Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduc...
Milestone Systems have hired Jos Beernink as new EMEA Director Channel Sales, reporting to Malou Toft, VP EMEA. Jos Beernink’s most recent position was as VP EMEA Sales at Genetec and with previous positions at Honeywell Security and Fire/ADI, Samsung Electronics and Tech Data. EMEA Channel Sales Head Jos Beernink will lead EMEA Channel Sales, which is comprised of four sales regions with regional sales managers as direct reports; North Europe, Middle Europe and South Europe as well as M...
SJohnson Controls introduces the Tyco 360° Radar Detection, a low-cost, early threat detection family of radar sensors that can be easily integrated into existing video management systems for a more complete surveillance solution. Tyco Radar 360° Detection solution An ideal answer for advanced perimeter security needs, Tyco Radar 360° Detection offers long-range protection, which means quicker detection of breaches for areas seeking upgraded perimeter safety, such as power plants,...
Thailand’s leading business hub for security solutions, Secutech Thailand, is set to return from 28 – 31 October 2019 alongside Thailand Lighting Fair, Thailand Building Fair, and Digital Thailand Big Bang. Under the banner of ‘Smart City Solution Week 2019’, the four fairs together will serve as a one stop shop for smart city professionals to source all of the latest security, building automation, lighting and digital infrastructure solutions. “The Thai govern...
Facit Data Systems is delighted to announce that it is working in partnership with Avigilon. Avigilon is a Motorola Solutions company that provides trusted security solutions to the global market. Avigilon manufactures video analytics, network video management systems, surveillance cameras and access control solutions. Avigilon's solutions are installed at thousands of sites, in education, transportation, healthcare, banks, public venues and critical infrastructure. Video Data Analytics Facit...
Asia’s security industry is once again beginning to shift its attention towards Taipei, as preparations continue ahead of the 22nd edition of Secutech. As anticipation continues to build, the fair’s organisers announce details of six pavilions that will allow buyers to easily locate high quality products as well as the most relevant OEM and ODM partners for their businesses. Speaking about the benefits that the pavilions will bring, Ms Regina Tsai, Deputy General Manager of Messe Fr...
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 20060 FLIR Systems is a provider of advanced thermal, video and sensor technologies designed to meet complex border, critical infrastructure, safe city and commercial enterprise needs. FLIR’s signature products include thermal cameras, visible light cameras, radars, video management systems, and physical security information management solutions. Saros DH-390 enables integrators to offer remote video monitoring services and increase their recurring monthly revenue At ISC West 2019, FLIR will showcase its FLIR TruWITNESS solution for true situational awareness for city-level security and public safety operations. Worn on an individual’s body or mounted inside vehicles, TruWITNESS combines video, audio, location data and IoT capabilities. Together, these sensors send alerts and stream data back to a central command center running FLIR United VMS for improved incident analysis and intervention. FLIR will also display its FLIR Saros DH-390 Dome camera for perimeter and wide area protection for commercial businesses and alarm monitoring companies. With its ability to integrate with central station platforms, Saros DH-390 enables integrators to offer remote video monitoring services and increase their recurring monthly revenue. For more about their presence at ISC West, we contacted Fredrik Wallberg, Director of Marketing, Security, at FLIR Systems. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. FLIR has been exhibiting at ISC West for over a decade. When we first exhibited at the show, there was very little knowledge about thermal imaging technology. Attendees primarily viewed thermal as a technology for specialty applications for night operations. Through the years, FLIR has used ISC West to introduce the security market to the value of and many uses for thermal cameras, from 24-hour surveillance to intrusion detection to condition monitoring. Now, security personnel not only know what thermal cameras are, but they are also actively requesting FLIR thermal cameras for a broader range of applications spanning the government, transportation, energy, industrial, commercial and safe city sectors. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? As meeting with integrators and end users is our top priority while at ISC West, the majority of our efforts is centred around driving attendees to the FLIR booth. We will leverage print, digital and social campaigns to increase brand exposure and to secure booth appointments prior to the show. We’ve also hosted in-booth contests and giveaways during the show to encourage attendees to interact with the FLIR team. During these meetings with integrators and end users, we can truly listen to and assess their needs Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? For FLIR, success is measured by the quality and quantity of meetings we have with customers because getting face time with them is invaluable. During these meetings with integrators and end users, we can truly listen to and assess their needs. With this understanding, we can discuss solutions that can both address their pain points and provide added value. These conversations are often the beginnings of collaborating on projects together. Additionally, by having our technology partners, such as Genetec, Milestone Systems and Embedded Logix in the booth, we can showcase our technology integrations that attendees may not have been aware of. This can also spark product requests and ideas for future applications. For FLIR, success is measured by the quality and quantity of meetings we have with customers because getting face time with them is invaluable Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? ISC West is also a time of training for FLIR personnel. Each year, we have meetings with our global business development team to discuss annual goals, progress and strategies. Outside of business, FLIR has also hosted VIP dinners and events for key influencers and customers surrounding new product launches or other company initiatives. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the premier show for security dealers, integrators and installers, welcoming over 30,000 attendees and 1,000 exhibitors. No other event attracts FLIR’s target customers and technology partners on such a large scale. It is a prime opportunity to meet with current customers, answer questions from prospective customers, and discuss projects in the pipeline.
ISC West, the largest converged security event in the U.S., introduces the lineup for its 2019 education sessions, in collaboration with premier sponsor the Security Industry Association (SIA). In partnership with SIA, ISC West will be making educational sessions available during its 2019 ISC West show taking place April 9-12, 2019 at the Sands Expo in Las Vegas, Nevada, with SIA Education@ISC kicking off the day prior to the exhibition on April 9. The comprehensive program includes 85+ accredited sessions covering a range of industry topics aimed at providing the critical knowledge attendees need to protect and defend against developing threats in today's security landscape. Force-Multiplying Asset Keynote 1: Delivering Results: How DHS and Industry Partnerships Drive Security Innovation: In this session, keynote speaker William N. Bryan, acting under secretary for science and technology at the U.S. Department of Homeland Security (DHS), will discuss the advances in mobility, machine learning and autonomous technologies that provide new capabilities to build resilience capacity and reduce risks. Keynote 2: Stadium Security – As It Was, Where It Is and Where It Is Going…: Keynote speaker Russ Butler, vice president of security for the San Francisco 49ers and Levi's Stadium, explores the history and evolution of the ever-changing stadium security landscape. ISC West offers complimentary hands-on Vendor Solution Sessions and Unmanned Security educational sessionsThe Great Biometric Debate: After years of promise, biometrics are finally on the rise toward pervasive use. The audience will benefit from a detailed and spirited debate, tempered with a moderator that is an expert in cryptography, identity and applied authentication models across information and physical domains. Integrating Millennials Into Security Organizations: Today, one in three workers is a millennial, but millennials represent only a fraction of membership in security professional associations. This highly interactive session will feature a simulation in generational dynamics with a panel discussion from three generations of security practitioners: Baby Boomer, Gen Xer and Millennial. Meet the Jetsons: Understanding the Promise and Challenges of Smart Cities: Smart cities are now a reality, not just in the U.S., but across the globe. This session will address issues of technology governance to ensure that smart systems are protected and able to serve their human masters without impinging on privacy and civil liberties. How to Adapt to Address Drone Security: With the rapid deployment of small drones across the globe, security organizations are scrambling to become familiar with the threat they represent as well as with ways to use this new technology as a force-multiplying asset. Learn from drone industry professionals and a physical security design engineer about the realistic applications of drone systems and counter-drone solutions that can protect organizations and facilities. Smart Cities, Smart Buildings and the Evolution of the Converged Security Approach: This transformative session will discuss the future of security from the managing of traffic lights/traffic flow, power grids, ports and transportation systems. Included in this conversation will be the understanding of the use of cameras, access control, gunshot detection, open source intelligence social analysers (OSINT), Internet of Things devices, cyber information, video management, predictive maintenance for critical infrastructure and entry solutions. Vendor Solution Sessions In addition to programming with SIA, ISC West offers complimentary hands-on Vendor Solution Sessions and Unmanned Security educational sessions, including: Unmanned Theater: Drones 2.0 - The Next Generation of Flying Robots Unmanned Theater: Multi-Layer Security: Requirements of a Drone World Unmanned Theater: Cyber-Physical Security: How to Evaluate A Counter-Drone System Axis Communications: From Campuses to Communities: How Smart Technologies Are Driving Our Future Intel: Intel OpenVINO Toolkit Workshop Verkada: Modernising Enterprise Video Security Smart City Technology In addition to the standard education sessions, ISC West and SIA will be holding the SIA Women in Security Forum Breakfast @ ISC West on Friday, April 12 "It's our ongoing mission to arm attendees with the knowledge, strategies and tactics they need to make the most informed decisions possible when dealing with today's cyber-physical and public safety security threats," said Will Wise, group vice president, security portfolio at Reed Exhibitions. "This year, we have many new speakers and are covering a gamut of topics – from drones to stadiums security to the developments with smart city technology – facilitating thought leadership between security industry peers looking to advance their knowledge on the most pressing issues." In addition to the standard education sessions, ISC West and SIA will be holding the SIA Women in Security Forum Breakfast @ ISC West on Friday, April 12. Attendees will enjoy featured remarks from Juliette Kayyem – Belfer lecturer in international security and faculty director of the Homeland Security Project at the Harvard Kennedy School, national security analyst for CNN and CEO of Zemcar, – in addition to networking and complimentary breakfast. Robust Education Program Kayyem previously served as President Obama's assistant secretary for intergovernmental affairs at the U.S. Department of Homeland Security and as Massachusetts Governor Deval Patrick's homeland security advisor. "Sharing new knowledge on emerging trends, technologies and best practices in security is the cornerstone of the SIA and ISC West partnership," said Elli Voorhees, Ph.D., director of education for SIA. "Our robust education program offerings cover a wide range of topics that appeal to all ISC West attendees – from product manufacturers and integrators to professionals supporting sales, marketing, IT and business operations efforts. Our goal is foster peer-to-peer learning on the most current technological and physical security solutions and business practices, providing attendees with essential information to help them improve organizational performance and gain a competitive advantage in the marketplace."
Booth number: 11053 At ISC West, Bosch Security and Safety Systems will showcase how intrusion and fire detection, video surveillance and analytics, access control, and communications technology work together to deliver increased security, more efficient monitoring and control, automated audio announcements, and valuable data that extends beyond security to deliver clear business advantages. Bosch’s solutions solve challenges in retail, critical infrastructure, transportation, smart city, and many other markets Visitors will be able to grab a free snack in the Bosch Marketplace and experience solutions to reduce theft, improve parking management, enhance warehouse and dock security, detect outdoor risks, and more. Bosch’s solutions solve challenges in retail, critical infrastructure, transportation, smart city, and many other markets. For more about their presence at ISC West, we contacted Chelsea Render, Director of Marketing, North America for Bosch Security and Safety Systems. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. Our history at ISC West goes back more than 30 years, when we exhibited under the RCA and Detection Systems brands, prior to the Bosch acquisition of these companies. Over the years, our booth size has grown, and we've refined and enhanced our presence at the show to make the most impact. From parking a double expandable tractor trailer on the show floor to building a mini retail store within the booth, we're always improving to give the customer the best experience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? This year, we'll have a mini retail store, complete with a parking lot and loading dock, to show how integrated solutions improve safety and security At the Bosch booth, we create immersive experiences. This year, we'll have a mini retail store, complete with a parking lot and loading dock, to show how integrated solutions improve safety and security, reduce shrink, and help retailers improve merchandising and operations. For example, visitors can simulate a blocked exit door within the store to experience how video analytics can trigger a warning to play over the public address system. In addition, a truck approaching the dock will cause video to display on the operator's monitor, and a dock door left open will trigger an alert to the warehouse manager. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? We track the number of leads from the show, but we're primarily interested in the quality of leads. Within a few days after the show, we contact all visitors to the Bosch booth or our events to ensure they received the information they need and to determine if we can assist them further. We see ROI when customers have an ‘aha’ moment at the booth as they experience our integrated solutions and understand how they can solve pain points within their organizations or for their customers. This helps build awareness on the full breadth of the Bosch portfolio. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Each year, Bosch hosts free educational sessions in a ballroom at the Venetian. Here, we provide attendees with breakfast and an informative discussion on the latest trends and technologies. We also sponsor the Mission 500 Security 5K Run/2K Walk, supporting children and families in need This year, we will have a session on rising connectivity and the impact of the IoT on security, privacy, and data, and a session on how integrated solutions work together to improve security and provide more efficient monitoring and control. Attendees interested in these events can email for a registration link. We also sponsor the Mission 500 Security 5K Run/2K Walk, supporting children and families in need. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? As the largest security industry trade show in the U.S., ISC West provides the opportunity to meet with integrators, end users, consultants, and more. We consistently have heavy traffic at the Bosch booth and are able to speak with many of our customers, meet new prospects, and interact with specifiers and consultants. The high number of attendees, broad audience, and quality interactions sets ISC West apart from other trade shows.
Verizon announced the addition of BlackBerry Cylance’s AI-driven antivirus security solutions to its industry-leading Managed Security Services (MSS) portfolio. “Businesses of all sizes are suffering alert-fatigue generated by other endpoint solutions. Many are turning to managed security services to gain holistic, expert-level management across their endpoints, gateways and networks on a round the clock basis,” said Stuart McClure, co-founder of Cylance and president of BlackBerry Cylance. “By offering BlackBerry Cylance’s AI-powered endpoint protection, Verizon’s MSS customers will now have access to a powerful antivirus technology with the ability to prevent known and unknown threats, reducing the strain on other security controls, and alerts that must be tracked, processed and audited.” Preventing Ransomware, Fileless Attacks CylancePROTECT prevents ransomware, fileless attacks, and other unknown threats from executing on the endpoint before they can do harmCylancePROTECT and CylanceOPTICS endpoint security products are now available for licensing and management by Verizon Managed Security Services. CylancePROTECT prevents ransomware, fileless attacks, and other unknown threats from executing on the endpoint before they can do harm. This significantly reduces the number of alerts and amount of security data passed on to other security controls. CylanceOPTICS is the industry’s first AI driven endpoint detection and response (EDR) product. It delivers on-demand threat hunting and automated response capabilities. Delivering AI Driven Security Solutions “BlackBerry Cylance is the logical partner of choice given its ability to deliver protection against known and unknown malware, malicious scripts, fileless attacks, zero-day payloads, as well as harder to detect ‘living of the land’ assaults,” said Alex Schlager, executive director, security services, for global products and solutions at Verizon. BlackBerry Cylance’s endpoint security intelligence is also used to power the Verizon Risk Report security assessment framework“BlackBerry Cylance is at the forefront of delivering artificial intelligence driven security solutions, and the first next-gen vendor to deliver on-device machine learning threat detection in an EDR product. Their prevention-first philosophy maps extremely well to our desire to help customers gain the upper hand on today’s adversaries. We look forward to offering our customers BlackBerry Cylance’s added value services within our award-winning managed security portfolio.” Identifying Security Gaps In addition to inclusion in Verizon MSS portfolio, BlackBerry Cylance’s endpoint security intelligence is also used to power the Verizon Risk Report security assessment framework. The framework enables companies to make data-driven security decisions, identify security gaps and prioritise improvement actions, and focus security spend where it will have the most impact. Three levels of assessments are offered: Outside-in, Inside-out, and Culture and Process. BlackBerry Cylance is used for the Inside-out assessment – an evaluation that automatically searches for malware, unwanted programs and other potential vulnerabilities. Combining Powerful Intelligence And Analytics Verizon combines powerful intelligence and analytics with an expansive breadth of professional and managed servicesVerizon was named a leader in the 2018 Gartner Magic Quadrant for Managed Security Services, Worldwide. It is a pioneer in delivering global managed security solutions to enterprises in the financial services, retail, government, technology, healthcare, manufacturing, and energy and transportation sectors. Verizon combines powerful intelligence and analytics with an expansive breadth of professional and managed services, including customisable advanced security operations and managed threat protection services, next-generation commercial technology monitoring and analytics, threat intel and response service and forensics investigations and identity management. Verizon brings the strength and expert knowledge of more than 550 consultants across the globe to proactively reduce security threats and lower information risks to organizations.
Ojo Technology, one of the fastest growing security integrators in Northern California, has named Shailesh Prasad as its new vice president of operations and promoted Jeffrey Gutierrez to general manager for its growing Central Valley office. Prasad will work from the company headquarters in Fremont serving as vice president of operations and overseeing day-to-day operations as well as strategic planning and goal-setting. Gutierrez will lead the company’s rapidly expanding office in Stockton, California, responsible for operations, planning and sales. Expanding Company’s Presence The personnel changes and additions are a result of the company’s continued strong growth, according to Angie Wong, president and founder of Ojo Technology. “Shailesh and Jeff have strong systems and security backgrounds,” she said. “We are looking to them to be part of the management team that will help us continue to expand throughout the region.” Ojo Technology already has a great name in transportation, municipal and campus security" Previously, Prasad was a senior executive and engineer for Hayward-based HSQ Technology where he led integrated systems projects for organizations including BART, eBART, Sound Transit and the San Francisco International Airport. He has an extensive background in working with a variety of industries including light-rail, waste water management and airports. “Ojo Technology already has a great name in transportation, municipal and campus security,” said Prasad. “I’m looking forward to using my past experience to strengthen those markets and reach beyond them.” Experienced Security Integration Professional Gutierrez has been with the company for more than three years as director of sales. He is an experienced security integration professional. Prior to joining Ojo Technology, he was a senior account executive for Johnson Controls and has also worked with Siemens, Tyco and ADT. “We are seeing tremendous growth potential in California’s Central Valley, working with some of the top organizations in the region,” said Gutierrez. “I’m looking forward to using my years of experience to continue to expand our presence in the area.”
As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveler safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving Mass Transit Security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime Prevention In Transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train Security And Safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing The Right Technology For The Solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit Security With Modern Technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.
Video surveillance as a service (VSaaS) is not just for commercial organisations. Federal, state and local governments can also realize benefits from the technology—and use it to deliver an integrated video surveillance system that addresses some of their unique security needs. Video Surveillance as a Service (VSaaS) What is VSaaS? Simply stated, it’s a cloud-based video surveillance solution that is packaged and delivered as a service over the internet. The price varies depending on the features of your plan (i.e. number of cameras, amount of storage, software features, etc.), and you pay a monthly subscription price to use it. How does it work? Internet Protocol (IP) cameras are installed at site locations, and the video is captured and streamed to a service provider’s data center via an internet connection. The video management software (VMS) runs on backend infrastructure provided by the service provider’s cloud. All video processing is done in the cloud, and all that is required to view the footage is an internet-connected device and a web browser. Retail, health care, education, and transportation all benefit from the flexibility and architecture of VSaas Growing VSaaS Providers Solution providers such as Axis Communications, Genetec, and G4S among many others offer VSaaS solutions, and the market is growing. According to IHS Markit, the market is expected to reach $2.3 billion in 2021. VSaaS is a solution with cross-industry appeal. Retail, health care, education, and transportation all benefit from the flexibility and architecture of the solution. But how does VSaaS address the surveillance needs of government institutions? Geographic Coverage And Access To protect cities and towns, law enforcement must watch over widespread geographic areas. Their work involves monitoring and policing many different neighborhoods, buildings, garages, parks, and walking paths—basically anywhere there is property or people to protect. They rely on video surveillance to help them keep these environments safe. But it’s more than local law enforcement officers who use video footage. From local city officials to federal and state law enforcement agencies, many other people, at times, need access to video footage captured by city surveillance cameras. Centralized Remote Monitoring How does VSaaS help? VSaaS enables the installation of cameras throughout cities and communities and stream footage to a central location via the Internet. Because the system is centralized, it eliminates the need to manage a lot of different standalone DVRs or NVRs, which enables organizations to monitor a large area from a remote command center. VSaaS enables the installation of cameras throughout cities and communities and stream footage to a central location via the Internet Plus, anyone with proper credentials can access the footage from an Internet-connected device—whether that be a smartphone, laptop, desktop, or tablet. That makes it easier for multiple agencies to work together, which in turn can improve communication and response time to incidents. Budget Concerns And Flexibility Tight budgets are normal in government. As a result, it’s often a challenge to procure capital for new technology purchases—and that sometimes leads to underfunded projects and difficulty upgrading old technology. VSaaS changes the expense model. It allows you to shift from a capital expenditure (CapEx) model, where large capital funding is required to purchase equipment, to an operational expenditure (OpEx) model, where the costs of the solution become an operating expense. Since the cameras, installation, storage, and software are packaged into a service, you don’t need a large capital outlay up front—you simply pay a predictable expense every month. VSaaS provides the capability for you to increase storage capacity when you need it Feature And Storage Capacity Upgrade Features VSaaS also makes it easier to upgrade old technology. When new technology becomes available, you can upgrade to it as part of the service. You no longer have to stick with old technology because of capital budget restrictions. Instead, you can upgrade to better cameras and management software features as they become available. The same is true for storage capacity. As camera resolution increases, the amount of data captured also increases. In addition, with the evolution of smart city technology and big data analytics, video data has become more valuable. As a result, there is a need not only to store more data but also to keep that data accessible for a longer period of time. VSaaS provides the capability for you to increase storage capacity when you need it. You can scale to accommodate growth, and since the storage is delivered as part of the service, you can leverage the “pay for use” model to manage your costs. On-Premise Storage Or Hybrid Where should surveillance video be stored? It’s an important question. After all, government entities must always comply with data privacy laws and handle data properly to ensure it can be used as evidence if needed. As a result, officials may prefer to be selective about where they store video data. In fact, the concern over regulatory requirements and security and privacy issues, according to Gartner, will lead governments to implement private cloud at twice the rate of public cloud through 2021. The provider’s ability to store large amounts of data cost-effectively makes VSaaS possible That’s not necessarily a show-stopper when it comes to video surveillance. Some VSaaS providers offer hybrid options. Plus, one of the things that makes VSaaS possible is the provider’s ability to store large amounts of data cost-effectively. Because service providers can manage their storage infrastructures economically, they can offer their service at an attractive price. Multi-Tier Storage Infrastructure In a way, government institutions (as well as commercial organizations) can do the same thing. If a government entity—for example, a small municipality—wanted to store their data on-premise or implement a hybrid configuration, they could solve some of their video storage challenges by implementing a multi-tier storage infrastructure similar to what a VSaaS provider might use to provide the actual service. A multi-tier storage infrastructure uses different storage media—disk, object storage, tape, and cloud—and combines them to deliver the total capacity needed while balancing performance and cost. The diagram below is an illustration of a multi-tier infrastructure: As the diagram shows, storage capacity grows using lower cost forms of media as volume and long-term retention requirements change. Files are moved between tiers based on user-defined policies. When the policies are met, the files are moved to a lower cost tier. Some file systems allow for multiple copies be written at ingest which not only minimizes the traffic of moving files across the network, but also provides much needed data protection through a second copy on a lower-cost tier. This scenario enables you to optimize the amount of high-performance media in your infrastructure and lower the long-term cost of retaining files. VSaaS offers many benefits for government institutions and commercial organizations alike Choice Of Implementations VSaaS offers many benefits for government institutions and commercial organizations alike. But not every implementation has the same needs or requirements. The good news is, when it comes to video surveillance solutions, you have options. You can leverage the benefits of VSaaS, in either a public cloud or hybrid scenario, depending on the service provider. Or if your needs dictate, you can achieve some of the same capacity and cost-saving benefits you would get from a VSaaS solution by implementing an on-premise solution based on a centralized VMS system and multi-tier storage. The choice is yours.
Throughout the UK there are many examples of smart city transformation, with key industries including transport, energy, water and waste becoming increasingly ‘smart’. A smart city is a one that uses information and communication technologies to increase operational efficiency, share information with the public and improve both the quality of government services and resident welfare. Smart access is an important step forward in providing technologically advanced security management and access solutions to support the ambitions of smart cities and their respectively smart industries. Explaining Smart Access If we used the standard definition of smart, it would be to use technology to monitor, control and manage access, but the technology must be adapted to both the physical and management characteristics of smart cities. Smart access is an important step forward in providing advanced security management and access solutions to support the ambitions of smart cities For example, it would not make sense to install an iris biometric sensor at an isolated water storage tank, which is out in the open and may not even have electrical power. Nor would a permissions management system work, one that does not let you update permissions simply and easily and cannot be customized. With high volumes of people entering and exiting different areas of the city, it is important to be able to trace who has been where, when and for how long. Advanced software suites can provide access to all operations performed by users, including a complete audit trail. This information is often used by business owners or managers for audits, improvements or compliance. When initiating a new access control system it is important that the supplier and customer work together to understand: Who can enter a secure area Where in the building each individual has access to When an individual can enter a secure area How an individual will gain access to a secure area This information can be crucial in the event of a security breach, enabling investigators to find out who was the last known key holder in the building and what their movements were while there. Installing an electronic lock does not require electrical power or batteries, much less a connection to send information Modernizing Locks And Keys Installing an electronic lock does not require electrical power or batteries, much less a connection to send information, which means that it can be installed on any door as you would a mechanical lock without maintenance requirements. Permissions are stored within an intelligent key. If you have authorization for that lock, it will open. If you don’t, you won’t be allowed to enter and all of the activity carried out by the key will be recorded. You can update permissions from a computer or using an app on a cellphone at the time of access, which will update the key's permissions via Bluetooth. This allows shortened validity periods, constrains movements to be in line with company access policy and removes travel and fixed authoriser costs. This then delivers increased flexibility and higher levels of security. Remote Access Control Utilities Access rights can be set at any time and on any day, and if required can allow access on just one specific occasion Using an app improves access control by updating access rights in real time with the Bluetooth key. It also provides notification of lost keys, joint management of access schedules, protection of isolated workers and much more. Combined with new technological solutions, an app allows contextual information to be sent, such as on-site presence, duration of an operation, authorisations and reporting of anomalies. Access rights can be set at any time and on any day, and if required can allow access on just one specific occasion, for example to repair a failure. Access can be restricted to enable entry only during working hours, for example. Permissions can be granted for the amount of time required, which means that if permission is requested to access a site using a mobile app, the company should be able to access it, for example, in the next five minutes. Once this time has passed, the permission expires and, if a key is lost or it is stolen, they will not be able to access the site. The rules for granting permissions are infinite and easily customisable, and the system is very efficient when they are applied; as a result, the system is flexible and adapted to suit company processes and infrastructures. Using an app improves access control by updating access rights in real time with the Bluetooth key Finding Applications To Create Solutions In many cases, companies themselves find new applications for the solution, such as the need to obtain access using two different keys simultaneously to prevent a lone worker from accessing a dangerous area. The software that manages access makes it smart. It can be used from a web-based access manager or through personalized software that is integrated within a company's existing software solution, to automatically include information, such as the employee's contractual status, occupational risk prevention and the existence of work orders. In some companies, the access management system will help to further improve service levels by integrating it with the customer information system, allowing to link it for instance with alarms managers, intrusion managers or HR processes. With over one million access points currently secured worldwide, this simple and flexible solution will play a strategic role in the future of security.
As the Internet of Things (IoT) and other trends drive the convergence of physical and information security, integrators and end users attending ISC West may be struggling to keep pace with new areas of responsibility and expanding roles in the larger security ecosystem. Help is here. The Connected Security Expo, co-locating with ISC West, focuses on building a holistic security strategy for the connected enterprise. Exhibitors will focus on how physical and information security can be used together to mitigate new and emerging cyber-threats in a hyper-connected world. Connected Security Expo provides attendees access to cutting-edge products and technology in both the physical and IT secure realms. It is clearly a growth factor in the market. Here’s a look at some of the companies on display in the 2019 Connected Security Expo: Integrated Video Cloud Service The AI-powered video analysis software suite delivers high-speed object search and facial classification Arcules provides the Arcules integrated video cloud service, which combines untapped video and sensor data with the latest technologies in cloud, artificial intelligence, and machine learning to deliver actionable business and security intelligence for modern organizations. The cloud-based service is designed to ensure security, scalability, streamlined operations, and bandwidth management — all from a single, easy-to-use interface. Hardware-Accelerated Solutions BrainChip Inc. is a global developer of software and hardware-accelerated solutions for advanced artificial intelligence (AI) and machine learning applications. The AI-powered video analysis software suite delivers high-speed object search and facial classification for law enforcement, counter terrorism and intelligence agencies. PSIM Software Platform CNL Software Inc. is an open, adaptable, scalable and secure Physical Security Information Management (PSIM) solutions provider. The IPSecurity Center PSIM software platform helps law enforcement, government agencies, the military, public and private critical infrastructure, transportation networks, corporations and campuses to integrate, automate and manage systems, allowing better security intelligence and improved operational efficiency. Facial Recognition Software IOmniscient Corp. provides facial recognition software that can recognize multiple faces even in crowded and uncontrolled scenes IOmniscient Corp. provides facial recognition software that can recognize multiple faces even in crowded and uncontrolled scenes. Matching faces with an existing database, the system can detect an unauthorized person and track him or her across non-overlapping cameras. Enhance Situational Awareness Oncam offers 360 and 180-degree video technology. The company has the largest range of wide-angle cameras that are open platform and easy to integrate. Unique dewarping technology allows the creation of award-winning video solutions for stakeholders from the C-suite to the security officer in wide range of industry segments. Oncam’s products greatly enhance situational awareness. Enterprise-Class Security Pivot3 is a provider of intelligent solutions using hyperconverged infrastructure. Pivot3’s intelligent infrastructure is optimized to deliver performance, resilience, scalability and ease-of-use required for enterprise-class security, video surveillance and IoT deployments. Electronic Physical Security The UL 2900-1 standard offers general requirements for software cybersecurity for network-connectable products UL LLC is working to increase the prominence of the Underwriter Laboratories brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers general requirements for software cybersecurity for network-connectable products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/life safety & security industry, was published in September 2017. Proactive Automated System Viakoo is a provider of the security industry’s first proactive automated system and data verification solution. Create Significant Value Vidsys is innovating and accelerating a transition to Converged Security and Information Management or CSIM. The company is committed to educating and supporting customers with their evolving needs to provide a more holistic view of risk and throughout the overall business process re-engineering necessary to create significant value across the entire organization.
Security and Safety Things GmbH (SAST) is a new company that has announced its vision for an Internet of Things (IoT) platform for the next generation of security cameras. The Bosch startup plans to build a global ecosystem for the development of innovative security camera applications. Based on the Android Open Source Project (AOSP), SAST provides libraries, an API framework, and codecs for developers to work with. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications. We presented some questions to Nikolas Mangold-Takao, VP Product Management and Marketing, about the new venture, and here are his responses: Q: Why a new company now? What technology innovations have made this a good time to launch this company? The time is right to bring market needs and technological innovations together on one platform"Mangold-Takao: From a technical perspective we see two main drivers: increasing computing power at the edge and increasing internet connectivity, which will enable devices to directly communicate with each other and bring new technologies such as artificial intelligence also to the security and safety industry. At the same time, we see that this industry and its users are hungry for more innovative solutions – addressing new security needs while at the same leveraging the possibility to improve business operations for specific verticals, e.g. retail and transportation. The time is right to bring market needs and technological innovations together on one platform for this industry. Q: Why does SAST need to be a separate entity from Bosch? Mangold-Takao: SAST is setup as a wholly owned subsidiary of the Bosch Group. We wanted to make sure that SAST is able to underline its role as an industry standard platform across multiple players. SAST is open to get additional investors and is being setup as a startup in its own offices in Munich to foster the environment where speed and innovation can more easily take place. Having said that, several entities of the Bosch Group are very interesting partners for SAST. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications Q: Please explain your "value proposition" to the industry. Mangold-Takao: We will bring new innovations and possibilities to the security and safety industry by providing an open, secure and standardized Operating System for video security cameras, to also address pressing issues such as cyber security and data privacy concerns. Devices that run then with the SAST operating system will work with an application marketplace provided and operated by SAST. Integrators and users can then use these apps from this marketplace to deploy additional functionality on these devices. With our platform we will be able to build up a community of app developers, including the ones not yet developing for this industry who have expertise in computer vision and artificial intelligence. Q: It seems what you are doing has parallels with the Apple and Android "app" stores. How is your approach the same (and how is it different) than those approaches? We are setting up SAST as a user-centric company and involve selected users very early on in the process"Mangold-Takao: The approach is similar in the way that we plan to generate revenue by operating the application marketplace and thus participate in the app revenue. The difference is that there is much more needed than apps and cameras to create a complete working solution addressing a user problem in this industry – we need to make sure that our own platform as well as the new applications being created will work as a part of an end-to-end solution. Q: "Critical mass" and wide industry participation seem to be requirements for your success. How will you achieve those goals? Will you involve integrators, consultants, or other parties in addition to manufacturers (to drive awareness)? How? Mangold-Takao: SAST is in close exchange with device manufacturers, integrators and consultants, as well as application developers and large end-users at the moment to ensure that we are building the right platform and ecosystem for this industry. We are setting up SAST as a user-centric company and involve selected users very early on in the process. We will run dedicated programs and hackathons to attract app developers, already active and new to our industry. We will also run selected pilots with end-users throughout 2019 to ensure we have all partners involved early on. SAST sees the industry is hungry for more innovative solutions – with the retail vertical market a target for these solutions Q: What timeline do you foresee in terms of implementing these initiatives? Mangold-Takao: While we start with first app development programs and plan our first pilots already for this year, we are planning our commercial launch for end of 2019. Q: How does your new company relate to the new Open Security & Safety Alliance (OSSA)? Mangold-Takao: The Open Security and Safety Alliance has been working very closely with SAST over the past year, defining some important concepts and elements required. One of the most important elements is an open and standardized Operating System, specific to this industry, which will then bring forward new innovative technologies and solutions. SAST is actively working on this Operating System, based on Android Open Source Project (ASOP), but is evolved and hardened with industry-specific features. Q: What's the biggest thing you want the security industry to understand about SAST? What is your "message" to the industry? Mangold-Takao: Our message is simple: let’s build better security and safety systems – together! But for real, innovating an industry is a joint effort, we can only bring new innovation to this industry with partners who share our vision and are excited about new technology. At the same time, we strongly believe that our platform allows every partner to bring forward what they do best but also invite new partners to our industry.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defense force. Wireless Technology For Cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need For More Security In K-12 Schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging The Gap Between IT And Physical Security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT And Cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fueling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training Courses For Integrators And Partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instill added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new center in Barcelona (in addition to current R&D centers in Copenhagen and Sofia, Bulgaria). Making Camera Installation Easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the color of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras With Sound Detection Technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analyzing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralize systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine Learning Engine For Crime Prevention In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focused on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyze shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT Devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition Of IP Door Intercom Company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analog components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
A multi-division and multi-location conglomerate in Kutch (Gujarat, India), engaged in manufacturing, trading, exporting and supplying a finest assortment of Roofing Accessories Roofing Sheets, Metal Coils, Roofing Accessories, Metal Roofing Sheets, Coated Roofing Sheets and Tiled Sheets for Roofing has trusted Matrix with providing top grade security solutions for its site. Matrix IR bullet cameras and VMS VMS Software with Inbuilt Weighbridge Application Module: SATATYA SAMAS PLT IPC Channel Wise ANPR/LPR License (ANPR1) Cameras installed at the site: 2 MP Varifocal IR Bullet Camera with 2.8-12 mm Lens- SATATYA CIBR20VL12CWS 2 MP Fixed Lens IR Bullet Camera with 3.6 mm Lens- SATATYA CIBR20FL36CWS The company was using conventional Weighbridge system that performed basic functionalities. This traditional system had certain limitations, such as Data spoofing due to manual system Lack of centralized solution for multiple branches Dependency on more than one system Lack of evidence for auditing purpose Matrix Weighbridge integration solution Looking at all the challenges that the company was facing, Matrix offered an optimized solution with Weighbridge Integration. Matrix Weighbridge Integration solution provides the following functionalities: Vehicle Number Snapshot (ANPR) Driver Snapshot (Evidence) Material Snapshot (Auditing) Weighbridge Snapshot (Avoid Data Spoofing) Safeguard Evidence Bookmark Video Recordings Print Evidence Record Periodic Report Generation Benefits Client will be able to track in-bound and out-bound material movement by capturing the details of respective material weight. Enables the client to make easy comparison of weights between supplying plant and receiving plant with the help of captured screenshots. Record weight of the material and then use the data to post good’s receipts, production bookings and dispatch documents, etc. Limits Weighbridge Vendor dependency by providing interoperability without depending much on other APIs.
With a population of more than 40,000, the City of Linden, New Jersey is part of the New York Metropolitan Area. It is located 13 miles southwest of Manhattan and borders Staten Island. In an effort to improve public safety and reduce crime, the city decided to modernize its video surveillance system. The City of Linden (the City) had more than 150 outdated, analog cameras deployed throughout its buildings and parks. These consisted of an assortment of off-brand devices that lacked sufficient resolution, speed, and frame rates. To provide the highest quality video, the City decided to invest in a new citywide IP camera system. Purpose Of Video Surveillance System Moving to IP cameras would require the City to increase its bandwidth capacity and upgrade its network video recorders (NVRs) to a more efficient, reliable, and secure video storage solution. This video surveillance system would need to: Support megapixel camera quality Be deployed at the network’s edge in various City buildings Stream video back to City Hall yet not be a burden on costs or bandwidth Be secure, simple to deploy, and easily expandable Work with world-class IP cameras and video management systems The City’s Department of Public Safety, led by the Police Department, oversaw the project. They hired Eastern Datacomm, a highly recommended system integrator out of Hackensack, New Jersey, to manage the entire project, from the installation of fiber lines for Internet to deploying the IP cameras and video surveillance appliances. Extra Layer Of Security For Clients Razberi makes it simple to manage and secure video surveillance and network-connected device solutionsOne reason the City of Linden chose Eastern Datacomm is because it has standardized on Razberi Technologies video surveillance appliances and software for all installations, providing an extra layer of security for its clients. Razberi makes it simple to manage and secure video surveillance and network-connected device solutions. Razberi appliances are highly reliable and network-optimized for megapixel quality. With the ability to record at the network’s edge and centrally, the Razberi suite of appliances also provide the flexibility that the City requires. A one-click VLAN setup establishes a private, secure network for camera traffic. Razberi’s intelligent video solutions are rightsized for the application including data center, edge/fog, and rugged applications along with the ability to add cybersecurity protections. The appliances are also open to work with world-class video management solutions (VMS) and IP cameras. Built-in Razberi Monitor health monitoring software ensures the video surveillance system – all the way to each camera – is operating 24x7 without video loss or disruption. Installation Of 250 IP Cameras A Razberi EndpointDefender appliance is integrated with each Core device to provide Power over Ethernet+ (PoE+)Today, the City of Linden has more than 250 Panasonic IP cameras deployed across 13 locations. The main site is City Hall, which includes the Police Department. Cameras are also installed in four fire houses, two youth centers, the library, and various points around the train station and parking lot. At City Hall, Eastern Datacomm installed four Razberi Core appliances. These robust, server-class appliances centrally record heavier video surveillance workloads. This enables the City to be in compliance with the State of New Jersey’s retention law, which mandates that municipal video recordings be kept for 90 days. In addition, a Razberi EndpointDefender appliance is integrated with each Core device to provide Power over Ethernet+ (PoE+). EndpointDefender includes the Razberi CameraDefense cybersecurity software solution, should the City need it in the future. This extends industry best practice cyber protections all the way to the camera or Internet of Things (IoT) endpoint. ServerSwitchIQ Edge Appliances The ServerSwitchIQ’s compact size and ease of deployment worked for the City’s remote outdoor security camera locationsIn the City’s other buildings, the integrator deployed 12 Razberi ServerSwitchIQ edge appliances. More than an NVR, these devices combine a PoE+ switch, server, storage, and intelligence. By recording video near the network’s edge closer to the cameras, the appliances enable City workers at each location to monitor and play back video when needed. There is no need to constantly stream video back to City Hall, which reduces the impact of megapixel cameras on the network. The ServerSwitchIQ’s compact size and ease of deployment also worked for the City’s remote outdoor security camera locations. Each is small enough to fit into telco rooms under lock and key while handling the amount of cameras required. The City did not have to deploy servers, cabinets, and other equipment traditionally used for video surveillance systems. Eastern Datacomm monitors the video surveillance system via the Razberi Monitor software, which provides automated, real-time collection of system component properties and status such as storage disks, CPU Temperature, RAID arrays, and network traffic. With 24x7 monitoring and alerts, especially if a camera fails or goes down, Eastern Datacomm can take corrective action immediately. Reducing Crime And Enhancing Quality Of Life The system is enabling the Police department to fulfill our mission to reduce crime, improve the delivery of Police services"“Our upgraded video surveillance system with the IP cameras and Razberi appliances gives the City of Linden one of the most state-of-the-art video surveillance systems in the country,” said David Hart, Chief of Police, City of Linden Police Department. “The system is enabling the Police department to fulfill our mission to reduce crime, improve the delivery of Police services, and enhance the quality of life for Linden residents. We have already solved some criminal cases using the security system with its reliable, high-quality video footage.” The City of Linden anticipates adding more cameras over time. They are working on a five-year plan to put more cameras in their 39 parks and other buildings. Each Razberi appliance can accommodate up to 24 IP cameras, making the system easily expandable.
The new vibration-proof Wisenet TRM-410S and TRM-810S NVRs manufactured by Hanwha Techwin are designed to be at the heart of video solutions for transport applications. Wisenet NVRs With a footprint of just 250mm x 210mm and offering two-way audio communication, the two new robust NVRs are EN50155, EN-50121 and EN-61373 certified. This makes them particularly suitable for deployment on buses and trains where they can be used to record video of passenger activity, as well as video of the road or track ahead, in order to provide evidence of any incidents. The new NVRs, which support H.265, H.264 and MJPEG compression, offer 4TB onboard video data storage, with the TRM-810S also offering the option of RAID. PoE/PoE+ support Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch, making them ideal for mobile applications as there is no need to install separate power supplies for cameras and monitors. Designed to offer the stable recording of event and location data as well as video, the two new devices complement the sixteen channel TRM-1610S and TRM-1610M NVRs and the three compact Wisenet X mobile H.265 dome cameras which were launched in 2018. Cost-effective video solution “Our two existing sixteen channel NVRs are proving to be popular among train operators who wish to record images captured by a large number of cameras installed in train carriages,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “The introduction of the four and eight channel NVRs means that we now have cost-effective solutions for bus, coach and truck type applications.”
Beijing Daxing Airport, due to open in September, will soon be the second in Beijing to secure daily operations with state-of-the-art technology by Airbus. Airbus will provide one Tetra DXTA server, and nine TB3 base stations with eight TTRX 32-channel receivers per base station for Bejing’s second international Airport communication structure. The system will be mutually backed up by the Beijing Capital International Airport to enhance the communication and management of the two airports. The whole network will be put in use before the 30th of September, the official opening date of the airport. This new airport will possess eight runways and serve around 100 million passengers annually, all of which will be secured with Airbus technology. Seamless communications Airbus Tetra system has played a vital role in securing tasks relating to passenger transportationTests carried out in April proved the interconnectivity between the digital trunk communication systems of both airports to be reliable, as stable and clear communications were recorded. The two Tetra systems provided by Airbus are fully interconnected; this will allow for Airport related entities such as Airlines and ground service companies to benefit from seamless communications between both airports. Beijing International Airport is also equipped with an Airbus Tetra system, which has provided highly stable, reliable, and flexible communication security for daily operations since its deployment in 2008. Over the past ten years, it has played a vital role in securing tasks relating to passenger transportation, as well as the logistics of high-scale world sports events. The current system serves over 10,000 subscribers. In 2018, the Beijing Capital International Airport saw over 100 million passengers for the first time, making it the second busiest airport in the world.
Parekh Integrated Services Pvt. Ltd (PISPL) is in the business of providing high-quality logistics services that give customers a competitive advantage in the Indian market. Established in 1981, PISPL is a one-stop shop logistics and supply chain service provider in India offering storage and distribution services, freight forwarding, transportation, information technology and cold chain management solutions along with other value added services to multiple industry verticals. Video Surveillance Systems Parekh Integrated Services Pvt. Ltd (PISPL) has established their operation with more than 1,500 warehouses and distribution setups to cover all the major cities in India for their services. With this expansion, IT infrastructure equipment was procured, including IP video surveillance systems of different reputed brands from different vendors. Cost of operation has also gone up due to technical expertise required for each individual system Over a period, it was becoming costly and difficult to manage different brands procured separately at different locations. Cost of operation has also gone up due to technical expertise required for each individual system. PISPL was looking for a centralized solution, which can work with different reputed brands as well as give them a common control of all the video surveillance systems to reduce the technical manpower cost for different systems. Occupancy Control System Due to low bandwidth at some of the remote locations, PISPL were not able to secure video evidence at a central location. It was required for any kind of post analysis or dispute resolution. PISPL were looking for an occupancy control system in each warehouse/storage area to manage and control the worker's presence in sensitive areas. It was getting difficult to do it manually at each location with the increase in number of employees over the last few years. Matrix provided video management software (VMS) as a centralized platform to monitor and manage all the cameras from a central location on a single platform. It worked as a common platform for all the surveillance cameras from different brands, which leads to reduction in operation cost. Matrix VMS supports all the camera models of major brands including ACTI, Samsung, SONY, Mobotix, Panasonic, Vivotek, etc., along with ONVIF protocol. Crowd Management Feature PISPL enabled the centralized schedule backup at an even lower bandwidth from all locations to the central location Using Matrix VMS Solution, PISPL enabled the centralized schedule backup at an even lower bandwidth from all locations to the central location. This made it easy to go through the video evidence at a central location and resolve the issue in short time. Another issue of maintaining occupancy a certain limit in each zone was addressed by the Matrix VMS crowd management feature. All the entry/exit points were covered with a camera to count number of heads passing through the points. From central control room, using Matrix smart client, security can monitor the total occupancy of an area and instruct the team accordingly. Thus, it provides a common platform to connect multi-brand cameras, secure video evidence at central location and control zonal occupancy, which were the major challenges. Control Zone Occupancy Why did PISPL choose Matrix? Matrix VMS architecture supports centralized / decentralized monitoring and management Matrix VMS interoperable with most of the reputed brands Possibility of scheduled backup at central location even at lower bandwidth People counting feature to control zone occupancy Benefits: Centralized control and management Ease of use Secure evidence Improve productivity Products: SATATYA SAMAS GE PLATFORM - VMS Platform with 50 camera licenses SATATYA SAMAS CAM20 – 20 camera additional licenses SATATYA SAMAS CROWD - 20 camera additional licenses management cam5
Globally-renowned Pay on Foot parking systems manufacturer, DESIGNA, has worked with the White Rose shopping center in Rhyl, North Wales, to update its car parking system to the company’s advanced ABACUS software and equipment. Contactless Card Payment The installation included new state-of-the-art entrance and exit terminals accepting tap in/tap out contactless card payment technology After many successful installations abroad, the shopping center is the first DESIGNA site in the UK to have installed its new tap in/tap out contactless credit card technology. The installation included new state-of-the-art entrance and exit terminals accepting tap in/tap out contactless card payment technology. There are also three full pay stations, a DBS server, manual pay station and intercom. All of this helps to improve the efficiency and security of the car park, which is popular with shoppers due to its seafront location. As the first part of the shopping experience, the convenience and availability of a car park is crucial to the overall service and satisfaction of a customer. DESIGNA recognized this and developed ABACUS, an advanced car park access system that intelligently integrates various elements to create the ultimate system that is highly reliable and requires less maintenance. It can also cope with large volumes of traffic while providing the highest level of monitoring to ensure a secure parking environment. ABACUS Car Park Access System The parking system is barrier controlled and makes use of DESIGNA barcode ticket technology. In addition to the standard ticket technology, the car park offers the facility to tap in/tap out using a contactless credit card. This operates with a unique identifier from the credit/debit card as a substitute for a ticket for the duration of the stay at the car park. When the customer presents a contactless card on entry, it recognizes them and by tapping again at the exit it automatically calculates the tariff and allows payment to take place at the exit. The system has three pay on foot machines which accept coins, notes and credit cards. With more than 30 stores, White Rose shopping center, Rhyl’s number one shopping destination, has a wide range of quality stores. Located in the center of the town, White Rose is a short walk from Rhyl’s seafront, railway station and sea aquarium, and has direct access car parking for 300 vehicles. The center previously had a chip coin solution installed on site. Advanced Ticket Machines The biggest advantage of having the DESIGNA system in place is the easy payment method" Sue Nash, Center Manager at the White Rose commented, “The biggest advantage of having the DESIGNA system in place is the easy payment method. The advanced ticket machines make it possible to pay using several means, therefore reducing the problem of queuing at the pay machines and having to pay with change. Another payment option we now have is the facility to pay through mobile devices and via contactless cards.” She continued, “The majority of people move around with credit cards rather than cash and having a versatile payment option in the car park makes for a painless process. The maintenance of the system at our local level was extremely important to avoid costly and timely engineer callouts. Simple things like ticket and coin jams, system resets are now extremely easy to resolve as is the exchange of entry tickets when required. I would certainly recommend the DESIGNA system to others and we are extremely pleased with the results.” Car Parking Ease And Convenience Specifier Andrew Bailey, of Parking Ideas, commented, “Parking Ideas is a complete car parking and transportation consultancy that helps institutions, property owners, landlords and managing agents develop and optimize their assets. I have worked with the White Rose shopping center for a number of years and following a competitive tender found that DESIGNA’s systems best suited the client’s requirements.” He continued, “The ABACUS system is good value, commercially viable and ticked all the right boxes for the White Rose. It is very important to have the facility to pay by card, so the payment terminals having this feature are vital to the center and have made all the difference to the running of the car park. Parking Ideas has been in the parking industry for more than 15 years, so we have worked with DESIGNA before and are very happy with the end result.” DESIGNA Ticket Terminals The car park’s entrance and exit are installed with DESIGNA In+ and Out+ ticket terminals so that using the site is fast and easy The car park’s entrance and exit are installed with DESIGNA In+ and Out+ ticket terminals so that using the site is fast and easy. The advanced terminals operate on the lowest energy consumption of their class with the ability to hold more tickets than before, with the bin adapting itself to the fill quantity. Customers are greeted with excellent user-friendliness due to the simplicity of the equipment and illuminated display with clear instructions. The four-way barcode readers also ensure visitors can insert their ticket any way round into any of the pay stations around the site. DESIGNA Pay On Foot Machines For payment, three of DESIGNA’s new Pay on Foot machines are in place in the car park. This allows customers to pay for their visit before returning to their car and exit the car park more quickly. The pay station is deliberately designed to allow disabled customers to pay freely without assistance. Each of the pay stations is installed with an interactive monitor that makes it easy to pay and offers several different languages. Shopping center management has full control of the ABACUS system through the DBS server, with a manual pay station (MPS) to allow them to create or override payments. The control room also links with the ticket and payment terminals via a DESIGNA VoIP Intercom to assist customers if required. Global Implementation DESIGNA has more than 15,000 systems installed globally across a wide range of car park situations DESIGNA’s parking systems are used in a number of impressive shopping centers around the world. These include the Dundrum shopping center in Dublin, the Mid Valley Megamall in Malaysia and the Mall of Emirates in Dubai. In the UK the Belfry shopping center in Redhill, the Woolshops shopping center in Halifax and the Wellgate center in Dundee have also benefited from the ABACUS system. Recognized worldwide for its high quality and intelligent systems, DESIGNA has more than 15,000 systems installed globally across a wide range of car park situations, including shopping centers, airports and hospitals. ABACUS is one of the company’s innovations and demonstrates the endless possibilities available to car park operators. The future-proof technology allows for expansions of premises or new property acquisitions by allowing additional systems to be added to the network. In its many global applications, ABACUS has proved to be an effortless system for both operators and users and is a great investment for companies looking to the future.
Round table discussion
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?
Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”
A major benefit of technology innovation is more application opportunities. As video cameras become better and more versatile, new uses are emerging that extend the benefits of video surveillance, often outside tried-and-true parameters. Sometimes security camera manufacturers are on the front lines to see new ways video is contributing value to integrators and end user customers. We asked this week’s Expert Panel Roundtable participants: What is the most unusual application of surveillance cameras you have seen recently?