Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year draws to a close, holiday and Christmas markets as well as major New Year’s Eve events, present c...
Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting Existing Hardware Today, low-co...
ISS – Intelligent Security Systems, global provider of intelligent VMS and native analytics globally, has been awarded a coveted Security System Approval Certificate from Dubai’s Security Industry Regulatory Agency (SIRA) for the company’s innovative SecurOSä Video Management System (VMS), SecurOS Auto License Plate Recognition (LPR/ANPR) analytics and unique SecurOS Motus 452 Camera for use in law enforcement applications. The combined VMS, analytics and camera solution d...
OPTEX, renowned global sensor manufacturer, will demonstrate the recently enhanced long-range RLS-3060 LiDAR series live on its stand, as well as showcase its new 180-degree outdoor sensor ideal for boundary protection. OPTEX LiDAR And REDSCAN Series Sensors “OPTEX’s LiDARs have been successfully deployed in the Middle East region for years, for a number of applications ranging from perimeter security to roof and asset protection. At this year’s Intersec we are looking forwar...
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all o...
Trillium Secure, Inc. has appointed Mahbubul Alam as Chief Marketing Officer and Senior Vice President of Global Engineering. This move further deepensTrillium's experienced management team while the company launches an end-to-end trusted and secured data services platform for vehicles. Alam's expertise in platform as a service offerings and over-the-air update technology for connected vehicles is a perfect fit for driving Trillium's recently launched Trusted Mobility Platform and Services. Cr...
Motorola Solutions, Inc. announced it has acquired VaaS International Holdings, Inc. (VaaS), a data and image analytics company based in Livermore, California and Fort Worth, Texas. Motorola Solutions paid a purchase price of $445 million in a combination of cash and equity. VaaS, a ‘video analysis as a service’ company, is a global provider of data and image analytics for vehicle location. The company’s image capture and analysis platform, which includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence, provides vehicle location data to public safety and commercial customers. Its subsidiaries include Vigilant Solutions for law enforcement users and Digital Recognition Network (DRN) for commercial customers. The company’s 2019 revenues are expected to be approximately $100 million. Improving speed and accuracy of investigations Vehicle location information can help accelerate time to resolution and improve outcomes for public safety agencies“Automated license plate recognition is an increasingly powerful tool for law enforcement,” said Greg Brown, chairman and CEO, Motorola Solutions. “With this acquisition, VaaS will expand our command center software portfolio with the largest shareable database of vehicle location information that can help shorten response times and improve the speed and accuracy of investigations.” VaaS’ platform enables controllable, audited data-sharing across multiple law enforcement agencies. Vehicle location information can help accelerate time to resolution and improve outcomes for public safety agencies, particularly when combined with police records. For example, law enforcement has used VaaS’ solutions to quickly apprehend dangerous suspects and find missing persons. Licence plate data and AI technology “We are very excited to be joining Motorola Solutions,” said Shawn Smith, co-founder of VaaS and president of Vigilant Solutions. “This acquisition enables us to continue to serve our existing customers and expand our footprint globally, while at the same time supporting a company with a commitment to innovation and growth, guided by a common purpose that aligns with our mission and culture: ‘To help people be their best in the moments that matter.’ It doesn’t get any better than that.” VaaS’ fixed and mobile license plate reader cameras can capture and analyze license plate information, which differs greatly by state and country“Our extensive license plate data and AI technology have opened new commercial applications of our products,” said Todd Hodnett, co-founder of VaaS and president of Digital Recognition Network. “We believe commercialization of these new applications can be accelerated under the Motorola Solutions brand and reach, and we look forward to working together to grow and diversify our commercial business.” License plate reading is a highly specialized practice that requires purpose-built cameras and analytics. VaaS’ fixed and mobile license plate reader cameras can capture and analyze license plate information, which differs greatly by state and country, even when vehicles are moving at high speeds or in low-visibility weather conditions.
Delta Scientific, global manufacturer of counter-terrorist vehicle control systems, announced its new DSC1500 portable beam barricade that sets up quickly and temporarily to block vehicles. The new portable barricade secures locations during short-term events and anywhere a beam barricade is needed for interim security. With a clear opening of 16 feet (4.8 m), the DSC1500 is M30 certified, able to stop a 15,000-pound (66.7 kN) vehicle going 30 mph (48 kph). DSC1500 Portable Beam Barricade "Many organizations have the need for easy to install, temporary drop-arm barriers that can install within 10 minutes to transitorily close down a roadway to one or two lanes or block parking lot exits to deter thefts," emphasizes Greg Hamm, Delta Scientific vice president, marketing. "Previous beam barriers had to be filled with sand, gravel or cement to be operable. To remove the DSC1500 from its temporary site, it is simply repacked in ten (10) minutes." The DSC1500 tows into position to control vehicle access within ten minutes The DSC1500 tows into position to control vehicle access within ten minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades unpack themselves using manual hydraulics to raise and lower the barriers off their wheels. A self-deploying trailer with integrated lifting device facilitates rapid installation. The process is simply reversed when the event is over, or when the time comes to deploy the beam barrier at another location. Portable Beam Barricades To Regulate Vehicle Access "From a purchasing standpoint, it can be easier to buy portable beam barricades than permanent solutions," adds Hamm. "The latter are oftentimes placed into an organization's real assets budget because they are permanently installed into the ground, becoming part of the property. Such budgets can often create complex purchasing scenarios for law enforcement or public safety departments. However, purchasing portable beam barricades is no different than buying protective vests for personnel or new sets of wrenches for the maintenance department." For one time uses, a lease plan has been created where organizations can simply lease the portable barriers, use them, pack them up and return them. Delta always keeps an inventory for purchase and quick delivery at their manufacturing facility in Palmdale, California. That's because, in many cases, they are needed for events that come up quickly, such as emergency road or bridge construction or unexpected parking lot requirements.
ADT Inc., global provider of monitored security and interactive home and business automation solutions in the United States and Canada, has announced the unveiling of its newly redesigned smart home security system – the ADT Command Panel & Control Platform (ADT Command) – as well as a suite of smart security and home automation products at the Consumer Electronic Show (CES). This year’s theme, “Real Protection,” will highlight the products ADT offers to ensure customer safety from any location. ADT Command ADT Command is a dynamic and innovative wireless panel with numerous smart home capabilities, including seamless set up and control with the ADT Control app, that allows customers to protect and automate their homes from anywhere at any time. “As home automation continues to evolve and become more accessible, we know our growing community of 3 million smart home customers want and expect a security solution that is fully integrated with the latest technology innovations,” said Don Young, ADT Chief Information Officer & Executive Vice President, Field Operations. “With ADT Command & Control, consumers get best-in-class monitoring service from the largest security network, combined with the most cutting-edge technology. The Control platform supports over 250 devices, ranging from carbon monoxide detectors to smart light bulbs, providing custom-fit solutions that provide customers with real protection.” ADT Monitoring And Emergency Response ADT Command customers receive ADT’s monitoring and emergency response, backed by 4,000 monitoring professionals across 10 monitoring centers ADT Command customers receive ADT’s monitoring and emergency response, backed by 4,000 monitoring professionals across 10 monitoring centers, providing 24/7 protection, 365 days a year. Key features include: Smart Security: Know who is arriving home and when, with the 7-inch wireless, touchscreen Command panel that snaps a photo when the system is disarmed using its built-in camera. By creating dynamic scenes and rules, your smart home devices work in harmony to keep your family safe. For example, in case of a fire, the system can be connected to the thermostat, lights and doors, making it easier and safer for everyone to get outside. Connected And Secure Home: Keep your home connected 24/7 with the panel’s battery backup with dual path Broadband and LTE cellular communications. ADT Command features two-way encryption RF sensor technology to help reduce the potential for hacking. For increased control of your home, unique user codes and permission settings can grant access to users only on the days and times you specify. Geofencing And Voice Control Technology: The app’s geofencing technology generates helpful automations and alerts to trigger events, with reminders such as arming the security system when you leave the house. With voice control technology, you can easily control your system simply with your voice. Remote Arming And Disarming Of System: Use the Control app to carry out preset automations when you leave or arrive home, allowing you to remotely arm or disarm your system. No matter where you are, you can rest easy knowing your doors are locked, your lights are on or off and your home is secured. You can even watch live video and images from your mobile phone, tablet or smartwatch, so you can stay connected to your home no matter where your travels take you. ADT Solutions On Display At CES 2019 Located at Veronese 2504 at the Sands Expo Convention Center, ADT will be showcasing several additional products and services that bring users peace of mind and real protection irrespective of where they are. Highlights include: ADT Go: This all-in-one mobile safety app provides a companion with you wherever you go—whether you’re in the car or in a new city. Created in partnership with trusted locator and communication tool Life360, the app offers family check-in and location geo-fencing capabilities, local crime data, driving activity alerts, crash detection and response, roadside assistance, and 24/7 SOS emergency response from ADT’s trusted live monitoring agents. Available in Apple and Android app stores, ADT offers two service options to give you peace of mind that fits your family’s needs. ADT Video Doorbell: The weatherproof, high-definition video doorbell provides front door security, allowing users to receive alerts, photos and videos, when the doorbell is engaged. The doorbell can also reduce false motion events by using object detection, pairing it with other motion data to determine true events and provides superior video quality and crisp wide-angle views with de-warping features. Voice Control Integrations: ADT’s integrations with Amazon Alexa and Google Voice Assistant provides users a hands-free solution for dynamic scenes that deliver a personalized service. Customers can utilize voice commands to arm or disarm their systems, lock and unlock doors, and manage other smart devices like lights and thermostats—making the home not just smarter, but safer. Interactive Crime Map: ADT’s free, interactive crime maps provide up-to-date information on crime statistics, including assault vehicle theft, robbery, and more. This tool assists future homebuyers when considering a neighborhood and helps travelers choose the best places to stay when visiting a new city.
ISS, Intelligent Security Systems, global provider of intelligent VMS and analytics, is showcasing two highly specialized analytics solutions for vehicle surveillance and law enforcement applications at ISC East 2018 (booth #527). Natively developed and designed to seamlessly integrate with ISS’ SecurOS v10 platform, SecurOS UVSS (Under Vehicle Surveillance System) combines advanced software and hardware for remote under-vehicle surveillance. Furthermore, the ISS SecurOS Motus is an IP-camera offering featuring integrated ANPR analytics for high-speed accuracy in commercial and law enforcement applications. SecurOS UVSS (Under Vehicle Surveillance System) “SecurOS UVSS and Motus are ideal for large municipalities, making the greater New York City market ideal for these innovative and highly accurate vehicle surveillance solutions,” said Cody Flood, Vice President of North American Sales, ISS. “Because SecurOS UVSS and Motus were specifically developed for seamless integration with our recently released SecurOS v10 VMS platform, these highly advanced solutions can be quickly and easily implemented with outstanding results.” SecurOS UVSS creates a database of high-resolution images of vehicle undercarriages and recognizes vehicle license plates SecurOS UVSS creates a database of high-resolution images of vehicle undercarriages and recognizes vehicle license plates, making it ideal for numerous venues where underground parking or structured parking facilities are utilized. Unlike makeshift under-vehicle surveillance deployments, the ISS SecurOS UVSS can monitor vehicles with high precision, and can be deployed virtually out of the box when interfaced with ISS SecurOS VMS. Other differentiating features include: automatic vehicle presence detection; automatic comparison of a vehicle’s undercarriage image with reference images stored in the user’s databank; simultaneous display of live and archived video from all cameras; built-in machine vision camera; corresponding ISS LPR/ANPR cameras; and interoperability with integrated security and access control systems, traffic lights, barriers, electronic displays and third-party systems. SecurOS Motus Network IP Camera SecurOS Motus is a specialized camera for running ISS license plate recognition software that delivers accurate image quality in both day and night under all weather conditions. Core features include: a motorized lens; IP67 rating to protect against harsh environments; easy installation with limited wiring for fast and easy deployment; remote setup and configuration adjustment; a built-in configurable IR or white-light illuminator; superior image quality and ANPR precision; and low power consumption. The CE and FCC certified solution also features a two-year warranty and comes with an adjustable wall-mount bracket with optional pole-mount bracket.
Panasonic System Solutions Company of North America will launch the first 4 x 4K Multi-Sensor video surveillance camera at Global Security Exchange (GSX) 2018 Expo at the Las Vegas Convention Center, Las Vegas, NV, in booth 2737. Part of the new Panasonic i-PRO Extreme line of video surveillance cameras, the Multi-Sensor delivers extreme image quality – 4x4K (33 MP), 3840x2160, 15 FPS – for evidence capturing from any angle for use in safe city and traffic applications. The Multi-Sensor cameras have four repositionable lenses which reduce blind spots; four high image quality 4K image sensors; provide sharp and clear images of fast moving vehicles with iA (intelligent Auto) support; ClearSight Coating; environmental durability (IP66, IK 10 and Dehumidification); and deliver enhanced low light performance in true color with Super Dynamic 108dB for backlit situations and shadows. Multi-Sensor model WV-X8570N is now available. Enhance Security And Safety “The capability of the Multi-Sensor to deliver extreme image quality even in the most challenging conditions is what sets it apart from similar cameras in the market. Panasonic is pushing the limits of technology in video surveillance in an effort to help enhance security and safety,” said Domingo Martinez, Product Marketing, Panasonic System Solutions Company of North America. Our customers have been eagerly awaiting our Multi-Sensor camera and we are excited to officially launch it here at GSX" “Our customers have been eagerly awaiting our Multi-Sensor camera and we are excited to officially launch it here at GSX.” In addition to the Multi-Sensor, the line of i-PRO Extreme video surveillance cameras includes the 5 MP Fixed Camera. Reduce Transmitted Data The i-PRO Extreme 5 MP fixed camera line offers iA (intelligent Auto); Auto Shutter speed control for moving vehicles; image capture of a person walking in daylight or at night; optimum low light performance; and Super Dynamic 120dB for backlit situations including headlights or shadows on streets. With 5 megapixel images up to 30 FPS, efficient H.265 compression provides longer recording and less storage than other H.264 techniques. New self-learning ROI detects movement within an image and compresses areas with little motion to reduce transmitted data while maintaining the quality of the image. Complete end-to-end system encryption with supported i-PRO recorders and devices provides protection from IP snooping, IP spoofing, and data alteration. To demo the Panasonic i-PRO Extreme 4K Multi-Sensor camera and other security systems solutions, visit Panasonic Booth #2737 at GSX 2018 at the Las Vegas Convention Center, Las Vegas, NV.
ISS - Intelligent Security Systems, a provider of intelligent VMS and analytics globally, demonstrates its newly released SecurOS v.10 Video Management System supported by their powerful suite of native intelligent analytics, along with SecurOS Smart NVR, an all-in-one video management appliance here at GSX 2018 (booth #2151). ISS’ unique combination of a natively developed VMS platform and portfolio of advanced analytics ensures seamless integration of customized video management and control solutions for a wide range of surveillance and business intelligence applications. Integrated Physical Security Solutions “ISS’ extensive experience in space technology and areas such as neural networks, pattern recognition and robotic control systems provide a foundation for higher levels of integrated physical security solutions. As a result, ISS is in a unique position to deliver new benchmarks in surveillance intelligence versus legacy video manufacturers,” said Cody Flood, Vice President of North American Sales, ISS. ISS provides industry professionals with a more holistic approach to camera management and control “By seamlessly integrating native analytics with our new SecurOS v.10 VMS platform, ISS provides industry professionals with a more holistic approach to camera management and control, enabling us to provide users with truly innovative and unique solutions for their specific applications, regardless of the assortment and brand of cameras they may be using.” Enhanced Remote Access ISS’ newly released SecurOS v.10 Video Management System features an updated Client and Administrator GUI with new Operator Workstation Profiles to manage large numbers of clients on a unified platform along with new object groups/categories for more intuitive, customized system configuration. Additional improvements include enhanced remote access, cyber security and native failover operations along with 64-bit processing, H.265 Intel Quick Sync decompression support, and a brand new Evidence Manager to easily export files. SecurOS v.10 is available in five configurations to deliver the perfect balance of functionality and cost-efficiency for every size and level of application. License Plate Recognition SecurOS Cargo Terminal for remote visual inspection of cargo containers and control of vehicles which carry them SecurOS v.10 is also available pre-bundled with ISS’ native analytics for specialized VMS applications, including: SecurOS Auto with license plate recognition (ANPR) and comparative vehicle analysis; SecurOS Face for facial recognition; SecurOS Cargo for cargo container recognition; and SecurOS Tracking Kit which includes a suite of situational awareness detectors such as loitering, crowd detection, object left behind, object counting, etc… SecurOS UVSS for remote under-vehicle surveillance; SecurOS Velox, to detect speeding violations with ANPR; SecurOS Motus with ALPR for law enforcement applications; SecurOS Cargo Terminal for remote visual inspection of cargo containers and control of vehicles which carry them; and SecurOS Crossroad for real-time detection of complex types of traffic violations. Intelligent Surveillance Solutions “As cameras and other legacy video surveillance hardware become more commoditized, there will continue to be more emphasis placed on software driven command and control solutions that introduce new levels of intelligence,” continued Mr. Flood. “We’ve designed our business model to uniquely position ISS as a true provider of intelligent surveillance solutions that provide increased situational awareness, drive higher levels of predictive analysis, and are scalable to accommodate future growth and new trends and technologies as they emerge.” Adding to the company’s continually growing list of technology partners, ISS has recently joined forces with Intel to leverage their innovative OpenVino framework for deep learning and computer vision applications.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organize and regulate. Integrating Drones In Existing Regulatory Ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS Measures And Regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones European c-UAS Legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS Legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorization act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating Counter-Drone Legal Infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers.Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option Now, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their readers which use smart phones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option with many more features to be leveraged. Handsets deliver biometric capture and comparison as well as an array of communication capabilities from cellular and Wi-Fi to Bluetooth LE and NFC. As far as security goes, the soft credential, by definition, is already a multi-factor solution. Types Of Access Control Authentication Access control authenticates you by following three things: Recognises something you have (RFID tag/card/key), Recognises something you know (PIN) or Recognises something you are (biometrics). Your smart phone has all three authentication parameters. This soft credential, by definition, is already a multi-factor solution. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs. Organizations want to use smart phones in their upcoming access control implementations Once a biometric, PIN or password is entered to access the phone, the user automatically has set up 2-factor access control verification - what you know and what you have or what you have and a second form of what you have. To emphasize, one cannot have access to the credential without having access to the phone. If the phone doesn’t work, the credential doesn’t work. The credential operates just like any other app on the phone. The phone must be “on and unlocked.” These two factors – availability and built-in multi-factor verification – are why organizations want to use smart phones in their upcoming access control implementations. Smart Phone Access Control Is Secure Plus, once a mobile credential is installed on a smart phone, it cannot be re-installed on another smart phone. You can think of a soft credential as being securely linked to a specific smart phone. Similar to a card, if a smart phone is lost, damaged or stolen, the process should be the same as with a traditional physical access credential. It should be immediately deactivated in the access control management software - with a new credential issued as a replacement. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs Leading readers additionally use AES encryption when transferring data. Since the Certified Common Criteria EAS5+ Computer Interface Standard provides increased hardware cybersecurity, these readers resist skimming, eavesdropping and replay attacks. When the new mobile system leverages the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), it also will interface easily with control panels or other security management systems, fostering interoperability among security devices. Likewise, new soft systems do not require the disclosure of any sensitive end-user personal data. All that should be needed to activate newer systems is simply the phone number of the smart phone.All that should be needed to activate newer systems is simply the phone number of the smart phone Bluetooth And NFC The Safer Options Bottom line - both Bluetooth and NFC credentials are safer than hard credentials. Read range difference yields a very practical result from a security aspect. First of all, when it comes to cybersecurity, there are advantages to a closer read range. NFC eliminates any chances of having the smart phone unknowingly getting read such as can happen with a longer read range. There are also those applications where multiple access readers are installed very near to one-another due to many doors being close. One reader could open multiple doors simultaneously. The shorter read range or tap of an NFC enabled device would stop such problems. However, with this said in defense of NFC, it must also be understood that Bluetooth-enabled readers can provide various read ranges, including those of no longer than a tap as well. One needs to understand that there are also advantages to a longer reader range capability. Since NFC readers have such a short and limited read range, they must be mounted on the unsecure side of the door and encounter all the problems such exposure can breed. Conversely, Bluetooth readers mount on the secure sides of doors and can be kept protected out of sight. Aging Systems Could Cause Problems Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions With that said, be aware. Some older Bluetooth-enabled systems force the user to register themselves and their integrators for every application. Door access – register. Parking access – register again. Data access – register again, etc. Newer solutions provide an easier way to distribute credentials with features that allow the user to register only once and need no other portal accounts or activation features. By removing these additional information disclosures, vendors have eliminated privacy concerns that have been slowing down acceptance of mobile access systems. In addition, you don’t want hackers listening to your Bluetooth transmissions, replaying them and getting into your building, so make very sure that the system is immunised against such replays. That’s simple to do. Your manufacturer will show you which system will be best for each application. Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions. They are unquestionably going to be a major component in physical and logical access control. Gartner suggests that, by 2020, 20 percent of organizations will use mobile credentials for physical access in place of traditional ID cards. Let’s rephrase that last sentence. In less than 18 months, one-fifth of all organizations will use the smart phone as the focal point of their electronic access control systems. Not proximity. Not smart cards. Phones!
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognizable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognizes when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognizable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing A Lightweight Alternative “When you trigger a pathway, it’s signaling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customized to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern Network Infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analog to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 meters. The products have been used recently to transition a series of cruise ships from analog to IP video without having to replace cabling and spending only two days in dry dock for the installs. A New Focus Away From AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
Information can be a scarce commodity in the midst of terrorism or a mass shooting incident. Information can also save lives during the first critical moments of such events. The general public can now download a free smartphone app that provides instantaneous real-time information as a terrorism or mass shooting event is unfolding. TerrorMate Crawler Software Called TerrorMate, the app began development in 2013, in the wake of several terrorist attacks in France. People in the affected areas were relying on media sources, which sometimes do not provide information on a real-time basis as an event unfolds. To provide information faster, TerrorMate’s proprietary “crawler software” uses more than 200 key words to monitor Internet, social media and “dark web” sources. They also monitor Telegram channels, which are private encrypted messages that terrorists use to communicate. TerrorMate has access to four channels used by the Islamic State. Know Your Enemy Any leads are then confirmed using 1,100 human sources “on the ground” around the world, including contracted security consultants and law enforcement. TerrorMate employs 15 analysts and 10 software developers who work in a global control room in Belgium 24/7 to monitor any situations. Unlike media professionals, who are monitoring a range of news stories in a variety of fields, TerrorMate operators are focused solely on terrorism and mass shooting events. TerrorMate’s proprietary “crawler software” usesmore than 200 key wordsto monitor Internet, social media and dark web sources “We keep up with what the threat is doing,” says Barry Oberholzer, founder of TerrorTech, the developer of TerrorMate. “You need to know your enemy. We keep analyzing and researching so we know the enemy. Mass shootings are hard to predict, and terrorists keep changing their methods, from suicide bombings to vehicle attacks. The game keeps changing, and we see that and keep up to speed on what they’re doing.” Intelligence Communication TerrorMate also keeps up to date by communicating with authorities around the world, ranging from an intelligence agency in Spain to the customs and immigration services in Great Britain, from Belgium’s state security services to France’s national police. In addition, TerrorMate is an authorized alert distributor of the Integrated Alert and Warning (IPAW) system operated by the U.S. Department of Homeland Security and the Federal Emergency Management Agency (FEMA). Mission Goals TerrorMate has a two-pronged mission. One goal is to provide actionable intelligence to law enforcement to help prevent an imminent attack. If TerrorMate personnel identify a possible threat, whether on social media or the dark web, they confirm the information and then communicate it to local law enforcement. The second goal is to provide real-time information to the general public about terrorism and mass shooting events. The app can be downloaded from the iTunes app store or Google Play. TerrorMate employs 15 analysts and 10 software developers who work in a global control room 24/7 to monitor any situations In addition to providing timely reports, the TerrorMate app includes a “safety guide” during an attack, advising phone numbers that users can call or people they can contact for additional information; listing which areas they should avoid; which public transport systems are functioning, etc. The goal is to get people to safety as soon as possible. During an attack in Barcelona on August 17 this year, the app provided a discount code to enable users to get a free taxi ride home from the affected areas. Tailored Location Alerts Because the app uses the smartphone geolocation feature, TerrorMate can send tailored alerts based on where a user is located. Users can also choose whether they want only local (in-country) or international alerts. Users may upload media, including photos and video, to the app; all information is verified by the TerrorMate control room and then shared with authorities. Because the app uses the smartphone geolocation feature, TerrorMate cansend tailored alerts basedon where a user is located The app also allows users to share their location with a list of contacts, in effect enabling users to see where their loved ones are during an incident, and to send and receive messages. The feature was developed after the May 2017 bombing at an Ariana Grande concert in Manchester, United Kingdom, when parents needed information on whether their teenagers were safe as the tragedy unfolded. Vehicle Integration TerrorMate will integrate with vehicle systems such as OnStar and Uconnect within the next six months. Companies may also subscribe to the service. A benefit is early warning of a terrorist event that might impact a company’s operation. For example, one stock broker subscribes to the service to get early warning of any incident that might negatively impact stock prices. Corporate licensing fees are one source of potential revenue for the company, which currently is self-funded and has little revenue, according to Oberholzer. Identifying what constitutes a mass shooting is not always a clear-cut process, and often the determination happens in real-time. The basic criteria TerrorMate uses is multiple casualties in a highly populated area. Analysts make the call based on real-time information as it comes into the control center about an unfolding incident. Any early information that is reported is labelled as a “possible” mass shooting until it is confirmed. TerrorMate is currently available in English, French, German, Spanish, Italian, Russian, Korean, Japanese, Chinese, Dutch, Swedish and Portuguese. Infographic: How To Prepare For Active Shooter Incidents
Advances in LPR: License plate recognition (LPR) is used widely today in law enforcement applications, but the enterprise security market is also catching on to benefits of the technology – especially when it is combined with other video analytics. PlateSmart Technologies, Oldsmar, Fla., is working to maximize those benefits and to use LPR as a real-time, proactive tool for physical security. PlateSmart’s ARES Enterprise Video Analytics System is a software-only platform that combines LPR with video analytics. The system is compatible with the newest HD cameras or can be retrofitted to legacy cameras, even analog. The system can work alone or can be integrated with existing video management systems and server hardware. The newest option is availability of LPR software inside the camera: PlateSmart offers an LPR-based video analytics “app” that can be loaded onto a Samsung Techwin Wisenet III camera. The company is working with other camera manufacturers, too. “That’s one of the beautiful things, we are a software-only, open-platform technologies, and we can easily conform to a given camera platform if there is enough processing capability,” says John Chigos, PlateSmart’s CEO. Combining LPR with video analytics provides better, more proactive, real-time results, adds Chigos. Integration of LPR and video analytics with various federal, state or private industry databases provides additional real-time data about vehicles as they come, go and move around a secured site. For example, the system can tell if a vehicle drives into an area where it shouldn’t go, say in a certain parking lot, in effect recognising the behavior of the vehicle. Benefits of Platesmart ARES: “Technology such as ours will be part of a solution that, combined with human intelligence and other video analytics capabilities, can prevent acts of terrorism,” In addition to reading the license plate number, Chigos says the system can also read the jurisdiction, country and province on the license plate, and video analytics can recognize the type of vehicle, its color, even the make and model (by recognising emblems or logos on a vehicle). Although designed for the U.S. market, the system easily adapts to applications throughout the world; for example, the license plate numbers in Europe are larger and easier to read. (In Europe, LPR is often referred to as ANPR [automatic number plate recognition].) PlateSmart’s system can also enable patterns to be developed based on the actions of a vehicle; databases can be created of vehicle activity; and “black lists” or “white lists” of vehicles can be compiled. “We do not touch the data; all the data is given to the end user,” says Chigos. “We set up the rule sets, or they can set them up.” “Technology such as ours will be part of a solution that, combined with human intelligence and other video analytics capabilities, can prevent acts of terrorism,” adds Chigos. “Technologies are changing to meet market needs, and we are part of that solution.” The company also offers a facial recognition software suite that can match video images of a driver’s face against faces in a driver’s license database, for example. High-speed vehicle tracking: The ARES system reads plate number and performs other analytics using a single video image, unlike some LPR systems that use two cameras – one to view the total image for context and a second, specialized IR camera to read the numbers on the license plate. There are also no other hardware elements, such as frame grabbers; it’s just the cameras and the software. Scalability is easy given that one installation may include hundreds of cameras plugged into the system. "The system can also make out three different numbers in a single video image, and the overall accuracy is 90 percent." PlateSmart says its system can read the license numbers from vehicles traveling at rapid speeds – the system captures numbers on vehicles traveling between 0 and 80 miles per hour on a highway between Tampa and Orlando, Fla. The system can also make out three different numbers in a single video image, and the overall accuracy is 90 percent. Chigos emphasises that means 90 out of 100 vehicles passing by; sometimes other manufacturers quote accuracy figures based on the number of plates it recognizes, not on the total number of vehicles passing by. Therefore, the percentage is higher. Market sectors: Applications so far have included water treatment plants, ports, and military bases. An initial pilot program was implemented at the Republican National Convention in 2012 in Tampa. The system is currently being used at Port Tampa Bay, Florida’s largest maritime port and the 16th largest in the United States. The system can also be used for site surveillance at hospitals, universities, and manufacturing and distribution centers. “Our technology takes advantage of cameras these facilities already have installed,” says Chigos. “When you add LPR on top of existing systems, we produce additional information without having to incur large capital expenditures.” Teaming up with defense systems integrator enrGies, Huntsville, Ala., PlateSmart is working to perfect the first LPR and video analytics technology for Unmanned Aerial Vehicles (UAVs, or drones) to assist security agencies and military personnel in combatting crime and terrorism. Soon the “eye” in the sky will be able to read your license plate numbers.
Integrity Security Group is using SmartTask’s SmartForms to gain added visibility and dramatically cut down on its administrative burden. Having adopted the employee scheduling and mobile workforce management software last year for the provision of proof of attendance, control room management and staff rostering, the company is now using its electronic data capture functionality to streamline a range of operational processes. Initially, SmartForms are being used for vacant property and mobile patrol inspections as well as daily vehicle checks, already saving more than 15 hours of admin a month. SmartTask SmartForms The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team “We are now using the SmartTask SmartForms to help reduce administration, capture critical work data and enforce health and safety procedures,” explains James Chittil, General Manager at Integrity Security Group. “We are constantly looking at clever ways to take advantage of the software’s rich functionality, so we can continue to simplify and enhance the way we operate.” The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team. All reporting for vacant property and mobile patrol inspections – for both scheduled patrols and alarm activations – are now completed using a SmartTask-enabled smartphone. By electronically capturing all relevant information, including photo evidence, Integrity can quickly provide customers with a status update and details of all undertaken work as well as respond to any identified issues. Vehicle Checks And Fleet Management Meanwhile, daily vehicle checks for Integrity’s fleet of vans are now completed using a specially-developed SmartForm, so the company can instantly see if drivers are complying with this health and safety procedure. Any vehicle-related problems or damage can be raised by the driver and actioned immediately by the admin team to mitigate fleet risk. Mileage data is also captured through the software, enabling maintenance requirements to be tracked and scheduled at appropriate intervals. “The SmartForms are enabling us to dramatically reduce paperwork and remove manual processes. This is making it much simpler for both our security officers in the field and our office-based admin team to capture, collate and communicate essential operational data. This is not only helping us make better use of our valuable resources, but also enhance the service we are providing to customers,” added James Chittil. Paul Ridden, CEO of SmartTask commented: “Our experience within the security sector means we are continually developing new functionality that overcome real-world problems for our customers. This is the reason we are working in partnership with a growing number of security businesses who recognize the value they can gain and the benefits they can achieve from using the SmartTask software.” Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff Lone Worker Protection Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff as part of its commitment to lone worker protection. The company is also using the intelligent rostering functionality to streamline internal planning processes, while the interactive dashboard supported the launch of a dedicated, out-of-hours control room operation by providing a live view of all scheduled shifts and expected or missed check calls. SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorized access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling Access Areas Within Hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single Access Card System Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilizing a single accesscard system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilizing a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the center of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-Down System Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional license feature. Streamlined Parking Processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being rechargedThe program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilizing another Gallagher license feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Technology company Nedap has provided physical access control and long-range readers for vehicle identification at the new AZ Zeno medical care center in Knokke-Heist (Belgium). AZ Zeno, which opened in April 2018, consists of a hospital with rehabilitation center, an outpatient clinic, auditoria, public event space and a heliport. Nedap Identification System and Nedap Security Management have worked together on this extensive project. It is AZ Zeno’s highest priority to guarantee the security of patients and employees. With Nedap’s TRANSIT long-range identification readers, emergency vehicles get swift access to the hospital’s premises. Physical Access Control AZ Zeno combines functionality and sustainability and respects the rural character of the local landscapeWith AEOS, Nedap provides the medical care center with a complete solution for physical access control, and the system will also be used to manage staff lockers. By combining Nedap’s solutions, AZ Zeno is able to offer both patients and employees the best possible security and accessibility. AZ Zeno combines functionality and sustainability and respects the rural character of the local landscape. The link between inside and outside and between medical facilities and public spaces is almost seamless. And the center’s sustainable design focusses on its surroundings, ecological energy and the use of reclaimed materials. Better Accessibility Nedap-CEO Ruben Wegman: “We are proud that two of our business units contribute to the security of this exceptional and innovative center and to a better accessibility for its users. The simultaneous implementation of AEOS and TRANSIT is a great example of the complementary character of Nedap’s products.” To implement the system, Nedap collaborated with partner Electro Enterprise Gullegem.
Access control system specialist Nortech has recently seen a luxury hotel in Bath update its car park by replacing its existing Nortech FeeMaster system with the latest specification. Nortech’s FeeMaster range was installed by access control system experts APT Security Systems, which is currently updating its past application of the FeeMaster system, so that staff can continue to monitor use of the hotel’s car park. APT Security Systems is the provider of vehicle access control and traffic management systems in the UK. Using its experience in designing and delivering practical and cost-effective solutions, APT installed the updated system which includes the FeeMaster Smart Entry Station, FeeMaster Smart Exit Station, and a FeeMaster Smart Console inside the building. The console allows the staff to control any misuse of the car park and ensures that there are enough parking spaces for its guests. Upgrading Car Parking System To Latest Version Nortech’s FeeMaster Smart parking management system is a flexible, simple and cost-effective way of managing car parking accessMary Lynskey, Operations Manager at APT Security Systems commented, “Nortech’s systems have been used on our projects for a number of years and as with this hotel we are currently updating the equipment at these sites to the latest versions. We have worked with Nortech for more than 20 years and are very pleased with its equipment.” She continued, “The FeeMaster range has always worked well for the hotel and they were happy to renew the system as it’s the right fit for their business. The client likes how the products work and we will always recommend Nortech to others looking to upgrade their car parking systems.” Nortech’s FeeMaster Smart parking management system is a flexible, simple and cost-effective way of managing car parking access and controlling validity periods using Mifare smart cards. This avoids the need for expensive cabling between components and minimizes disruption. Functioning Of The FeeMaster System The FeeMaster Smart exit station prevents unauthorized vehicles leaving a car park or entering restricted areasThe FeeMaster entry station is designed to be used to record the date and time that a vehicle enters a car park. Located at the entrance of the car park, it issues tickets to visitors as they arrive, with each ticket containing a barcode, serial number and the date and time. Dispensing the ticket triggers an ‘open’ signal to the entry barrier. The ticket is then taken to the hotel’s reception desk where the date and time is used in conjunction with the FeeMaster Smart Console. The FeeMaster Smart exit station prevents unauthorized vehicles leaving a car park or entering restricted areas. Located at the exit of the car park or the entrance to a restricted area, it validates the Mifare smart cards and exit tokens. The exit station is equipped with a barcode scanner to read exit tokens issued by the FeeMaster Smart console, as well as entry tickets issued at the entry station. Each ticket is valid for single use at the exit station during the validity period assigned to it. The exit station controller checks the details on the barcode ticket and sends an ‘open’ signal to the barrier. Encoding Reusable Mifare Access Control Cards The FeeMaster Smart Console is a compact and easy-to-install device that reads barcode tickets issued at the entry stationThe FeeMaster Smart Console is a compact and easy-to-install device that reads barcode tickets issued at the entry station, calculates the fees based on pre-programmed tariff details, and encodes reusable Mifare access control cards with validity data. If necessary, the console can print customer receipts and/or barcode exit tokens. It can also control a till drawer and can optionally provide a relay output signal which can be used by third equipment i.e. barrier control whenever a card has been encoded or an exit ticket printed. The console may also be connected to a PC so that transactions can be analyzed and additional tariff management features may be used. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Primark, the international retailer that offers Amazing Fashion at Amazing Prices, is using Traka’s dock door and intelligent management solutions to ensure maximum efficiency and safety across its warehouse and distribution centers. Primark operates from eight distribution centers. Its most recent opening was in Islip, Northamptonshire, UK covering 1.1 million sq. ft. of space – the equivalent of 17 football pitches. It has 13 miles of aisles and is a 24/7 operation powered by over 250 committed employees. A key part of Primark’s success is its efficient distribution of goods to store to meet growing customer demands. This is a complex operation involving the use of a wide range of technology. Traka DockSafe Door Dock Solution To ensure effective turnaround times, Traka’s multifunctional DockSafe door dock solution was installed to stop vehicles prematurely leaving Goods Out Bays, alongside intelligent key management systems. Traka supports Primark’s distribution centers with its DockSafe solution and key management systems" David Flavell, Primark’s Operations Development Manager – Supply Chain said: “Primark’s products fly off the shelves and rails, so we need to get our products from suppliers to stores as quickly and as safely as possible. Implementing the Traka DockSafe has been critical here. Not only is it simple to use, but also provides data on driver activity and bay usage, as well as increased peace of mind thanks to the prevention of driveways. It ensures the system runs like clockwork, which is great news for our colleagues while working hard to deliver Amazing Fashion to our customers.” Dock Combination With iFob Technology Traka’s intelligent DockSafe solution has been exclusively designed to stop vehicles prematurely leaving the Goods Out bays of a busy distribution center. DockSafe combines Traka’s iFob technology with a unique Susie lock to create a robust protocol where a vehicle must be immobilized prior to the loading dock door being opened. Once goods are loaded, the door must be closed and the loading bay clear of forklifts or personnel, before the vehicle can be unlocked and driven away. Steve Bumphrey, UK Sales Director added: “Traka supports Primark’s distribution centers with its DockSafe solution and key management systems. With advanced features and data reporting, it ensures its people can optimize loading bay planning for long-term efficiency and productivity, in a safe and secure working environment.”
STANLEY Security, one of the most trusted names in the world of security, has installed an intruder alarm system at Wraps & Tints’ new premises, which houses high value vehicles. The system not only protects the contents but also meets the insurance company’s needs, keeping everyone happy! Based in Leyland, Lancashire, Wraps & Tints is the North West’s Paint Protection Film, Vehicle Wrapping and Window Tinting installers. The company has gone from strength to strength and recently moved into larger premises to meet customer demand and to better represent the quality of the service with a smarter, more professional working environment. Provide Certification With supercars and high-end vehicles occasionally stored, and to meet insurance requirements, an intruder alarm system was requisite within the new premises. After initially employing a small, local security company to undertake the job who were unable to provide the certification needed by Wraps & Tints’ insurance company, Jonathan Burke, Director of Wraps & Tints, approached STANLEY Security. The system incorporates dual technology detectors, door contacts and roller shutter contacts, interconnected and fed back to a control panel Following a risk assessment of the building content and the building’s fabric and structure, STANLEY Security installed a hard wired Texecom intruder alarm system to Grade 2 (low to medium risk). The system incorporates dual technology detectors, door contacts and roller shutter contacts, interconnected and fed back to a control panel. A maintenance contract is in place with STANLEY Security to ensure the system remains fully functional. Highly Skilled Technicians Jonathan is pleased with the outcome, finding the system easy to use. He’s also happy with the service he received, which was ‘straight forward and efficient’. Ultimately, the new intruder alarm system has enabled him to cost-effectively meet his insurer’s requirements and to focus on his business with the peace of mind that comes from knowing his property and its contents are well protected. STANLEY Security provides security services to a wide range of organizations. Its SME division offers high-quality business security systems regardless of the size of office, building, store or facility. All installation work is handled by a team of highly skilled technicians, each of whom is locally based across offices located across the UK.