and respond to any potential risks on campus. CMS Operators are highly skilled with the Gallagher system and, in conjunction with our CCTV system" “Our CMS team operates 24/7, of CMS Operators are highly skilled with the Gallagher system and, in conjunction with our CCTV system, have a complete view of what’s happening on site. They are then able to direct the field staff to areas of the campus that need attention,” says Bartlett. Ease-to-use software With tens of thousands of cardholders, all with ever-changing access needs, QUT requires a large number of staff to be able to administer and manager cardholder profiles within Command Centre. “The feedback from staff new to the CMS have commented that Command Centre is very easy to use software and they’re surprised at just what the system can do.” says Bartlett. In addition to streamlining the administration processes involved in cardholder management, Gallagher’s system also streamlines operations for QUT. More than just a card controlling physical access, QUT’s cards act as staff and student IDs, are used to operate printers and borrow from the library and can be used to monitor time and attendance. Through Command Centre, audit trails are generated for quick and easy reporting on each card function. Site Management software As a technology focused university, QUT continuously reviews and implements new systems and technology as they become available. In order to keep up with the very latest site management software available from Gallagher, QUT opts for an ongoing Software Maintenance agreement. “We’ll continue to welcome the opportunity to embrace Gallagher’s latest products as we are confident, they will meet our needs” says Bartlett.
Avigilon Corporation (‘Avigilon’), a Motorola Solutions company, announces that the New Bedford Housing Authority (‘NBHA’) in Massachusetts, USA has selected Avigilon video security solutions to help improve safety and reduce crime within its community. With close to 1,750 federal public housing units and 748 state aided units, the NBHA services over 6,000 individuals by providing safe, well-maintained and affordable housing units. New Bedford has faced challenges related to crime, which prompted the NBHA to seek out a security system that delivers actionable results to increase public safety throughout its community. Monitor critical areas The NBHA has deployed a complete Avigilon solution to monitor 13 of its properties throughout the city The NBHA has deployed a complete Avigilon solution to monitor 13 of its properties throughout the city. The system includes more than 125 Avigilon cameras and Avigilon Appearance Search™ technology, which is powered by AI to help enable security officers to quickly sort through hours of video with ease to locate a specific person or vehicle of interest across an entire site or multiple sites that are connected to the same Avigilon Control Center™ client software. “Our goal is to provide a safe environment for our residents and deploying an Avigilon system has allowed us to monitor critical areas more efficiently and respond more quickly,” said Steven Beauregard, executive director of NBHA. Video security solutions “So far, the results are tangible as we’ve made great strides in improving the safety and security of our communities.” “The NBHA is taking significant action to proactively address crime and other security concerns to help protect what matters most: its residents,” said Ryan Nolan, senior vice president, Commercial Operations of Avigilon. “By using our AI-powered video security solutions they are able to increase the effectiveness of their security system and provide a new level of public safety.”
Located in the city center of New Zealand’s capital, Wellington, Chaffers Marina is home to some of the country’s most exclusive multi-million-dollar vessels and receives visitors from around the world. With 185 berths across 5 piers, Chaffers Marina’s location amidst public areas presents unique security risks and facilities management challenges. In 2011, Chaffers Marina began working with Gallagher and today utilizes some of the latest Bluetooth and mobile technology to deliver effortless site and facilities access for staff and marina users. Risk management & accountability With a location in the central business district of Wellington, Chaffers Marina sits amidst public areas including a city park. Historically, when the park hosted events and festivals, members of the public would unlawfully access the marina piers and climb aboard vessels. It was these incidents that initially prompted Chaffers Marina to review their current systems and find new site management and CCTV solutions. To mitigate the risks posed by unauthorized site access, Chaffer’s Marina installed cameras across the site To mitigate the risks posed by unauthorized site access, Chaffer’s Marina installed cameras across the site and introduced alarmed and monitored gates on each pier with Gallagher access control readers. In addition to preventing unauthorized access by the general public, the access control solution provides a reliable method for the Marina to manage and report on the activity of contractors on site. “It’s absolutely vital that we not only manage who gets on and off of the piers, but that we have also have a thorough audit trail supported by video footage.” says Ken Burt, Marina Manager at Chaffer’s Marina. Bluetooth T15 readers Chaffer’s Marina is utilizing Gallagher’s Bluetooth T15 Readers across the site and is experiencing a significant increase in efficiency as a result. “Staff and contractors moving around the site with equipment or pushing trolleys, don’t have to stop to dig out a key or card to unlock the gate” says Ken. “Instead, the Bluetooth reader communicates with the mobile phone in our pocket and unlocks it automatically, it just makes life so much easier.” Likewise, marina users are able to move effortlessly around the site, accessing the piers, office, and the comprehensive amenities building, all via the Bluetooth connection on their mobile device. Gallagher’s mobile technology is having a considerable impact on the administrative side of the business too. To date, visiting vessels taking temporary berths would need to be met by a member of the Chaffers Marina team, in order to hand over an access card to provide pier and facility access. Mobile Connect App Through Gallagher’s Mobile Connect App, Chaffer’s administrative staff can now issue an access credential directly to a visitor’s mobile device before they’ve even arrived at the marina. “We’re very excited about this technology” said Ken, “aside from how simple and impressive it is for our visitors, the impact on our administration - particularly having to retrieve or replace unreturned visitor’s cards - is huge.” Gallagher’s Command Center Mobile App makes life even easier for marina manager Ken, by enabling him to manage alarms, user access, and gate status, remotely via a mobile device. “I primarily use Command CenterMobile on my iPad after hours” said Ken. “When someone calls me after hours about an access issue, I can now manage it from home on my tablet, that’s incredibly efficient for us and delivers a huge saving on call outs.” Harsh environmental conditions Gallagher’s T15 readers are the ideal choice for outdoor application Chaffer’s Marina faces harsh environmental conditions that put any external hardware to the test. Gallagher’s T15 readers are the ideal choice for outdoor application and were designed specifically to meet the needs of all-weather environments. “We’d had problems with previous hardware becoming damaged by water, wind, and salt.” said Ken. “Gallagher’s T15 readers were developed in direct consultation with us and other sites that have difficult conditions. The team at Gallagher really do listen to what we say and incorporate it in their design, and because of that, I have every confidence in the products Gallagher makes.” says Ken. Forward thinking To further enhance operational efficiency across their site, Chaffers Marina is currently looking to leverage Gallagher’s mobile and Bluetooth technology to automate and simplify members’ access to power facilities. According to Ken “Gallagher’s technology presents some opportunities for us to be really innovative in how we deliver and record access to different facilities on our site, we’re exploring those ideas as we speak.”
There is a saying that ‘Everything is Bigger in Texas’, and the Dallas, Texas police department is no exception. The city of Dallas is ranked in the top 10 cities in the U.S. in terms of population, at 1.2 million people. The Dallas Police Department is the ninth largest municipal police force in the U.S., based on 3,012 sworn officers. It is led by Chief of Police, U. Reneé Hall. The department is located in the Jack Evans Police Headquarters building, which was built in 2003. It is 358,000 square feet, has six floors, is spread over a three-acre site, has a separate 1,200 car parking garage and a two-acre, open parking lot for additional visitor parking. Prior to 2003, the department was housed in the circa 1914 former City Hall Building. Preventing terrorist attack and hazards Police officials worked with a Police Design Consultant to help design the building to resist terrorist attacksThe Jack Evans Police Headquarters building was under construction when 9/11 terrorists flew airplanes into the World Trade Buildings in New York. That event was preceded by the Oklahoma City Murrah Federal Building bombing in April 1995. Therefore, security was a concern in its design. Police officials worked with a Police Design Consultant – McClaren, Wilson, and Lawrie Architects of Phoenix – to help design the building to resist a terrorist attack and isolate potential hazards. The building also needed to control visitor traffic and access. On an average month, there are 5,000 public visitors to the Jack Evans building. In addition, shots fired at police buildings nationally are not uncommon, says Paul M. Schuster, Senior Corporal/Facilities Management for the Dallas Police Department. Ready to anticipate dangerous crimes “For the most part they are random, single shot drive-by shootings. Often, the officers are unaware that the building has been shot at, until they find a bullet hole in the brick or glass. Increasingly, police tend to be a symbol of government and some citizens see that as a visible target to lash out at. Police officers are trained to expect the routine types of calls, such as domestic violence, traffic accidents, and other crimes. Yet they must be flexible to anticipate the non-routine that can be dangerous and change in a heartbeat.” On June 13, 2015, after midnight, a 35-year-old male placed a duffle bag with a remote-controlled bomb to detonate later between cars in the parking lot of the headquarters building. The suspect then began shooting continuously at the lobby windows. Officers responded to the scene, a vehicle chase began, and the incident ended outside the city. Luckily officers in the lobby took cover and were not injured. Conducting building security assessment The assessment included testing various construction materials for bullet resistance to various types of weaponsFollowing that incident, the Dallas Police Department conducted a security assessment of the building and also at seven patrol stations throughout the city. The assessment included testing various construction materials for bullet resistance to various types of weapons. Gensler Architects and Guidepost Solutions, LLC developed the solutions and plans. “Yesterday we were concerned about handguns, today we are worried about rifles, and the idea of terrorism is always present with outright attack or bombs,” Schuster notes. “The police officers and police staff only want a place that is safe and where they can do their good work.” Funding of $1.3 million was approved to upgrade the lobbies of the seven patrol stations to withstand rifle rounds, and $1.9 million to improve headquarters lobby security, and to upgrade an aging security system. Turner Construction Company and Convergint Technologies, LLC conducted the renovations and security technology integration. Challenges in upgrading lobby security Visitors were allowed free entry into the lobby and were only screened in an open area to the side if going to other floorsThe headquarters’ lobby was initially designed as a two-story glass-walled structure, with an information desk and public records service windows. Visitors were allowed free entry into the lobby and were only screened in an open area to the side if going to other floors. “The challenge in upgrading lobby security was the two-story lobby entrance glass. The glass was not bullet rated, due to budget constraints. Changing the front of the building to support ballistic rifle-rated glass would have caused extensive time, exposed the inside of the lobby to weather, and would not have solved all of the security issues,” Schuster says. “In addition, there were concerns about keeping an ‘open’ and friendly service concept in mind and ensuring that the lobby would not resemble a ‘fortress’,” Schuster notes. Bullet-rated glass and bullet resistant wall The solution was to keep the existing exterior unchanged and focus on adding a layer of security once a person enters the lobby. Visitors now enter the headquarters and immediately proceed to a side room where security screening is conducted. Once inside the screening room, the visitor has belongings x-rayed, and they walk through a metal detector A new secondary wall with bullet-rated glass and solid bullet resistant wall materials was constructed inside the lobby to channel visitors to the room. Once inside the screening room, which also has bullet resistant walls, the visitor has belongings x-rayed, and they walk through a metal detector. In the event that anyone was to produce a gun and begin shooting, the incident could be contained inside that room. Tourlock 180+90 security revolving door Once a visitor has been cleared, they proceed into the main lobby via a Boon Edam Tourlock 180+90 security revolving door. This automatic, four-wing door is the most advanced, security revolving door in the Boon Edam product range that offers maximum throughput, allowing users to enter and leave the building simultaneously. In the event that a large number of persons try to force their way into the facility, the Tourlock 180+90 will determine that more than one person is trying to enter and will reject the person and lock out any others from entering. Once a visitor is ready to leave the lobby and exit the building, they pass through another Boon Edam Tourlock 180+90 that leads to a vestibule with exterior swinging doors. In the event that someone tries to go back into the lobby from the front vestibule area, without going through the security screening room, the Tourlock security revolving door will reject their entry. Preventing tailgating and piggybacking The Boon Edam security revolving doors accurately prevent both tailgating and piggybackingThe Jack Evans Headquarters security upgrades for the lobby improved security and still kept the best aspects of the lobby design, including the antique police car, and the overhead police helicopter. The Boon Edam security revolving doors accurately prevent both tailgating and piggybacking, and provide the department with maximum security while controlling traffic flow. “While it would be great to have a building totally open to the public and then add security as needed, such is not the world we live in anymore,” Schuster adds. Future security plans include exterior site security upgrades to the patrol stations and the headquarters to include security fencing with card access controls for fleet and employee vehicles at each of the sites.
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
With the advent of online shopping, brick-and-mortar retail businesses are challenged to make transactions more convenient while enhancing the “experience” aspects that differentiate real-life shopping from the simpler route of clicking on a website. Technology is helping retailers create that differentiation, including technologies such as video systems, deep learning analytics and point-of-sale (POS) integrations that have evolved from innovation in the physical security market. For more insights, we asked this week’s Expert Panel Roundtable: What new security industry technologies are having an impact on the retail market?
Security systems: Manufacturers & Suppliers
- Dahua Technology Security systems
- Vicon Security systems
- Vanderbilt Security systems
- Bolide Security systems
- Seagate Security systems
- ComNet Security systems
- Bosch Security systems
- VIVOTEK Security systems
- MobileView Security systems
- Videotec Security systems
- Hanwha Techwin America Security systems
- Sony Security systems
- HID Security systems
- LILIN Security systems
- OT Systems Security systems
- BCDVideo Security systems
- MOBOTIX Security systems
- DSC Security systems
- CEM Security systems
- TESA Security systems