Pulse Secure, a renowned provider of Zero Trust Secure Access solutions, announced that analyst firm Frost & Sullivan recognized Pulse Secure among the top ten NAC vendors by global revenue market share and one of six leading vendors to show market share gain. Frost and Sullivan market report identifies Pulse Secure among top 10 Network Access Control (NAC) vendors by global revenue market share. The 2020 Frost & Sullivan Network Access Control (NAC) Market, Forecast to 2024 report stat...
Hikvision UK & Ireland has announced offering security installers, integrators and end users the opportunity to undertake free online training on its fever screening thermal products and solutions. Hikvision thermal cameras Hikvision’s newly developed thermal cameras can be configured to aid high level screening by detecting elevated skin-surface temperatures, and are suitable for use in rapid preliminary fever screening in office buildings, factories, railway stations, airports and...
IDIS has further enhanced its IDIS Center VMS, adding new features and functions targeted at small to mid-sized enterprises and multi-site customers. Organizations can build powerful centralized monitoring solutions, quickly and easily, when implementing IDIS Center together with the wide selection of IDIS DirectIP cameras and powerful NVRs. These deliver customer lifecycle savings of 50% or more compared with server-based solutions, thanks to reduced installation time, no upfront or ongoing li...
Hanwha Techwin America, global supplier of IP and analog video surveillance solutions, has announced that Hanwha’s Wisenet L series cameras are now compatible with the Genetec Stratocast cloud-based video surveillance-as-a-service (VSaaS). Through this technology partnership, customers across a broad range of industries will now be able to reap the benefits of an easy to install true-cloud solution whether they want to support hybrid-cloud deployments, add new cameras in remote locations,...
Cheshire, UK, based Anekanta Ltd (Anekanta) and New York, USA, based GT Digital (GT) announced that they are working together to progress GT’s patent-pending, innovative, cognitive intelligence platform MediaMaestro. Through its advanced military-grade proprietary algorithms, MediaMaestro can automatically predict emerging threats before they happen, enable fast mitigating action and provide continuous updates to a rapidly evolving scenario. In a society where the threats to the s...
Quantum Corporation announces it has completed its acquisition of the ActiveScale™ object storage business from Western Digital Technologies, Inc., a subsidiary of Western Digital Corp. The acquisition expands Quantum’s leadership role in storing and managing video and other unstructured data using a software-defined approach. Jamie Lerner, President and CEO, Quantum commented, “The strategic acquisition of ActiveScale bolsters our existing product portfolio and expands our ad...
Aqua Security, the platform provider for securing cloud native applications and infrastructure, announced that its open source Trivy vulnerability scanner is now available as an integrated option in several widely deployed cloud native platforms. Trivy is a comprehensive and easy-to-use open source vulnerability scanner for container images. Since its introduction 10 months ago, the project has gained a broad following among open source community members who have tagged it with more than 3,300 GitHub stars. Unlike other open source scanners, Trivy covers both OS packages and language-specific dependencies and is extremely easy to integrate into organizations’ software development pipelines. Integrated scanning option Trivy is now available under the Apache 2 license, allowing royalty-free use, modification, and distribution of the software. Trivy will be included as the default scanner in Harbor, a popular open source container image registry project under the Cloud Native Computing Foundation, and in addition, the widely used container platforms Docker and Mirantis Docker Enterprise will make Trivy available as an integrated scanning option for their deployments. “Trivy takes container image scanning to higher levels of usability and performance. With frequent feature and vulnerability database updates and its comprehensive vulnerability scanning, it is the perfect complement to Harbor. In fact, we made it the default scanner option for Harbor registry users in the upcoming v2.0 release because of these capabilities,” said Michael Michael, Harbor Maintainer and Director of Product Management at VMware. “With Trivy, Harbor users can easily and quickly scan their container images for vulnerabilities on an ongoing basis.” Flexible container management platform technology After evaluating several leading options for open source vulnerability scanning, Trivy really stood out" “Trivy is a container image scanner that is so incredibly easy to use and fast to scan,” added Justin Cormack, Security Lead at Docker and a member of the CNCF Technical Oversight Committee. “It suddenly means that vulnerability scanning becomes easy to integrate into your daily routine, scripts and CI, which is the way it should be” "After evaluating several leading options for open source vulnerability scanning, Trivy really stood out,” said Milind Gadre, VP of Engineering at Mirantis. “Mirantis will enable Trivy as an integrated component that's verified as compatible with the Docker Trusted Registry included in our Docker Enterprise solution. We're extremely excited to extend our leadership in secure, flexible container management platform technology for organizations with challenging security and compliance concerns.” Cloud security posture management Liz Rice, VP Open Source Engineering at Aqua and Chair of the Cloud Native Computing Foundation’s (CNCF) Technical Oversight Committee (TOC) leads the team of dedicated open source developers at Aqua who work on the company’s open source software and also actively contribute to other community projects. “Our team is excited by the level of interest in and adoption of Trivy, and this increases our determination to make Trivy the most widely adopted open source solution for container vulnerability scanning.” said Rice. Trivy is part of Aqua’s portfolio of open source cloud native security projects, including: kube-bench: Winner of the 2018 InfoWorld Bossie Awards, kube-bench automatically determines whether Kubernetes is configured according to recommendations in the CIS Kubernetes benchmark. kube-hunter: Penetration testing tool searches for weaknesses in Kubernetes clusters so administrators, operators and security teams can identify and address any issues before attackers are able to exploit them. Tracee: Traces events in containers using eBPF, a kernel technology that lets users run custom programs within the kernel itself. CloudSploit: Provides cloud security posture management (CSPM), evaluating cloud account and service configurations against security best practices. kubectl-who-can: An extension to the standard kubectl tool that simplifies queries about Kubernetes role-based access control (RBAC) configuration.
IP Communications enabler Softil announces that its BEEHD technology has been selected by Fujitsu Spain to build the ARCONTE Trial Recording System. The multilingual, secure, modular and adaptable digital recording system will allow courts to work more quickly, transparently, and cost-efficiently. The system also ensures compliance with strict mandatory data requirements across Europe, Middle East, India and African (EMEIA) jurisdictions where courts are legally required to record and store legal proceedings. Cloud-ready system ARCONTE is already used by three out of four Spanish courts and has processed more than five million court cases to date. The cloud-ready system seamlessly integrates with other judicial applications and can store more than 500,000 hours of video per year. Fujitsu now offers courts across the EMEIA region the finest trial recording system on today’s market" “Fujitsu now offers courts across the EMEIA region the finest trial recording system on today’s market,” says Vicente Delás, Director of Justice Solutions at Fujitsu Spain. “Inevitably, our developers turned to the world’s leading IP enabler Softil for its software development kit and support teams to build the Fujitsu ARCONTE system.” Case management applications “Softil’s BEEHD technology is enabling many of the world’s IP communications providers to deliver the highest quality end-products across all sectors of human activity and Fujitsu ARCONTE is a perfect example,” adds Pierre Hagendorf, Softil’s CEO. Fujitsu ARCONTE enables courts to seamlessly and securely record audio-video, and to catalog, store, share and electronically distribute all the documentation generated during court hearings and trials. This significantly speeds up administrative processes. For minimal disruption and added efficiency, the solution can be easily integrated with other court applications, including case management applications. Data security and integrity Fujitsu ARCONTE uses digital seals and signatures to certify recordingsAs courts move towards paperless, electronic processing, the cloud-ready solution from Fujitsu offers a reliable, powerful audio and video recording platform to replace traditional documentation methods, while offering maximum data security and integrity. Fujitsu ARCONTE uses digital seals and signatures to certify recordings, helping meet compliance requirements. The new video conferencing solution is a complement of a trial recording application based on windows PC. The application allows video and voice conferencing from the same system used to record the trial and supports H323 and SIP protocols. It replaces an earlier video conferencing solution from another IP supplier from lack of support. Development of voice and video solutions BEEHD was chosen as a replacement and Fujitsu decision has “since been validated and impressed with the quality, time to market, support received and overall experience working with Softil,” adds Vicente Delás. Softil’s BEEHD technology is a cross-platform framework designed for chipset vendors, device manufacturers, system integrators, application developers and service providers looking to accelerate development of voice and video solutions over IP.
Maxxess Systems, a global provider of event response management and collaboration systems, has launched a new website specifically designed to strengthen company communications and serve as a platform for providing ongoing value to the Integrated Security market. The new site features separate dedicated areas for each of the primary offered software platforms, and includes new spaces for case studies and blog postings to share market insights, trends, and examples to benefit the industry. Vibrant collaborative communication space Maxxess also indicated that they welcome the opportunity to publish guest blogs “Maxxess offerings are focused on improving the coordinated response to critical events and security issues, and are presently installed in thousands of facilities around the globe,” said Nancy Islas, President Maxxess Systems. “Our new website not only showcases Maxxess’ experience, strength, and leadership in these areas, but also provides a strong foundation for building a vibrant collaborative communication space to share information and best practices as we roll out new offerings and resources.” In addition to being fully responsive to ensure a positive user experience across all platforms on any device, the site features the company’s new theme, “Coordinate Your Security”. This theme reinforces the wide range of possible tailoring and implementation choices available for each platform as well as the scores of integrations that have already been completed with dozens of the security industry’s leading manufacturers. Add further value for the community Maxxess also indicated that they welcome the opportunity to publish guest blogs, case studies, and other forms of contributed content from customers and experts in the field that would add further value for the community. The company website can be visited to view their new Launchpad site, and to see new materials added over the coming months, the site can be checked back often.
Namib Property Patrols Ltd, the Oxfordshire-based security and protection company, is using employee scheduling and mobile workforce management software SmartTask to streamline operational processes, saving both time and money. The company is using the software for proof of attendance and guard monitoring across its mobile patrol and alarm response operations, which has helped reduce in administration by more than 15-hours a month, while enhancing service delivery to customers. Credible and transparent security services “We strive for quality through technology, so we needed a software solution that would enable us to serve our customers better; operate on tight margins in order to give value for money; and continue to innovate,” explains Joel Shikongo, Operations Director at Namib Property Patrols Ltd. “SmartTask is enabling us to deliver high-quality, credible and transparent security services in the most efficient manner possible.” The simple expandability of the software is enabling the company to take a phased roll-out" SmartTask was selected following a review of the marketplace to replace manual processes that had become time-consuming and no longer met the reporting needs of the business. The simple expandability of the software is enabling the company to take a phased roll-out with plans to adopt additional functionality, such as SmartForms for electronic incident and logbook reporting, in the next 12 months. Alarm response callouts Namib Property Patrols uses SmartTask at around 40 commercial and industrial sites within Oxfordshire to record arrival and departure times for mobile patrols and alarm response callouts. For scheduled patrols, active tags are used at critical and vulnerable points around the customer’s premises, which are scanned by an asset protection officer using a SmartTask-enabled smartphone. These tags can also contain unique messages to communicate specific tasks and patrol requirements. Namib Property Patrols has full visibility of completed work and officer welfare from its head office in Bicester, with the ability to create electronic operational reports at a push of a button. Clients can also log in to an online customer portal to view their individual security activity in real-time and generate bespoke performance reports. Reducing printing costs Our software is already delivering proven results for a wide range of businesses" As a result, the company has been able to dramatically reduce the time needed to compile reports, saving more than 15-hours each month, as well as reducing printing costs by around 50 per cent. “SmartTask is an ideal fit for our brand and values, underpinning our commitment to operational excellence and client satisfaction. The software is not only helping us to streamline our processes and operate more effectively in an ever-evolving world, but also retain and win business by always putting the customer first. SmartTask’s team is always on hand to provide first-rate support and is constantly looking at new ways to improve our service delivery, so they are a highly-valued technology partner,” adds Shikongo. Mobile workforce management solution Paul Ridden, CEO of SmartTask commented: “We have created an employee scheduling and mobile workforce management solution that is highly configurable and feature rich, so is a perfect fit for SME, mid-sized and top 30 security companies alike. Our software is already delivering proven results for a wide range of businesses by helping them to better plan, manage, deliver and report on their security services.”
Pivot3, a provider of intelligent infrastructure solutions, announced that it achieved Common Criteria Assurance Continuity certification for its Acuity 10.6 hyperconverged infrastructure (HCI) software platform. Pivot3 is the only HCI vendor with Common Criteria certification of a native-NVMe solution with policy-based management to automate data protection, security and workload performance. This provides government and enterprise customers with unprecedented capabilities to meet the highest security standards across the edge, core and cloud. Edge strategies The Common Criteria certification is considered the gold standard for securityMore than ever, enterprise-generated data is being created and processed outside of datacenters and the cloud. Because of this, government agencies and other highly-regulated industries are incorporating edge strategies into their initiatives to support the management of highly distributed data and infrastructure. “As more data is generated beyond the datacenter, federal customers require infrastructure solutions with the intelligence necessary to process and analyze across the edge, core and cloud – but without compromising security,” said Ben Bolles, vice president of product, Pivot3. “The Common Criteria certification is considered the gold standard for security, providing Pivot3’s customers with the confidence in knowing that their most mission-critical environments are protected and secure.” Framework for evaluating security features Common Criteria is an internationally recognized set of guidelines (International Organization for Standardization 15408), which define a common framework for evaluating security features and capabilities of information technology security products. This certification assures both government and private-sector organizations that Pivot3 provides the infrastructure necessary to mitigate emerging threats without compromizing security, resilience and manageability at scale. Pivot3 had previously attained Common Criteria certification on its prior generation software platform. The Common Criteria certification process consists of several evaluation assurance levels, each one more stringent than the last, with product security testing performed by accredited independent, third-party laboratories. This evaluation is recognized by over 28 participating countries, and others who follow the Common Criteria program unofficially such as the European Union. Common Criteria certification Commercial organizations also require Common Criteria certification for infrastructure and software solutionsThe U.S. government – as well as many other governments around the world --mandate Common Criteria certification of security products for purchases. All U.S. federal agencies are required to purchase commercial products that have met specified third-party assurance requirements and have been tested by an accredited national laboratory. Many commercial organizations also require Common Criteria certification for infrastructure and software solutions due to the certification’s intense security standards. Corsec, the global pioneer in product security requirements hardening, assisted Pivot3 with its Common Criteria evaluation and helped streamline the certification effort. Acuity software platform “Government agencies face new challenges as they seek to keep up with the growing complexity of IT while protecting against ever-increasing security threats,” said Matthew Appler, CEO, Corsec Security, Inc. “Pivot3’s achievement of the Common Criteria certification on the latest generation of its Acuity software platform brings a powerful range of new capabilities to this market, providing agencies with the intelligent solutions needed to serve citizens and protect our nation’s infrastructure.”
Drones are commonly known for flying in the sky, but a new breed is rolling around on the ground and swimming in the ocean. Now, in an alliance straight out of science fiction, two CT-based drone companies are joining forces to take on the task of protecting our planet using both airborne and amphibious drones by automating operations in security, environmental and even military fronts, globally. Harford based Aquiline Drones (AD), a premiere Cloud and drone solutions company, will be powering GuardBot's spherical and amphibious robotic vehicles via the AD Cloud (or ADC). Like Amazon's AWS, ADC is quickly becoming the industry Gold Standard for all Unmanned Vehicle (UV) operations, taking full advantage of its capacity, modularity and truly salient features for autonomous assignments, operations and quests. Advanced AI for complicated missions “Our new alliance with Aquiline Drones now gives us the ability to program our bots with advanced AI for complicated missions in surveillance, security and detection. And with AD’s focus on US supply chain manufacturing, this is truly pioneering a new direction for drone technology in the US,” noted Peter Muhlrad, President of GuardBot. "GuardBot was initially conceived for a planetary mission on Mars. As such, our robots can traverse all terrains, including paved roads, dirt paths, dunes, snowy fields, sloped mountains, or even water surfaces. GuardBot spherical robots can even navigate upstream,” said Muhlrad. “And with the right sensor, camera and/or acoustic package, the use cases are endless,” Muhlrad notes. “Our new collaboration with Aquiline Drones couldn’t be timelier! The first batch of GuardBots will be manufactured at AD’s downtown Hartford facility starting in May,” added Muhlrad. Interchangeable sensors Each GuardBot is equipped with pods on its right and left sides that contains interchangeable sensors GuardBot’s circular drones range from 6.5 inches to 7 feet in diameter and move using a patented drive-mechanism that allows it to easily provide forward and backward motion as well as make 360-degree turns. They can operate continuously for up to 25 hours on one charge and reach speeds of up to 12 mph on land and 3 mph in water. Each GuardBot is equipped with pods on its right and left sides that contains interchangeable sensors, such as video cameras, thermal, infrared, microphones GPS and audio for continuous content gathering, transmission of data and constant communication with command control. AI and IoT infrastructure management “In the coming months, ADC will undergo rigorous testing, hosting and management trials with GuardBot’s proprietary software application. ADC’s highly modular AI architecture is suitable for crucial customization of solutions typically not available in the open marketplace. And, as an unmanned vehicle cloud, no other cloud platform provides the same level of robustness and salient features that enable complex mission planning scenarios, autonomous flight and ground operations powered by AI and IoT infrastructure management,” said Barry Alexander, Founder and CEO of Aquiline Drones and AD Cloud Services. “We eagerly anticipate integrating GuardBot’s entire network of all-terrain drones into our cloud to provide enterprise asset management (EAM) services, including data gathering, analytics, modeling and storage capabilities,” Alexander added. "Additionally, the timing of this hi-tech endeavor could not be more opportune - not just for Connecticut, which is quickly becoming the drone capital, but for our entire nation!" Advocates workforce development Admittedly, drone technology is exciting, ushering in a plethora of opportunity industry wide" "Admittedly, drone technology is exciting, ushering in a plethora of opportunity industry wide. AD strongly advocates workforce development and intends on using the burgeoning AD brand to further expand the industry, thus creating opportunity for all interested,” Alexander continued. "Given the abundance of use cases in our defense department and other government agencies, AD is particularly pleased with the opportunity it delivers to our veterans,” Alexander added. “Not only is GuardBot useful technology, but it is truly thrilling,” said Alexander. "Civic unions are born out of compatibility, and business is no different. Can’t think of a better way to describe the exciting collaboration between Aquiline and GuardBot,” Alexander added. “GuardBot dovetails nicely into our business model and complements our mission of pioneering a new direction in the UAV/S industry where safety comes first,” Alexander concluded. Audio/visual sensors As GuardBot’s amphibious and land-based drones can be outfitted to carry payloads, such as audio/visual sensors, fire retardant liquids and ground penetrating radar, Muhlrad and Alexander both emphasize that the collaboration of their companies will produce a variety of new and powerful capabilities for drone systems, including: Aquatic Military Missions Forest Fire Mitigation Security Monitoring (home, construction and commercial endeavors) Beach Patrol and Harbor Security School Safety Identification and Detection of Explosive Materials Ecologic and Geologic Testing (of volcanoes, mountains and other land structures to detect and warn of natural disasters) Parking Garage/Lot Surveillance Homeland Security Amphibious Surveillance Broadcasting and Multi-Venue Live Sportscasting Monitoring Hazardous Materials Spills and Environmental damage Safety Monitoring of Dangerous Weather Conditions Detection of Hazardous Chemicals Strict safety standards Further, through cloud-based transmitters, AD’s aerial hardware will be able to deploy and communicate with GuardBot’s ground-based vehicles for a seamless unmanned system that works together in solving potential life-threatening issues like fires, theft, vandalism and violent attacks. “Being pilot-owned and boasting more than 200 years of collective experience in the aviation industry, Aquiline Drones understands and adheres to the strict safety standards of the Federal Aviation Administration,” adds Alexander. “In addition, as one of only four drone airline companies in the United States holding an FAA 135 Air Carrier Certificate, we offer future operational flexibility to facilitate approvals and exemptions on non-traditional, augmented and unique UAV operations such as the GuardBot collaboration.”
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or repetitive. AI in its previous state was known as “machine learning” or “machine processing” which has evolved into “deep learning” or, here in the present, Artificial Intelligence. AI as it applies to the security and surveillance industry provides us the ability to discover and process meaningful information more quickly than at any other time in modern history. Flashback - VCR tapes, blurred images, fast-forward, rewind and repeat. This process became digital, though continued to be very time-consuming. Today’s surveillance video management systems have automated many of these processes with features like “museum search” seeking an object removed from a camera view or “motion detection” to create alerts when objects move through a selected viewpoint. These features are often confused with AI, and are really supportive analytics of the Artificial Intelligence, not AI themselves. Machine Learning Fully appreciating AI means employment of a machine or series of machines to collect, process and produce information obtained from basic video features or analytics. What the machines learn depends on what is asked of them. The truth is, the only way the AI can become meaningful is if there is enough information learned to provide the results desired. If there isn’t enough info, then we must dig deeper for information or learn more, properly described as “deep-learning” AI. Translated, this means that we need to learn more on a deeper level in order to obtain the collaborative combined information necessary to produce the desired result. Deep learning AI Deep learning AI can afford us the ability to understand more about person characteristic traits & behaviors. Applying this information can then further be applied to understand how to interpret patterns of behavior with the end goal of predictable behavior. This prediction requires some degree of human interpretation so that we are able to position ourselves to disrupt patterns of negative behavior or simply look for persons of interest based on these patterns of behavior. These same patterns evolve into intelligence which over time increases the machine’s ability to more accurately predict patterns that could allow for actions to be taken as a result. This intelligence which is now actionable could translate to life safety such as stopping a production manufacturing process, if a person were to move into an area where they shouldn’t be which might put them in danger. Useful applications of intelligence Informative knowledge or intelligence gathered could be useful in retail applications as well by simply collecting traffic patterns as patrons enter a showroom. This is often displayed in the form of heat mapping of the most commonly traveled paths or determining choke points that detract from a shopper’s experience within the retail establishment. It could also mean relocating signage to more heavily traveled foot-paths to gain the highest possible exposure to communicating a sale or similar notice, perhaps lending itself to driving higher interest to a sale or product capability. Some of this signage or direction could even translate to increased revenues by realigning the customer engagement and purchasing points. Actionable Intelligence From a surveillance perspective, AI could be retranslated to actionable intelligence by providing behavioral data to allow law enforcement to engage individuals with malicious intent earlier, thus preventing crimes in whole or in part based on previously learned data. The data collection points now begin to depart from a more benign, passive role into an actionable role. As a result, new questions are being asked regarding the cameras intended purpose or role of its viewpoint such as detection, observation, recognition or identification. Detecting human presence By way of example, a camera or data collector may need to detect human presence, as well as positively identify who the person is. So the analytic trip line is crossed or motion box activated or counter-flow is detected which then creates an alert for a guard or observer to take action. Further up the food chain, a supervisor is also notified and the facial characteristics are captured. These remain camera analytics, but now we feed this collected facial information to a graphic processing unit (GPU) which could be employed to compare captured characteristics with pre-loaded facial characteristics. When the two sources are compared and a match produced, an alert could be generated which results in an intervention or other similar action with the effort of preventing a further action. This process- detect, disrupt, deter or detain could be considered life-saving by predictably displaying possible outcomes in advance of the intended actions. The next level is deep-learning AI which employs the same characteristics to determine where else within the CCTV ecosystem the individual may have been previously by comparatively analyzing other collected video data. This becomes deep-learning AI when the GPU machine is able to learn from user-tagged positive identification, which the machine learns and begins to further reprocess its own data to further understand where else the person of interest (POI) may have existed on the ecosystem and more correctly improve its own predictive capabilities, thus becoming faster at displaying alerts and better at the discovery of previously archived video data. The future In conclusion, the future of these “predictables” wholly rests in the hands of the purchasing end-user. Our job is to help everyone understand the capabilities and theirs is to continue to make the investment so that the research perpetuates upon itself. Just think where we’d be if purchasers didn’t invest in the smartphone?
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campusFinally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-Based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyze the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualize it on Security Center maps, leveraging the dynamic visualization capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorized dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localization system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyze more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilizing the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and caliber of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment program Shot Tracer has launched a reseller recruitment program with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Critical building management and security systems at one of the most advanced super-high-rise towers, the landmark Wasl Tower in Dubai, are to be integrated with Maxxess eFusion technology. The 302-meter multipurpose tower, which will be operated by the Mandarin Oriental Hospitality Group, incorporates offices, guest rooms, public areas and apartments, and is situated in a pivotal Dubai location. The Wasl Tower is designed with advanced sustainability features including natural shading and cooling, adaptive lighting, one of the world’s tallest natural ceramic facades, and a vertical boulevard. eFusion was selected for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. With a modular, building block approach, eFusion provides an umbrella management system and drives service efficiency by removing the need for operators to continually switch between systems. Visitor management system By keeping it simple and integrating with the widest choice of technologies, Maxxess removes the complexity A key use of the technology will be to integrate back-of-house operations at the Wasl guest apartments with front-of-house systems, for maximum ease of use and operational efficiency using the Maxxess unified platform. This eFusion solution comprises a 900-plus reader ASSA ABLOY VingCard access control system, a 1700 camera Hanwha surveillance system, and advanced key management with Deister ProxSafe, and it will use the BACnet protocol to integrate the building management system (BMS). The Tower will also benefit from Maxxess VisitorPoint visitor management system, a Zenitel intelligent communication system and disabled call-to-assist alarms. The VisitorPoint integration will improve the guest and resident experience, reduce administration and front-desk queuing, and ensure smooth running of functions from visitor and contractor management to collections and deliveries, and security. Streamline security, safety and facilities management “The challenge with projects of this scale is to find a simple, straightforward platform that communicates with everything and works with all the systems involved,” says Lee Copland, Managing Director EMEA, Maxxess. “By keeping it simple, and integrating with the widest choice of technologies, Maxxess removes the complexity.” The Wasl Tower project is the latest of a growing number of mixed-use developments, including hotels, retail, office and residential complexes to use eFusion to streamline security, safety and facilities management. Last year Maxxess won an Intersec Award for its major eFusion implementation at Bluewaters Island.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Cold winter temperature requires high-performance equipment capable of operating in extreme environments Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Access ANPR Camera The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. Built-in intelligent video analytics When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. IR Mini-Bullet Network Camera The camera uses a set of optical features to balance light throughout the sceneFor both approaching and departing vehicles, the access ANPR camera takes a snapshot of the license plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Smart residential solution Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. "We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases”, said Arman, General Manager of BI Group.
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbor for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container services to and from Iceland, along with refrigerated cargo logistics and international forwarding around the world. Special kind of surveillance system One of their locations is a harbor in Reykjavik, which includes warehouses. Operating in sub-zero temperatures and with low-light even in daytime for some of the year, Samskip needs a special kind of surveillance system. When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely. These are also the temperatures where maintenance is more challenging – these are not ideal environments for technicians to be working outside. The biggest snow depth ever recorded in Iceland was 279cm in North Iceland in March 1995, for example. Although this was the worst winter ever recorded, it gives an idea of the potential extremes. There are also snow storms and the high wind chill factor to contend with. Providing clear images in failing light Low light in the winter months means that solutions in Iceland need to be better able to provide clear images in failing light. During winter, Iceland’s high latitude means shorter days - the longest day in the middle of December has only 5 hours of light, for example, with the sunrise at around 11am and sunset between 3 and 4pm. Despite these unique conditions, Samskip needed to have a good overview over all that is happening around the harbor complex, both inside and outside. Specifically, they needed to be able to trace products and goods in the warehouse. Iceland’s security provider, Securitas, rose to the challenge, providing a solution using more than 150 Hikvision products, including PanoVu and DarkFighter® cameras. All these cameras can operate to a temperature of -30˚C. Identifying potential issues The PanoVu cameras provide excellent wide angle surveillance to cover as much of the area as possible. DarkFighter technology is a popular choice in Iceland because it gives clear, useful images even in the lowest of light scenarios. The smart function on the cameras means that operators are able to identify potential issues by analyzing people's behavior. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications They can also trace a product between locations and see its condition at receipt and delivery, enhancing both security and business efficiency. To complement the Hikvision solutions, Securitas chose Seagate as their preferred storage vendor with their Skyhawk. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications. Providing reliable security Skyhawk surveillance drives are equipped with enhanced ImagePerfect™ firmware to deliver ultimate reliability and zero dropped frames, and SkyHawk Health Management, a software designed for prevention, intervention and recovery. Bergvin Þórðarson, Samskip’s Security Manager, says: “The cameras meet the requirements for analysis of people and merchandise. We are confident with both Hikvision and Securitas – in both their product and people. We know that they will fix any issues and react quickly if there’s a problem.” Securing large areas can be a challenge all on its own, but the addition of potentially crippling weather conditions means a security solution needs to be robust. Hikvision cameras were up to the challenge and provided reliable security for the entire operation.
The sensor solutions provider HENSOLDT will equip the Royal Thai Police with its Single Mast Solution (SMS) consisting of the Spexer 360 radar integrated with an electro-optics system and the CxEye Software. After passing acceptance trials without issue, the SMS was delivered. SPEXER 360 X-band radar “Our Single Mast Solution is an extremely reliable radar, particularly suited for situational awareness”, said Nathan Manzi, Head of Asia Pacific for HENSOLDT. “CxEye assists the users, in real time, to easily and quickly evaluate and coordinate a response to threats.” SPEXER 360 is a lightweight, low power, X-band radar, designed to be deployed on a variety of platforms. SPEXER 360 can be easily integrated with additional sensors through a highly flexible C2 system. Designed for both military and civil applications SPEXER 360 offers a highly capable and affordable surveillance capability. HENSOLDT’s CxEye, command, control and display software, provides powerful integration for sensors, such as radars and cameras, within a single, simple, easy to use display package.
Genetec Inc., globally renowned technology provider of unified security, public safety, operations, and business intelligence has announced that the city of New Orleans (NOLA) is relying on Security Center, the company’s unified IP security platform, to improve public safety and enhance city-wide collaboration. With about 400,000 residents, New Orleans (NOLA) is the most populous city in the State of Louisiana. Like other big cities, NOLA is focused on enhancing public safety for its citizens and the 1.2 million visitors who flock to the city’s French Quarter for Mardi Gras celebrations. Using Security Center, the NOHSEP agency has saved police officers about 2000 hrs of investigative work in just a year Genetec Security Center As part of a Citywide Public Safety Improvement Plan that included the deployment of a new citywide public safety system and the construction of a Real-Time Crime Center (RTCC), the New Orleans Homeland Security and Emergency Preparedness (NOHSEP) chose the Genetec Security Center unified platform to support all city agencies. Using Security Center, the NOHSEP agency has saved police officers about 2000 hours of on-foot investigative work in just one year. “It might take a police officer over an hour to visit business locations, speak with owners, look through video, find what they are looking for, get a copy of video onto USB keys, drive back to the precinct, and then submit that into evidence." said George Barlow Brown, IT Manager at the New Orleans Real Time Crime Center. Video and ALPR cameras He adds, “So, we have essentially saved the department over 2000 hours of manual labor in physically collecting and storing video evidence. That’s more time for officers to respond to calls of service and be present in our many neighborhoods, which helps build community confidence. The ROI is there for us in terms of the efficiency,” The team can now easily retrieve evidence from over 325 city-owned video cameras and 100 automatic license plate recognition (ALPR) cameras (60 of which are Security Center AutoVu cameras) from the Real-Time Crime Center. The new security platform is integrated with other public safety solutions such as a Briefcam analytics system and a computer-assisted dispatch (CAD) system. All this information gets routed through to a central command center, speeding up emergency response. Share video access with RTCC “Our operators do the full investigative work right from within Security Center. It’s just one of the most intuitive solutions that I have ever seen. We can display up to six video tiles and hit ‘synchronize video’ to see various angles of the same scene playing at the same time. We can then select the segment of video we need and hit export. Each 10-minute segment from all the video tiles is then archived for viewing later on,” said Brown. NOLA is also leveraging Security Center to foster a true public-private partnership. The city launched a platinum version of the SafeCam project, which allows businesses to share access to external video cameras with the RTCC. Motion-detection alarms Using the Genetec Federation feature, the NOHSEP team can access video from participating companies’ systems Using the Genetec Federation feature, the NOHSEP team can access video from participating companies’ systems. Participating businesses can be identified by discrete signage at their front entrances. This tells on-the-ground officers that this business has shared their outdoor cameras with the RTCC, and there is no reason to disturb the establishment or their customers. The officer can simply call RTCC operators to get the evidence they need. Brown and his team also have motion-detection alarms set up on cameras facing some known illegal dumping sites. As soon as someone dumps refuge in these locations, the team can proactively notify the Sanitation Department so they can collect the debris. Mining video and data NOLA is making the most of its security investments to improve city life too. For one, the RTCC operates a backup emergency operations center for the city of New Orleans. The NOHSEP team has also shared video feeds with other city departments such as the Sewage and Water Board, so they can determine the rate at which an intersection floods. As plans continue to evolve, the RTCC team is taking full advantage of the new technology to keep NOLA safer. “As far as investigations and the ability to mine video and data, Security Center is hands-down the best product out there. With this platform, we’re extending greater efficiency to responding officers, and we’re also forging stronger partnerships with our community. Together, we’re all working smarter and faster to keep New Orleans safe,” concluded Brown.
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-Line distance education Wintec’s programs and qualifications are nationally and internationally recognized Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programs and qualifications are nationally and internationally recognized and its degrees have equal status to those from universities. The degree programs include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognized nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organization, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analog and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrollment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilize Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilization of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organizations have yet to realize. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognizing the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilization (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilization reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximizing the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
Round table discussion
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
The manufacturers behind today’s security technologies are a varied bunch. There are large manufacturers with deep pockets and plenty of resources. And there are smaller manufacturers who are nimble, can react faster to changing market conditions and to whom each customer represents a hard-fought win. There are also plenty of manufacturers in the middle ground. But what impact does the size of a company have on the quality of its products? We took the question to this week’s Expert Panel Roundtable: Is there a correlation between the size of a manufacturer and the quality of its products – for better or worse?
Surveillance software: Manufacturers & Suppliers
- Milestone Surveillance software
- CCTV Software Surveillance software
- Panasonic Surveillance software
- Hanwha Techwin Surveillance software
- Vanderbilt Surveillance software
- Bosch Surveillance software
- Geutebruck Surveillance software
- Axis Communications Surveillance software
- artec Surveillance software
- Verint Surveillance software
- Vicon Surveillance software
- Genetec Surveillance software
- March Networks Surveillance software
- ADPRO Surveillance software
- FLIR Systems Surveillance software
- Siqura Surveillance software
- eneo Surveillance software
- TeleEye Surveillance software
- TDSi Surveillance software
- Avigilon Surveillance software
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals