Echodyne, globally renowned manufacturer of innovative, high-performance radars for government and commercial markets, has announced that it will be co-exhibiting with Security Radar Integrators (SRI) at the 19th annual American Association of Airport Executives (AAAE) Aviation Security Summit, taking place in Arlington, VA from December 4-5, 2019. Aviation security With ever-increasing drones in the airspace, protecting aircraft and airports from drones has become a major focus for regulators...
ThreatScan® allows bomb technicians to perform rapid and accurate threat assessment in a wide range of operational scenarios. Each system consists of a portable X-ray generator, a detection panel and an operator’s workstation running the Company’s market-leading image processing software, together with a customer-specific range of ancillary equipment. ThreatScan® is lightweight, incredibly thin, has a large imaging area of 600 x 460mm, enabling bags and packages to be scanned...
Delta Scientific, the manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announced that its new patented crash rated TB150 portable bollard system lets law enforcement and other security providers promptly block access to temporary venues where vehicles can be used as weapons against large numbers of pedestrians. Individual portable bollards provide vehicle barricades in applications such as heavily traveled walkways and roadways or any area...
A high majority of Americans (83%) are concerned about a criminal attack causing physical harm at large-scale events such as sporting events or concert festivals. More than one in five (22% of) Americans say they have canceled plans or considered cancelling plans to attend large-scale public events due to concerns about physical attacks and the safety of their data. Across the pond, three in 10 Britons think twice about attending large-scale events due to data or physical security issues. Alth...
Coming off a successful ISC West show, Honeywell is sharply focused on product development, with an emphasis on advanced software. “We have a strong new product pipeline this year – more than two times the number of products than we’ve released in the past several years,” says Luis Rodriguez, Director of Product Marketing, Honeywell Commercial Security. “At ISC West, we received a lot of interest in how AI and new security systems are changing the market.” A...
The National Center for Spectator Sport Safety and Security (NCS4) and the Security Industry Association (SIA) have named Scott Dunn – senior director of business development, solutions and services for Axis Communications, Inc. – as the 2019 recipient of the Sports Security Innovator Award. SIA will present Dunn with the honor at the National Sports Safety and Security Conference and Exhibition, taking place July 9-11 at the New Orleans Downtown Marriott in New Orleans, Louisiana....
At ISC West this year, on booth 11099, Veracity will be demonstrating its expanded suite of COLDSTORE solutions, from the new COLDSTORE 2U delivering 112TB video storage in a compact rack-mounted space up to the COLDSTORE Colossus, the 4U, 45-bay, 630TB video storage solution. The COLDSTORE family offers unique benefits including a 10x increase in hard disk life and power savings of 90%+. In fact, Colossus, with 630TB and 45 disks, consumes less than 80W of power! This gives the COLDSTORE range not only enviable performance benefits but also a compelling total cost of ownership case not available with other video storage solutions, especially for longer retention periods. Eliminating Storage Systems’ Operational Issues COLDSTORE has patented technology designed specifically for sequential and continuous recording of video surveillance channelsCOLDSTORE is in use throughout the world at critical infrastructure sites, major sporting venues, in retail, in custodial and policing environments and in city center command and control operations. COLDSTORE has patented technology designed specifically for sequential and continuous recording of video surveillance channels. As a result, many of the operational issues with standard storage systems, such as long disk rebuild times, high power consumption, excess heat and reduced disk life, are eliminated. Also, on display at ISC West will be the COLDSTORE Pro 3U, 210TB unit that uses only 0.3W per Terabyte. Visitors will learn about COLDSTORE’s new embedded NVR functions and the ability to record from camera direct to COLDSTORE through ONVIF compatibility or using embedded COLDSTREAM code in open platform cameras, such as Axis and Hanwha. Over 100 channels can be supported, at 4Mbps per channel. Integrated Command And Control Solution Veracity will also be demonstrating VIEWSCAPE, the integrated and open command and control solution. VIEWSCAPE is a real success story in use in many city center, retail, critical infrastructure and other sites. Anyone with an interest in C3, critical command solutions should get to know VIEWSCAPE. With over 100 integrations, this comprehensive command and control system can be seen at Veracity’s booth 11099. The full integration of COLDSTORE with Hanwha Techwin’s Wisenet WAVE will be on show on both the Veracity and Hanwha Techwin booth The full integration of COLDSTORE with Hanwha Techwin’s Wisenet WAVE will be on show on both the Veracity and Hanwha Techwin booth. Wisenet WAVE is an IP Video management platform that allows users to create IP video surveillance solutions tailored to any type of project, usable by anyone and on any device. It is simple to setup and use, and when integrated with COLDSTORE delivers an impressive suite of features with all the benefits of COLDSTORE’s long-term video retention capabilities. LONGSPAN Ethernet Over Coax Solution Veracity is most famous for its transmission solutions. In 2005, Veracity launched the world’s first Ethernet over coax solution. As a market leader, the full range of multi-channel Ethernet over Coax, extreme distance Ethernet and other transmission products will be on show. This includes LONGSPAN, which delivers IP video and POE (Power over Ethernet) over a distance of 820m (2,690ft) on standard Ethernet cable. Veracity will also have its informative IP transmission workshop running at the booth. Veracity operates in the USA from its office in Dallas, Texas and continues to experience rapid growth fueled by the development of strong relationships with many customers and partners across the United States. Veracity experts will be available throughout ISC West at booth 11099 from the 10th to 12th April 2019 at the Sands Expo in Las Vegas. Make sure you visit us.
Princeton Identity, provider of the fastest, simplest and most secure biometric security system on the market, announced three new patents related to innovations in iris recognition technology that the company was awarded by the U.S. Patent and Trademark Office (USPTO). The new patents include: Patent 10042994 for Validation of the Right to Access an Object. Patent 10025982 for Collecting and Targeting Marketing Data and Information Based upon Iris Identification. Patent 10038691 for Authorization of a Financial Transaction. Ensuring Accurate Authentication Of People The new patents represent the application of Princeton Identity’s unique approach to iris authentication in three very important market areas: access, marketing, and financial transactions. Using the techniques described in these patents, Princeton Identity advances the application of iris identification and personnel authentication much more broadly than physical security and represents the anticipated adoption of these technologies in the broader marketplace. “We’re extremely excited that the USPTO has recognized Princeton Identity’s latest inventions and team of biometrics experts,” stated Mark Clifton, CEO of Princeton Identity. “With over 11 patented technologies in our portfolio and many more pending, we continue to demonstrate our commitment to creating the most advanced and accurate iris recognition-based solutions to ensure accurate and convenient authentication of people and access to assets.” Implemented In Airports, Universities And Stadiums Quickly gaining recognition as a leader in advanced biometric security, Princeton Identity’s technology is present in the busiest international airport in the world, prominent financial institutions, major universities, sports stadiums and the largest American manufacturing company. The company has deployments within the U.S. Department of Defense, and its identification software has been integrated into over 90 million mobile devices in over 120 countries.
Black Sage now offers event-based counter drone protection (service) specifically for sports and other large-scale events. Stadiums and other open-air venues are particularly vulnerable to the growing risk posed by the proliferation of consumer drones and Black Sage is addressing this issue by offering a new service. Commercially available drones have quite literally added a new dimension to security threats not only in war zones, but also at large public gatherings here in the U.S. Operators with nefarious intentions can use them for drone-based terror attacks, unlicensed recording and transmission, or to protest and cause distractions. Even well-intentioned drone operators can cause injury and economic loss when they lose control or accidentally crash into a crowd. Low-Cost Solution For High-Risk Events By offering temporary, or one-time counter drone protection as a service, Black Sage is providing stadiums and venues a relatively low-cost solution for specific high-risk events. The Black Sage team will work directly with security personnel and local law enforcement to ensure safety and security at any event. "Black Sage has worked with military and government customers over the past several years to protect against the threat of drones at fixed sites. We are proud to now offer our capabilities as a service that allows commercial venues to have protection without the cost associated with purchasing and maintaining permanent installations," said Black Sage Technologies Managing Partner Ross Lamm, Ph.D. The Black Sage counter drone system provides early detection to allow law enforcement to take action even before the drone is airborne AI Classification To Reduce False Alarms The Black Sage counter drone system provides early detection to allow law enforcement to take action even before the drone is airborne, AI classification to reduce false alarms, operator location to assist law enforcement in apprehension and forensic data to ensure prosecution is all provided by the service. While this new service allows stadiums to add this extra level of security for specific, high-risk events, Black Sage still offers permanent or semi-permanent solutions for stadiums and venues seeking long-term counter drone protection. Permanent installations are easily integrated into existing security systems with hands-on training and technical support.
Delta Scientific, a manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, has announced that its new patent pending crash rated TB100 portable bollard system will let law enforcement and other security providers promptly block access to temporary venues where vehicles can be used as weapons against large numbers of pedestrians. Individual portable bollards provide vehicle barricades in applications such as heavily traveled narrow walkways and roadways or any area that a vehicle can get through. They can also be used as substitutes until permanent bollard systems get installed. TB100 Portable Bollards Up to five TB100 portable bollards can be linked together with a cable system and be placed on a road's surface to create immediate protection for a span of 20 feet (6 m). No other installation procedures, excavations or sub-surface preparations are required. Certified testing demonstrates that a TB100 portable bollard system will stop and disable a 15,000 pound (6,804 kg) vehicle traveling at 30 mph (48.3 kph), resulting in an ASTM M30, P3 rating. A single TB100 bollard absorbs 400,000 foot pounds of kinetic energy. The barriers can protect people at public events such as parades, festivals and sporting weekends "This is a remarkable result for a light-weight portable bollard system that requires no excavation or attachment to the roadway," emphasizes David Dickinson, senior vice president of Delta Scientific. "It can be placed on any stable surface such as concrete, asphalt, compacted soil or vegetation to quickly protect people and property against aggravated automobile or truck assault." Public Event Safety According to Dickinson, the TB100 temporary bollards can be used to close off streets, entrances or wide expanses such as access to pedestrian areas or even airport runways. They can be installed in conjunction with Delta's popular MP5000 portable barricade to fill in any gaps to protect people and critical infrastructures at public events such as parades, festivals, sporting weekends and any place that vehicles could attack transitory events. The combination of the portable barriers with the new portable bollards provides fast controlled vehicle access without the time and labor of installation. "From a purchasing standpoint, it can be easier to buy portable bollards and barricades than permanent solutions," adds Dickinson. "The latter are oftentimes placed into an organization's real assets budget because they are permanently installed into the ground, becoming part of the property. Such budgets can often create complex purchasing scenarios for law enforcement or public safety departments. However, purchasing portable bollards and barricades is no different than buying protective vests for personnel or new sets of wrenches for the maintenance department."
Johnson Controls will attend and exhibit its security solutions at ASIS International's 63rd Annual Seminar and Exhibits in Dallas, TX from September 25-28 2017. This is the first time that Johnson Controls will demonstrate its solutions and services after the integration with Tyco. Attending as a single company, Johnson Controls, a provider of building controls, infrastructure and now security, fire and life safety, will showcase its intelligent solutions at Booth #4119. Demonstrations Include: Remote Service Solutions (RSS), an offering delivered from the Global Center of Excellence Network, an organization dedicated to developing standards and technical specifications that enable high-quality fire and security installations, provides advanced triage support for response to real-time notifications on technical issues and equipment failures, designed to maximize system uptime and improve customer efficiencies Proactive Health Services (PHS), also from the Global Center of Excellence Network, delivers near real-time notifications on technical issues and equipment failures, helping improve system uptime and maintain video surveillance Gunshot Detection allows corporate, government or private buildings to relay a notification to the building's occupants, as well as emergency personnel outside, upon gunshot detection so that proper steps can be taken to control the situation. Intelligent Building Integration Framework (IBIF), an interactive portal that highlights how everything from video surveillance to lighting can be integrated into a single system for today's connected environment. The tool highlights how Johnson Controls delivers Internet of Things (IoT) outcomes through smart systems integrations. Start-Up Participation Johnson Controls will also showcase solutions from JCI Open Innovation, a global innovation center in Tel Aviv launched to foster collaboration between the company, customers and cutting-edge startups to deliver effective solutions worldwide. Startups participating in this showcase onsite include: Event attendees should plan to stop by Booth 4119 to meet and have their photo taken with Hall of Fame Inductee Tim Brown Convexum, proactive anti-drone technology that prevents intrusions into private airspace by automatically detecting and safely landing drones in a predefined location Flyability, the first collision-tolerant drone for the inspection of inaccessible or dangerous places. The drone is equipped with a protective sphere that enables it to fly indoors and in tight quarters without the propellers hitting people or property Magos Ground Based Radar, a cutting-edge technology that has been successfully piloted at several U.S. companies for perimeter detection and video verification by using radar technology Percepto, an autonomous drone solution for perimeter protection and securing facilities, including fence patrols, suspect detection and tracking, smoke detection, fire detection and gas leak detection. The system can be programmed to do regular "tours" on a scheduled basis, including a secured landing and charging enclosure that surrounds the drone and prepares it for the next tour Securithings, software that monitors IoT enabled devices and activities in real-time to detect and mitigate security threats Johnson Controls Hall Of Fame At the show, Johnson Controls will feature its work with the Johnson Controls Hall of Fame Village in Canton, Ohio to demonstrate its integration capabilities in a "smart city." The demonstration will feature a video overview of how the company is creating a premier sports and entertainment destination by using the principles behind the smart cities movement. Event attendees should plan to stop by Booth 4119 to meet and have their photo taken with Hall of Fame Inductee Tim Brown on Wednesday, Sept. 27. Tim Brown was inducted into the Hall of Fame in 2015 and played for the Oakland Raiders where he set franchise records for receptions, receiving yards and punt return yards. In addition to highlighting products and innovations, Johnson Controls Global Strategic Account Executive Holley Hunt will speak on a panel entitled, "Robots and the Quest for Automation" on Wednesday, Sept. 27 at 2:15 p.m. CT in room C141. The panel will discuss the growing benefits of artificial intelligence and robots to security professionals, including reducing risk and improving ROI.
As part of Johnson Controls continued commitment to providing customers with the most advanced and innovative solutions, the company is introducing Magos Systems perimeter protection radar to the North American commercial security market, which will be showcased at ASIS International’s 63rd Annual Seminar and Exhibits in Dallas, TX. This radar technology is suitable for a wide variety of security applications and can be implemented in facilities ranging from oil & gas production sites, utility substations, campus environments, ports, to smaller sites such as data centers, warehouses, car lots and construction sites. Cost Efficient Perimeter Protection Solution While radars traditionally were affordable only to governments, militaries, and highly budgeted entities, now Magos can provide a cost-effective solution to commercial security clients, that is simple to implement and works in all weather conditions. The cutting-edge technology helps reduce false alarms, cut down on the number of security cameras and eliminate the need for constant monitoring. “We recognized a need from our customers in North America for a low cost and effective perimeter protection solution,” said Joe Oliveri, Vice President and General Manager, Security, Johnson Controls’ Building Technologies & Solutions, North America. “After carefully examining options for superior perimeter protection solutions, we determined that Magos offers the most robust and lucrative technology and can become a game-changing offering. Johnson Controls teams evaluated the system through a series of customer-pilots for over a year, and results exceeded expectations. We are confident this revolutionary product will improve the efficiency of security systems for our customers.” Real-Time Detection Drexel University, a leading global research university located in Philadelphia, Pennsylvania was looking for ways to mitigate risks and deter unwanted visitors on their sport fields. “We are always looking for innovative efficient solutions to meet our security challenges and Johnson Controls introduced us to Magos to address perimeter protection issues,” said Joseph Spera, Director of Operations, Drexel Public Safety. “With our previous solution the area was vulnerable to unwanted visitors and damage, and real-time detection was impossible. With the new solution, including a Magos radar unit and a PTZ camera, we are notified of breaches as they occur and are now able to effectively deal with issues and mitigate risks, dispatching patrol when needed.” The reselling, distribution and integration agreement with Magos emerged from Johnson Controls Open Innovation, a program launched to foster collaboration between the company, customers and cutting-edge technologies by startups.
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organize and regulate. Integrating Drones In Existing Regulatory Ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS Measures And Regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones European c-UAS Legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS Legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorization act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating Counter-Drone Legal Infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technological improvements to the places we live offer a significant opportunity to not only improve our personal lives and wellbeing, but to also ensure our cities are able to continue contributing to the wider economy. One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting eventsThe IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. In an IDC study sponsored by Seagate, Data Age 2025 estimates that by 2025, nearly 20% of data will be critical to our daily lives and nearly 10% of that will be hypercritical. Data is no longer just going to provide simple insights and recommendations, it is going to be making decisions that impact the fabric and quality of everyday life. Analysis And Application The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilizing data in order to ensure it keeps people safe and mobile. A prime example of this is in the Dutch city of Almere, where the local police force and parking management teams are using surveillance technology to improve congestion and manage traffic flow. This is hugely important when 20% of city traffic is caused by drivers circling around trying to find a parking space, according to Stuart Higgins, Strategic Lead - Cisco Impact. While older cities such as London may not be as equipped with new technology like modern cities, such as Dubai, an appreciation of the different ways individual cities can adopt technology is vital. For those that have the right infrastructure, one key benefit will be the ability to use video surveillance to analyze data on road congestion, or even large crowds at sporting events or national ceremonies. Using this data to spot patterns of behaviour will enable city planners to develop long term solutions to ensure city life runs smoothly. Instant Access To Connected Devices By 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day — that’s one interaction approximately every 18 seconds. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever It isn’t just new-paradigm services such as Uber that are causing this. Increasingly, the ability to instantly access data relevant to many aspects of our lives will drive our interactions with these devices, and industries around the world are undergoing a digital transformation motivated by these evolving requirements. The benefits of data access is best shown through Project Green Light in the US city of Detroit, where the police department has partnered with gas stations across the city and the community to improve the quality of life within the neighborhood. The result is a strengthened relationship between public services and private businesses operating in the area. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever. When it comes to surveillance in our cities, the need for not only the technology but the hardware to analyze this data is of imperative importance. Real Time Data Storage Availability The growth of real-time data will cause a shift in the type of storage needed in the future – with fast, uncompromised access to data being non-negotiable. Data Age 2025 predicts that by 2025 the global datasphere will grow to 163 zettabytes. The security of our data and how it is stored will be the foundation to any future smart city strategy That’s ten times the 16.1ZB of data generated in 2016. This increase in data will propel the need for data to be available in real-time to heighten the focus on low-latency responsiveness from enterprise edge storage, as well as from the endpoints themselves. The rise in edge computing exemplifies how this demand is already present. The stakes are rising and with them, the critical importance of our data’s veracity and timeliness. It is important to identify city-wide data partnerships, architecture, and standards for effective and safe data sharing when developing a data strategy. Securing Stored Data It’s important to note that the security of our data and how it is stored will be the foundation to any future smart city strategy, ensuring that safety, regulatory, speed and access requirements are all met. Securing the data that underpins life as we know it is circular, not linear. Every company that creates, uses or touches data has to have a role in keeping it secure and should be the backbone of any smart city. What’s evident however is that digital transformation is shaping the surveillance industry and in turn how our cities operate. As a result, data is the fuel that will ensure the impact is a positive one. People, government and businesses all contribute to the cities of today, so no one can afford to ignore the shift we are seeing. The cities that utilize surveillance data when considering any changes to their infrastructure will ultimately become the cities of tomorrow, not only future-proofing, but prospering in the data-driven age.
Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favorite NFL team annihilating the opposition 62-3, or a convention involving anything from politics to food to Star Trek – are exciting affairs that channel the camaraderie of the crowd into a powerful collective energy. But they also are vulnerable to threats. Physical Security Solutions Terrorists and other malefactors have known for centuries that any large gathering of people has inherent vulnerabilities on which they can prey: Crowds make it hard for security to keep track of any single person or spot unusual behavior, and the number of people congregated in one space amplifies the impact of any attack. In recent years, organizers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands, and deploying K9 and police units to patrol the lines to enter security. But these current methods share a universal flaw: to be caught, evil-doers have to be on the verge of actually entering the venue with hundreds of other people, which means they can still cause a massive amount of destruction. In a survey conducted by Brivo, 50 percent of business security leaders felt they lack adequate budget and financial resources to invest in physical security solutions. Augmented Security Measures Organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands Security professionals and event organizers are constantly on the verge of finding new methods to implement in order to add an extra layer of security at venues and large facilities. For example, at this year’s Coachella Music Festival in Indio, California, which attracts over 100,000 attendees each year, organizers boosted their security initiatives by adding drones, armed guards, magnetometers and dog patrols. Unfortunately, large entertainment festivals have been a target for ill-intended individuals. Last year, the 91 Route Festival in Las Vegas, Nevada took the lives of more than 50 people and injured over 500. In the United Kingdom, 22 people lost their lives to a suicide bomber at an Arianna Grande concert in the Manchester Arena. Yet, concerts aren’t the only place new security initiatives and technology need to be implemented in, but also sports arena and large facilities. Metrasens partnered with Villa Park, the football grounds for Aston Villa Football Club in the UK, to conduct a trial using FMDS technology, Proscreen 900, to screen fans Current Screening Methods Conventional walk-through metal detectors are a compromise between effective screening and high throughput, as they successfully detect metal objects, but only can screen about five or six people each minute. They are generally placed 10 to 20 yards from a venue’s front façade, either just outside or just inside, to screen people as they enter the facility. Hand wands are used for anyone that sets off the walk-through detector as a secondary screening method for confirmation. Many facilities also use observational methods to screen, such as drones, surveillance cameras, security officers or police walking the crowd and looking for suspicious behavior, or explosives-sniffing K9 units patrolling the area. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue Security Method Limitations Each of these methods has intrinsic limitations. Observational security methods are just that – observation-based, not detection-based. They rely much more heavily on human factors that introduce greater degrees of error and chance, and positive visual identification of a suspicious threat requires a relatively close proximity to observe the threat. They’re also slow and laborious. Walk-through detectors and wands will catch someone trying to enter a facility with a weapon, but by the time they do, it may be too late – a terrorist will already be well within proximity to do a lot of damage. Bad guys don’t need to actually enter the venue; they just need to get close enough to injure or kill a large number of people. That can happen – and has happened, such as with Manchester Arena bombing in 2017 – right at the security point, where a terrorist will be surrounded by dozens or hundreds of people and 10 to 20 yards away from the critical asset: the interior of the venue. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue. What they haven’t had until recently is a way to screen mass amounts of people for weapons of mass casualty as far away from the critical asset as they can, and as far away from densely populated areas as they can, all while not impeding throughput resulting from the requirement for patrons to divest their possessions. Expanding Security Reach With FMDS The far perimeter of a venue is an ideal place to screen for weapons of mass casualty. Most of the time, a terrorist is trying to get closer to the immediate perimeter of the venue, to inflict the most damage to large groups of people waiting to get in; farther away, event attendees are walking toward the entrance and thus are more dispersed, not standing in clusters or lines. This advance screening is possible using ferromagnetic detection systems (FMDS). The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium Metrasens recently partnered with a football stadium in Birmingham, UK to conduct a trial using FMDS technology to screen fans. The trial took place in March at Villa Park, the football grounds for Aston Villa Football Club. The stadium can hold over 42,000 people. The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium, adding an extra layer of security. FMDS is highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Everything else is invisible to it; it doesn’t see people, clothing, backpacks, purses, etc. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects a magnetic signature, down to a millionth of the earth’s magnetic field. It is also highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find (e.g., a weapon). Although it is a passive technology, it is more effective and reliable than using observational security methods to screen a perimeter, because the technology will never miss something the way a human would. Recognizing Moving Magnetic Signatures An important point is that the system only works on moving objects. This makes it immune to environmental conflicts such as rebar that would trip up conventional metal detectors and allowing people to be screened quickly and unobtrusively without stopping to divest their possessions as they walk toward a venue – up to 50 or 60 people a minute. FMDS does not need people to be organized into lines or groups; it simply detects a magnetic signature on anything that passes. It runs on batteries – there is no need for an electricity source, as with a walk-through detector – and can be placed on just about any form factor (a pole, a stand, etc.). This gives security personnel flexibility when deploying FMDS, allowing them to create a wide perimeter around a venue without worrying about portability or a power source. Screening can be as obvious or as concealed as personnel prefer for a particular situation, based on the form factor they select. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution All of these combine into a solution that creates a way to close a gap in mass screenings at large events, by expanding the secure perimeter and creating a highly accurate way to detect weapons of mass casualty farther away from a critical asset and large crowds. It does not replace screening for smaller items necessarily, and all large venues should use a layered security solution that also deploys tactics like roving security guards, walk-through metal detectors and hand wands. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution. Effective Mass Screening Solution Pessimists sometimes muse the world is getting more dangerous with each passing year, and that technology is at least partially responsible for both the breadth and depth of the increasingly creative ways bad guys harm people. But some technologies also are responsible for helping to fight against those threats and make the world safer, and FMDS is one of those. By providing a foolproof method of detecting weapons of mass casualty before terrorists get too close to an event venue, FMDS gives event security personnel a way to better protect large events, making them less dangerous and keeping people safe. Images source: Metrasens
A hyperconverged infrastructure is a software-defined environment in which various elements of a physical security system – computing, storage and networking – are combined together and run more efficiently on fewer hardware devices. Rather than each element of a system being represented by a physical hardware device, those elements are combined on a cluster of hardware devices. Hypervisor software separates a computer's operating system and applications from the underlying physical hardware. The elements continue to function as before, and software keeps them separated virtually, while also enabling the system to run more economically on less hardware. Virtualization Within Hyperconverged Systems Hypervisor software separates a computer's operating system and applications from the underlying physical hardware Software companies such as VMWare, Microsoft Hyper-V and Nutanix provide virtualization software that enables hyperconverged systems in the IT world. However, bringing hyperconverged systems to the world of video surveillance requires special handling, and security integrators may not be aware that hyperconverged software from the IT market does not work seamlessly with video data. Specifically, these hypervisor software systems have latency problems that are not compatible with video. Therefore, hyperconverged software systems must be adapted to meet video’s needs. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations of security integrators and end users while also providing economic and operational advantages of hyperconverged systems. Why A Virtual Machine Can Aid Your Server Solution A hyperconverged system can transition a stack of 10 or more application servers down to three servers, with all the applications still virtually separated on fewer machines. Each server is used to 100 percent of its capacity, which is more efficient. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations Both operating and maintenance expenses are lower, and if more computing resources are needed for a virtual machine, the software interface enables an end user to allow more processing power, RAM or disk space to that application. Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses. When a video system is working on a hyperconverged cluster, what happens if there is a hardware failure? The virtual system gets moved to a cluster that is working, but there might be a 30-second gap in video, which would not be acceptable for a critical application. All video must therefore be saved in two places. Virtualized Server Stacks From BCDVideo BCDVideo has entered into an engineering partnership with Scale Computing to develop an optimized hypervisor based on Scale Computing’s HC3 software that is also efficient for writing video.Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses Virtualization in the physical security market can create traffic patterns that are unlike traditional IT, and changes need to be implemented to accommodate for that. To avoid a “bottleneck” that can occur during the virtualization process, the virtual machine and the underlying physical hardware must be optimized to account for the virtualization process. “Performance and high-availability are critical in the video surveillance market and not all HCI solutions will adapt to video data,” said Dan Pierce, VP of Strategic Sales at Scale Computing. “With Scale Computing’s HC3 platform and BCDVideo’s ‘purpose built’ approach, customers will benefit from a solution that’s adapted to meet industry wide requirements while simplifying the management and maintenance of their infrastructure.” Hyperconverged infrastructure will become more and more prevalent in the video market, especially for large systems that have high camera counts and longer video retention times. Hyperconverged systems offer a more efficient use of resources and save costs because hardware is more fully utilised. Previous problems of using hyperconverged systems for video have been solved, which paves the way for much more widespread deployment. Over time, we should expect hyperconverged system to become more common for larger video installations, such as gaming, sports arenas, large cities, universities, corporate campuses and airports. The key to success is applying knowledge both of the needs of video systems and of how hyperconverged systems can be adapted to meet those needs.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Millennials are an important market, and in one sense, they represent future possibility. The changing tastes and trends of this tech-savvy “Generation Y,” who came of age around the turn of the millennium (circa 2000), are an important consideration in the marketing of security technologies, among many other things. Fortunately, according to a recent survey from ADT, millennials will likely be dependable consumers of security technology products and services for years to come. Smart Phones Essential For Personal Protection Millennials’ dependence on smart phones and smart watches is legendary, and ADT’s survey points to a not-so-obvious benefit this demographic derives from their smart devices: Peace of mind. According to the survey, 90% of millennials say smart phones and related technologies provide them peace of mind when they are alone. In effect, millennials see smart phones as essential devices for their personal protection (in addition to serving almost every other human need). Further, fearless millennials also admit their sense of adventure has limits: some 74% say they have been worried about their physical safety at some point in the last 12 months. Some 75% say they are interested in purchasing a personal security device (such as ADT’s Panic Response app and monitoring service available on Samsung smart watches). Security Concerns Of Millenials 76% of millennials - men and women - have avoided specific experiences due to concerns about personal safety. in the past 12 months, 34% of millennials have avoided crowded spaces such as sporting events or malls. 30% percent of respondents have avoided public transport, 26% have opted out of solo travel, and 25% have not exercised alone due to personal security 90% of millennials take a different route home, switch up the time and place of their exercise, and/or carry pepper spray. 91% of millennials living in urban areas (versus 82% of rural dwellers) think of technology as a safety net. How millennials perceive danger It goes without saying that we live in a dangerous world, and it behooves us (of all ages) to take precautions and be attentive to security. How people perceive danger, and how willing they are to take precautions, is another variable that can ensure a lucrative future in the consumer market for security products and services. That perception and that willingness can be observed in Generation Y. The ability to fully perceive risk comes as a function of age. Young people, for example, may engage in risky behavior because they feel immortal or they do not fully grasp the dangers involved. It is encouraging to know that the tech-savvy millennial generation has developed a healthy awareness of the dangers of the world – and they will likely be good customers for the security marketplace for years to come. Further, the next wave of consumers, “Generation Z,” is growing up in an even more sophisticated media and computer environment – they are also likely to see technology products as a useful safety and security tool.
An upgrade of surveillance, using the latest video technology from IDIS, has put Circuit Zandvoort in poll position as host venue for the 2020 Formula 1 Grand Prix in the Netherlands. As well as wider improvements to the track, a top priority at the circuit was a complete overhaul of the video monitoring capability to meet the requirements of Formula 1. Security and safety surveillance Circuit Zandvoort will be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS For Track Manager Niek Oude Luttikhuis a key objective was to rapidly implement a solution that would be much easier than the previous system to use, maintain and adapt in the future. To achieve this, he brought together a team including IDIS – Korea’s surveillance manufacturer. Significantly improving security and safety surveillance of the track, their solution will also let the Formula 1 organizers temporarily receive functional authorized access of video data for the duration of the competition. Video management software At the heart of Circuit Zandvoort’s new system is IDIS’s server-crunching, 64 channel DS-IR300 NVR technology, pre-loaded with IDIS Solution Suite video management software (VMS). This allows all the track’s existing cameras to be easily integrated and operated alongside the latest IDIS 5MP speed dome PTZs and 12MP bullet cameras. It also delivers impressive new functionality, including ultra-high-definition monitoring capability using IDIS Smart UX Controls. The system now provides real-time image capture of the highest quality, with no lag, ghost-shadowing or stuttering of images, even when cars traveling at high speed are displayed. Critical Failover technology It ensures that recordings are automatically updated without the need for engineer calloutsImages on the racing control room video wall are now crisp and clear. And looking ahead, the IDIS Solution Suite VMS will make it easier to sustain this high standard by allowing cost-efficient, remote firmware updates and system maintenance. Circuit Zandvoort will also now be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS. This protects against video data loss due to a wide range of potential fault conditions, such as network instability or power failure. It ensures that recordings are automatically updated without the need for engineer callouts and with no risk of gaps in recordings while the fault is resolved. No interruption to surveillance The entire upgrade was completed while the original system continued to run in parallel, confirms Track Manager Niek Oude Luttikhuis. This meant there was no interruption to surveillance during implementation, which was vitally important as the track is in almost continuous use. “There is fantastic mutual communication between IDIS and the different suppliers – they think ahead and complement each other,” says Mr Luttikhuis. “And from the start IDIS demonstrated a deep understanding of the security and operational requirements of our circuit and a passion for motor racing.” PTZ cameras for tracking With the new system operational as promised, in the control room a rotating team of 10 people work with the IDIS Solution Suite VMS, with minimal training required to use all its features and functions – including easy search and retrieval, and silky-smooth control of the ultra-high-definition (UHD) PTZ cameras for tracking in real-time. Authorization levels can be set, giving each individual specific user rights, and during the Grand Prix itself the Formula 1 organizers will also be given access to the system. If necessary, this will also include the ability to view and retrieve footage on mobile devices via the IDIS Mobile app – helping the 2020 Formula 1 Grand Prix to run smoothly behind the scenes.
The Danish Superliga football club Brøndby IF were aware that family attendance had fallen at some of the more high-profile games, such as the local derby with F.C. Copenhagen, due to concerns over hooliganism and safety. With an average attendance of 14,000 people per game, and up to 100 registered persons on the stadium blacklist for causing trouble, the football club wanted to find a way to make genuine fans feel safer by preventing problems before they could occur. Improving security With the use of cameras and facial recognition, blacklisted offenders can now be automatically identified in the crowd before they attempt to enter the stadium. This system identifies any individuals registered on the offenders list and alerts security staff to prevent them from entering. The automated procedure at the stadium entrance also decreases congestion at the gates, so genuine fans can get into the stadium faster. As well as improving security outside, the system allows staff more time to focus their attention on creating a safe and entertaining environment for those inside the stadium. The technology can identify faces that are difficult to recognise with conventional techniques Facial recognition server The Panasonic facial recognition software ensures high levels of accuracy. The technology can identify faces that are difficult to recognize with conventional techniques, such as those taken from an acute angle and even when part of the face is concealed or hidden by sunglasses or scarves. In fact, the National Institute of Standards of Technology (NIST) in independent testing identified the system as the most accurate facial recognition server on the market. And the system is already working. One blacklisted offender was prevented from entering the stadium at the very first home game of the season in mid-July and he will receive a fine and extended ban. Protection of personal data However, some fans were initially sceptical about the scheme. They were worried about the Big Brother concerns of privacy and personal data protection. These fears quickly faded once the club explained the sensitive way that the scheme had been implemented. Security personnel remain in control of the process at every stage. The technology flags potential blacklisted offenders and the security advisers then take over and investigate further before taking action. People-led and technology supported The solution is people-led and technology supported. Personal data privacy is also protected because the facial recognition technology does not store the images or data of any supporters, other than those registered on the blacklist. In addition, all personal data is stored on an internal server, not connected to the internet or to any other system, significantly reducing any cyber risk of data breach. After seeing the results of the technology and receiving reassurances about data protection, both Brøndby management and fans alike have welcomed the new technology. Moving forward there is also the potential to utilize a national hooligan register with the system to help spot traveling troublemakers within Denmark.
Zayed University is the newest of three government sponsored higher education institutes in the United Arab Emirates. The campus is located on the mainland of the Emirate of Abu Dhabi, near the Abu Dhabi International Airport and Masdar. The 229,000m campus houses six colleges across 28 separate buildings, including faculty and administration buildings, a childcare facility, residence halls, classrooms, science and computer labs, cafeterias and a sports complex, all equipped with the latest technology. Future development plans will see the student population increase to 7,500 and the campus grow to cover a net area of 269,000m. Access to and from the campus is an important concern for Zayed University and is carefully managed around the clock to keep the 6,000 strong student body safe. Managing gate barriers and doors Banner sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowedThe university employs Serco to implement and manage their security requirements. Serco partnered with Gallagher, selecting the Command Centre security platform to manage gate barriers and access controlled doors with just under 650 MIFARE readers and 130 controllers across the site. Zayed University implements a policy to provide students with a secure campus environment. This includes managing the entry and exit of the students based on their scheduled classes. To achieve this, Zayed University runs an interface between Command Centre and its Banner system. Banner is a comprehensive computer information system that contains information on courses, students, faculty, staff and alumni, including financial aid, finance and human resource components. Entry and exit requests for students to pass through the campus gates are sent from Command Centre to the Banner system for approval, using the Command Centre OPC Alarms and Events interface. Based on the time of the entry or exit and the student’s schedule, the Banner system decides whether the request is accepted or denied. Banner then sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowed. Safe and secure environment for students Its intuitive user interface provides flexibility and easy management of operations"Gallagher security solutions provide the assurance and the knowledge that movement throughout campus is managed simply and efficiently to ensure a safe, secure environment. “Keeping students safe is of utmost importance to us,” says Mukesh Karsan, Serco IT Manager at Zayed University. “The Gallagher system helps us honor this commitment. Its intuitive user interface provides flexibility and easy management of operations.” He adds that he’s been “impressed with the reliability and robustness the system offers; it’s powerful, versatile and allows security personnel to carry out their day-to-day responsibilities with efficiency.” Gallagher solutions are trusted by education providers worldwide to: issue student and faculty access cards manage individual access rights control campus and dormitory access secure computer labs, science labs and other high-value assets integrate with scheduling and resource booking systems evacuate or lock down sites in case of an emergency Time and money saving solutions From intelligent integration with building management systems, to people and time efficiencies gained through automation and smart use of resources, Gallagher designs solutions that save time and money. Whether it’s across multiple zones within a single campus, or over multiple campuses, Gallagher solutions offer an intelligent, powerful way to ensure business continuity, protection of assets and keeping people safe.
Beijing Daxing Airport, due to open in September, will soon be the second in Beijing to secure daily operations with state-of-the-art technology by Airbus. Airbus will provide one Tetra DXTA server, and nine TB3 base stations with eight TTRX 32-channel receivers per base station for Bejing’s second international Airport communication structure. The system will be mutually backed up by the Beijing Capital International Airport to enhance the communication and management of the two airports. The whole network will be put in use before the 30th of September, the official opening date of the airport. This new airport will possess eight runways and serve around 100 million passengers annually, all of which will be secured with Airbus technology. Seamless communications Airbus Tetra system has played a vital role in securing tasks relating to passenger transportationTests carried out in April proved the interconnectivity between the digital trunk communication systems of both airports to be reliable, as stable and clear communications were recorded. The two Tetra systems provided by Airbus are fully interconnected; this will allow for Airport related entities such as Airlines and ground service companies to benefit from seamless communications between both airports. Beijing International Airport is also equipped with an Airbus Tetra system, which has provided highly stable, reliable, and flexible communication security for daily operations since its deployment in 2008. Over the past ten years, it has played a vital role in securing tasks relating to passenger transportation, as well as the logistics of high-scale world sports events. The current system serves over 10,000 subscribers. In 2018, the Beijing Capital International Airport saw over 100 million passengers for the first time, making it the second busiest airport in the world.
AxxonSoft technology speaks to product simplicity, ease-of-use and advanced functionality during the FIFA World Cup in Russia. Within the framework of preparation for the 2018 FIFA World Cup in Russia, AxxonSoft's tech support customized settings on more than 1,350 video channels at 3 stadiums and at a central monitoring station to meet the Ministry of Internal Affairs' needs through a centralized monitoring system. AxxonSoft, in collaboration with this global high caliber event, launched this state-of-the-art technology system within just 1 month, utilizing team members to rollout. Videos were streamed from stadiums and surrounding territories, fan zones, and other locations deemed critical from the point of security Situational Video Analytics AxxonSoft's Intellect software managed a total of 960 video surveillance channels at Samara Arena, Mordovia Arena, and RZD Arena — the latter of which was used as a training base for referees. 250 of those channels employed AxxonSoft's situational video analytics to monitor the stadiums, 41 license plate recognition channels to monitor vehicle traffic, and 9 facial recognition channels to monitor for individuals prohibited from accessing the stadiums. Video monitoring was also integrated with access control, fire and security alarm systems. The Ministry of Internal Affairs' central monitoring station, powered by AxxonSoft's Intellect PSIM platform, pooled over 390 video channels from all 11 World Cup host cities with video feeds displayed on an interactive map. Videos were streamed from stadiums and surrounding territories, fan zones, and other locations deemed critical from the point of security for participants and guests of the World Cup. Integrated Access Control Software The World Cup stadium security project included requests to integrate access control software, as well as develop a screen manager to adaptably manage camera layout and the video wall. These functions were successfully implemented at the World Cup stadiums and will be incorporated in Intellect 4.11.0. Over 9,000 Intellect-powered video surveillance cameras were used to monitor the security of over 2 million spectators The Intellect PSIM platform was employed in various areas of 10 out of the 12 stadiums where 49 World Cup matches were played. Over 9,000 Intellect-powered video surveillance cameras were used to monitor the security of over 2 million spectators who attended the games. AxxonSoft software was also widely used at training camps, fan zones, transportation infrastructure, and other sites where teams and fans arrived and moved around the country. Advanced Stadium Security Technology “The team at AxxonSoft were really excited to be part of a project of this caliber. We were able to demonstrate product simplicity, ease-of-use and advanced functionality through our stadium security technology. The FIFA World Cup was a great success in Russia and just proves how we can work together with top agencies and companies to provide a safe environment for all,” says Global Marketing Director for AxxonSoft, Colleen Glaeser. FIFA president Gianni Infantino called the 2018 World Cup the best in its history. In addition to commenting on match attendance and television viewership numbers, Infantino gave high praise to the quality of infrastructure and security.
Hytera, a global provider of innovative Professional Mobile Radio (PMR) communications solutions, announces that it has signed contracts with Secretariat of Public Security of the State of Alagoas, Brazil to provide TETRA communications infrastructure as the expansion of the statewide mission critical communications network and four-year maintenance service. The total contracts value is around 6.5 million US dollars with the infrastructure contract around 1.3 million and the service contract around 5.2 million. “We are excited being chosen as the equipment and service provider of Alagoas’s statewide TETRA system. The state authority shows confidence in Hytera’s ability to deliver advanced and reliable public safety communications networks. For the expansion, we presented the latest development of TETRA technologies,” said John Zhou, the General Manager of Hytera Brazil. “The new contracts as a milestone for Hytera Brazil recognize us not only as a leading TETRA solution provider, but also a trusted service provider, and it is the embodiment of Hytera transformation globally.” In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas TETRA Communications Network In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas, who were modernising its communications systems to better serve the communities and prepare for the global soccer fiesta, the World Cup 2014. The newly signed equipment contract includes 31 sites with Hytera’s latest TETRA innovation, DIB R5 base station. It adopts a maintenance-free, space-saving design and can be installed on walls, antenna masts or in tunnels. Thanks to its low power consumption and passive cooling, it is ideal for use in areas where power supply is critical or where there is a need for battery-based, portable base station solutions. With the expansion of the TETRA network, different public safety forces such as police, firefighters and emergency response in the State of Alagoas will share the network to facilitate optimal cooperation when the situation requires, which is another big step forward by the local authorities to improve the security of the state.
Round table discussion
A major benefit of technology innovation is more application opportunities. As video cameras become better and more versatile, new uses are emerging that extend the benefits of video surveillance, often outside tried-and-true parameters. Sometimes security camera manufacturers are on the front lines to see new ways video is contributing value to integrators and end user customers. We asked this week’s Expert Panel Roundtable participants: What is the most unusual application of surveillance cameras you have seen recently?
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload