Video management software
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Security Center Omnicast™, its video management system (VMS), has received the UL 2900-2-3 Level 3 cybersecurity certification for the second year in a row. The UL Cybersecurity Assurance Program (UL CAP) is a robust certification program that evaluates the security of network-connectable products and vendor processes. It features standardized, testable c...
If one works in the technology industry, it’s likely one has been hearing about recent advancements in AI-based video analysis for years now. The tech has seemingly hit its stride, with new services and applications continually popping up to expand and support the ecosystem. For an example, one really has to look no further than Amazon Rekognition, which leverages Machine Learning (ML) to make it easy to identify things like objects, people, or text within videos and images. AI developmen...
Video surveillance users can adapt to the challenges of working more flexibly between home, office, stores, and the control room with the newly released IDIS Mobile Plus app. Mobile Plus integrates the company’s popular IDIS Mobile app with its network and digital recorders, network cameras, and IDIS Solution Suite VMS. It delivers improved and more powerful functionality - anytime and anywhere – and gives users remote situational awareness of single and multiple sites. The app ena...
Vicon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components, announced the availability of Valerus version 20.2, which brings improved cybersecurity and streamlined maintenance to the forefront. This latest release offers features including mobile video streaming, geo mapping, snapshot, robust health dashboard, audit log, and a thick client solution. Valerus’ addition of mobile video streaming allows users to send live or re...
Integrated security manufacturer TDSi is proud to announce the launch of the new and enhanced version of its GARDiS security software, Version 2.0. Among the upgrades, GARDiS 2.0 features new Fire Door release and Site Lock Down functions, along with integration with ASSA ABLOY Aperio and SimonsVoss SmartIntego wireless locks. GARDiS 2.0 software TDSi’s Managing Director, John Davies commented, “We are excited to unveil the new version of our Software as a Service (SaaS) GARD...
Senstar, a renowned provider of video management software and perimeter intrusion detection solutions, is pleased to announce its Senstar Symphony Access Control (AC) software now integrates with the new HID Aero Controller platform. To support this integration, Senstar is providing HID Aero Controllers as part of its access control offering. Available controllers include the HID Aero X1100 Intelligent Controller, X100 Door/Reader Interface Module, X200 Input Monitor Module and X300 Output Cont...
Eagle Eye Networks, the provider of cloud video surveillance, announces the launch of the Eagle Eye Local Display Station. The new video appliance integrates seamlessly with Eagle Eye’s Cloud Video Management System (VMS), displaying up to 32 cameras on any standard TV display and up to 164 cameras across multiple display pages. The Eagle Eye Local Display Station is available in two models, the DS100 which supports a single display, and the DS200 which supports two displays. Both models provide ultra-low latency, crisp, and clear video. The software provides high reliability and customizable layouts which are controlled and managed from the cloud. Embedded software technology The Eagle Eye Local Display Station delivers live video without the cost, complexity, and maintenance of a workstation, making it ideal for use in public areas or remote locations with less technical support staff. It delivers live video on nearly any monitor. And, it’s designed using the highest quality components, with embedded software technology that ensures reliability even during power outages. “The addition of the Eagle Eye Local Display Stations to our product portfolio improves deterrence, detection, and response to incidents while making the most of security budget dollars,” said Dean Drako, CEO of Eagle Eye Networks. “It provides customers the benefits of cloud video surveillance and a trouble-free local live display.” The Eagle Eye Display Station DS100 and Eagle Eye Display Station DS200 are available immediately and have a starting price of 899 USD.
VIVOTEK, the global IP surveillance solution provider presents its latest facial recognition surveillance solution, brought through cooperation with the AI and facial recognition technology pioneer CyberLink Corp. The enhanced software integration between VIVOTEK’s Video Management Software (VMS), the VAST 2 and CyberLink’s FaceMe® Security facial recognition software will enable users to monitor and manage facial recognition results effortlessly for a wide range of security applications. Facial recognition In response to the surging demand in facial recognition applications, VIVOTEK is committed to providing a state-of-the-art facial recognition experience by adopting CyberLink’s FaceMe® Security software, into VIVOTEK’s VMS VAST 2. Staying ahead of the competition, VIVOTEK offers not only facial recognition compatibility but also supreme image quality by implementing a diverse array of VIVOTEK’s edge computing network cameras to VMS. Empowering security operators Through VIVOTEK’s enhanced VMS VAST 2, users will encounter a smoother installation process due to the centralized interface Through VIVOTEK’s enhanced VMS VAST 2, users will encounter a smoother installation process due to the centralized interface for camera settings, and receive accurate instant alerts based on preset blocklists, VIP and employees. Moreover, a series of matched videos filtering by VAST 2 database profiles empower security operators with a seamless facial recognition management experience. Beginning their alliance with CyberLink in early 2020, over the past few months, VIVOTEK has successfully brought this solution to the market across industries worldwide. Access control management It has found ideal application in settings from contactless access control management in commercial buildings, factories and hospitality, to security monitoring across campuses. In the near future, VIVOTEK will co-host a series of online webinars with CyberLink in Taiwan, Japan, Latin America and the USA, to demonstrate how AI facial recognition will transform smart security.
BCD International released its Harmonize Conductor iDRAC plugin, which integrates with the core Genetec Security Center platform. Built on the Genetec SDK platform, the BCD Conductor leverages many advantages that are found within Security Center such as the creation of entities, event-to-actions, and role fail-over. BCD Conductor enhances the user experience by introducing virtual machine management while staying true to the Genetec platform. BCD’s Harmonize Conductor iDRAC allows all organizations easier visibility to monitor, maintain, and react to their critical server infrastructure. As server uptime is vital to success in all vertical markets, the Harmonize iDRAC plug-in provides operators the agility to make rapid response decisions with real-time notifications and data. Integration into Genetec Security Center Among the features and benefits unique to this integration are real-time server telemetry, remote server management, server analytics, seamless integration into the Genetec Security Center platform, and a reduction in the number of systems users need to manage. The Harmonize Conductor iDRAC plug-in comes standard on all BCD-manufactured Streamvault appliances that support Dell Technologies’ iDRAC health monitoring package, which is designed to secure local and remote server management. The installer is launched via the desktop with two licenses, part number GSC-1SDK-BCD-Harmonize, and can be purchased directly through Genetec.
Honeywell is adding to its video series line with the launch of the 30 Series Embedded Network Video Recorders (eNVR), the latest affordable and fully featured NVRs that offer 4K HD (UHD) video resolution. The Honeywell 30 Series eNVRs are designed for use as part of video systems which comply with the John S. McCain National Defense Authorization Act 2019 (NDAA), Section 889. They are also PCI-DSS compliant and include enhanced cybersecurity with a built-in FIPS chip set Users will also benefit from encrypted streaming between 30/60 Series cameras to 30 Series NVR and all the way to Honeywell Video Management Viewer (HVMV) and mobile apps. The 30 Series eNVR gives users the option to choose between 8 or 16 channels NVRs, with multiple hard drive options and up to 20 TB of internal storage. Key benefits and features Easy to use - Features plug and play installation with the Honeywell 30 and 60 Series cameras to make set up fast and easy to help reduce storage, installation, and configuration costs. Create safety & security efficiency - Integrates the 30 Series IP camera motion, intrusion and advanced people detection analytics for improved effectiveness while using 265 HEVC Smart codec to reduce storage space. Superior user experience - Includes simple remote configuration through HVMV, with a Global P2P Service with reliable connection anytime, anywhere through mobile access for both Apple® and Android™ devices. With a user-friendly interface, HVMV can be deployed for device management and configuration, video live view and playback, smart search, event management, pan-tilt-zoom (PTZ) control, Fisheye camera de-warping and E-map. HVMV also features multiple monitor support, multiple display layouts, customized views and tours and global P2P remote connection for efficient monitoring and operation. HVMV can support up to 2,048 cameras and multiple NVRs which is ideal for small to medium or multi-site video systems. With HTTPS & TLS 1.2 encrypted streaming and communication between the 30 and 60 Series cameras, the 30 Series eNVR and HVMV, customers will benefit from an end-to-end encrypted and secure video surveillance solution.
Honeywell announced the release of Pro-Watch® Integrated Security Suite, a software platform designed to help protect people and property, optimize productivity and ensure compliance with industry regulations. The platform provides complete visibility of all connected systems and the scalability of the software makes it easy to grow with the changing needs of a business. Pro-Watch Intelligent Command is a web-based user interface that provides organizations complete situational awareness of their security system to protect people, property and assets. The compliance-driven, enterprise security software platform combines access control, video surveillance, intrusion detection and other business critical functions into a single user interface to help to optimize productivity and reduce operational costs. Scaling enterprise security systems Pro-Watch Intelligent Command is a key element of the Pro-Watch Integrated Security Suite It allows end users to easily scale their enterprise security systems and is easy to deploy. Pro-Watch Intelligent Command is a key element of the Pro-Watch Integrated Security Suite. It can also help companies comply with new guidelines like social distancing and wearing masks to create healthier and safer building environments. “While security has always been important, to protect people, data or property, now more than ever it’s critical to have complete visibility into all systems to reduce risks,” said Rick Koscinski, Sales Director, Honeywell Commercial Security. “Pro-Watch Intelligent Command is a powerful, yet approachable, solution that brings all security elements together to help facilitate rapid decision making and mitigate risks.” Pro-Watch Intelligent Command simplifies system maintenance with remote, bulk camera firmware upgrade & password updates for cameras which in turn increases productivity by reducing operation costs and at the same time helps facilitate regulatory compliance. Enhanced compliance and cybersecurity Pro-Watch Intelligent Command also enables compliance with the most stringent industry regulations It includes end–to-end TLS 1.2 between video and access systems for enhanced Cyber compliance cybersecurity, as well as enhanced data privacy through anonymisation selective masking. Pro-Watch Intelligent Command also enables compliance with the most stringent industry regulations. It also enables operators to respond rapidly and effectively to alarms or incidents by providing an incident workflow package that allows Standard Operating Procedures (SOPs) to be configured, reducing both compliance exceptions and security risks. Features of Pro-Watch Intelligent Command Pro-Watch Intelligent Command is designed to support the complexities of a global, multi-site enterprise organization but is flexible enough to support a single building. Additional Pro-Watch Intelligent Command benefits: Meets business needs: Improves situational awareness for video and access systems in a unified interface. Monitors multiple devices: Enables users to load building, city or regional maps into the system, allowing users to access cameras and readers to see alerts and video footage. Incidents and associated workflows can also be configured in the system, allowing SOPs to be monitored. Generates valuable reports: Reduces costs by streamlining the generation of compliance and business intelligence reports. Mapping, alarms, workflows, dashboard reports, and auditing capabilities for the site’s security solutions are available from a single interface. Provides versatile tools: Features new and enhanced video analytics and management tools, providing high-quality evidence of compliance with regulations. Integrates with other systems: Integrates easily with third party systems to reduce costs and increase operational efficiency. Safety and Security Honeywell creates trusted, proven security solutions that protect and connect buildings, businesses and people. From access control, video surveillance and intrusion detection, the company offers robust, global integrated solutions for organizations to help protect staff and property, optimize productivity and comply with strict industry regulations all while reducing operational costs. Honeywell’s goal is to keep people and places safe through software and products that are created with a secure-by-design approach.
In today’s fraught times, business continuity and success hinges on how you manage the visitors to your company. By prioritizing safety and security, and coupling them with top-notch attention and customer service, you win loyalty and gain a reputation that will serve you in years to come. An excellent way to accomplish this is by identifying and implementing the best visitor management system for your company. And visitor management systems go beyond ensuring the safety of your visitors and staff safety from your visitors. A feature-rich VMS will track your guests' activities, so you can better understand their preferences for future visits. That way, you can manage visitor experience and tailor amenities and preferences. Both customer loyalty and brand reputation benefit. Visitor management systems: who uses it, and why is it used? Visitor management refers to all the processes put together by an organization to welcome, process, and keep track Visitor management refers to all the processes put together by an organization to welcome, process, and keep track of all the guests daily. A visitor management system (VMS) is the technology used to manage guests for their convenience, safety, and security. Several features are typical in today’s applications. They include preregistration tools, video intercoms, self-check-in stations, and health screening. In visitor management, the term "visitor" doesn't only refer to guests but also anyone without an authorized access credential. For instance, an employee without their access credential logs in as a visitor. The same applies to a delivery man or a technician carrying out routine maintenance. A VMS helps to account for everyone within the organization at any given time. Who uses visitor management systems? You need a visitor management system to manage a school or hospital, an office, or even a residential building. Here's why: Visitor management system for schools: schools are among society’s most vulnerable facilities. A VMS is almost mandatory in this setting. It helps to identify visitors, detect intruders, and alert security of any unauthorized access. Visitor management system for offices: A VMS accounts for guests at all times. They include clients, maintenance contractors, delivery men, employees without credentials, friends, and family, Visitor management system for hospitals: access control is essential in hospitals, and managing visitors plays a major role. Hospitals offer access to pharmaceuticals, medical records, newborns, and expensive equipment. It is crucial to monitor restricted hallways and sections with video intercoms and track unauthorized persons' movements. Residential visitor management system: tracking people's movement is a key VMS component. In case of a crime, knowing who had access to the building within a specific time frame can help in the investigation. Plus, tracking the activities of visitors can deter future crime. Why is the visitor management system important? A video intercom makes it much more difficult for a visitor to impersonate a known guest. VMS accounts for everyone within the organization in cases of emergency. VMSs can prevent intruders and alert the security department of a breach. A VMS creates a positive visitor experience, which shapes perception of the organization. With a trusted VMS in place, employees can focus on being productive. Health screening gives staff peace of mind. It increases employees' willingness to return to work in the midst of the COVID 19 pandemic. How does a good VMS address occupant and visitor safety? The necessary technology to ensure building safety The best visitor management systems contain the necessary technology to ensure building safety. To maximize occupant and visitor safety, a VMS should have the following features: Job one of a VMS is visitor identification. It also helps deter potential criminals. Some VMSs go beyond identification by running a quick check on the visitor's ID and alerting security of any discrepancies. By identifying and proving a visitor's identity, the VMS ensures the safety of employees and other visitors. VMS helps with compliance A good visitor management system helps the organization follow regulations, such as for occupancy. In the COVID era, some states may require health screening for guests. Health screening helps protect the building's occupants from exposure to health hazards. Information security VMSs also aid in information protection. It takes mere seconds for a rogue visitor to download files into a jump drive, photograph exposed blueprints, or copy customer lists. Visitor management systems restrict visitor access to parts of the building and track the whereabouts of guests. Visitor privacy With pen and paper systems, walking up to the receptionist often gives visitors full view of the visitors list. Visitor management systems seal that vulnerability. Visitors can check in without fear that anyone nearby can see their information. Emergency evacuation With a good VMS, the exact number of people within the building is always known. In the case of an emergency, first responders can use VMS data to identify everyone on site. This is a safety net for both the occupants and visitors to the organization. How to manage building visitors System features depend on the purpose and setting of the VMS. Yet certain features and processes are essential. Preauthorization and health screening The first step is knowing the visitors upfront. Preauthorisation allows everyone to know who is coming and when. Guests specify the time and purpose of their visits. You get to welcome and accommodate your visitors accordingly. Some systems may also be able to upload documents of interest, such as proposals, contracts, presentations, or agendas. Health screening is critical today. It signals that the organization cares about its guests. A visitor is more likely to visit an organization that prioritises health and safety. Health screening is a way to protect your staff and send the right message. Video intercom Along with health screening, video intercom is a key element of VMSs. It enables secure video identification with remote, touchless, and COVID-safe access into buildings. Intercoms are a safe and secure way to communicate with audio and video without physical contact. Video allows you to visually verify the visitor. The audio component enables spoken communication. Some systems even use facial recognition technology and mobile app unlock. When integrated with access control, visitor arrival is seamless. Upgrade to touchless access Touchless access is the safest and most secure VMS option Touchless access is the safest and most secure VMS option. It is more sophisticated because it receives visitors without them having to lift a finger. It's also convenient and effective. In this time of the novel coronavirus, the demand for hands-free systems is surging. VMS has pivoted to met this demand. Many organizations are finding how touchless systems increase safety in the workplace. Visitor logging is essential for managing guests to your building. Besides being a source for verification and data tracing, it also helps in real-time to know who signed into the building and who hasn't signed out yet. Tracking the movement of visitors within the facility makes it clear where they are at all times. This way, there can be an effective emergency action plan for visitors and other occupants. This feature has use in contact tracing, health investigations, and other investigations, such as for theft.
The only constant theme for video technology is its constant evolution. Over the last 40 years, cameras have gone from limited view, constantly monitored rarities to being one of the most populous Internet of Things (IoT) devices with a global reach. Fixed cameras with limited fields of view have been augmented with panoramic cameras with 180- and 360-degree viewing capabilities at ultra-high resolutions in the 4K and 8K ranges, a far cry from the grainy, monochrome viewing of the past. Threats have also evolved in that time, leading to a necessary evolution in security posture, moving from a series of individual programs and practices, to a comprehensive strategy designed around complex risk assessments. To ensure the successful implementation of your security stance in today’s world, you need technology to integrate seamlessly and vendors to work together to deliver coherent solutions rather than individual components. Since successful partnerships are always a two-way street, it’s important to take a look at some of the factors that vendors should offer and expect to receive when entering a beneficial partnership where technology seamlessly folds into the ecosystem of the partner’s technology offerings. Open Technology Standards If you ask any customer what the biggest negative is when it comes to new and emerging technologies, you’ll get a pretty rapid answer of “vendor lock-in.” You can have the best technology in the world, but if you don’t give a customer the opportunity to build multiple, “best-of-breed” products into a comprehensive strategy, you’re going to fall by the wayside pretty quickly. You need technology to integrate seamlessly and vendors to work together That’s not to say that you can’t have unique, proprietary or visionary technology; you absolutely can, and it is what innovation and progress thrives on. Building those technologies around open technology standards is vital if you are looking for wide-scale adoption. Using open technology standards also allows you to integrate with established industry players faster, more smoothly and with increased benefits to the customer. All of this leads to a faster time to revenue and a more rapid scaling of your presence in the market. Direct Technology Integrations Continuing the theme of open technology standards improving the ability to drive relationships with existing, complimentary technology partners, the directness and depth of integration also bears consideration. Using open technology standards also allows you to integrate with established industry players faster, more smoothly and with increased benefits to the customer One of the blights of building a security practice is getting all of your technologies to integrate together and feed information to each other. When you add the fact that each technology has its own user interface (UI) and management console, it can very quickly become overwhelming for the end user to keep tabs on each console, learn every interface and complicates building a workflow in the case of incidents or investigations. The administrators who manage the system also have to update each component individually, ensure that the integrations don’t break when an update is delivered and ensure that any new technologies don’t cause an existing piece of your solution to fail. As a technology vendor, if you have used open technology standards, and written your software with integrations in mind, you will find yourself becoming an easy solution to turn to. Camera manufacturers in particular can take advantage of this when integrating with a video management system (VMS). The deeper you integrate, and the easier you make it to manage, update, monitor and interact with your cameras for the VMS and subsequently the operator using the VMS, the more likely your technology will be designed into solutions. Open Communication and Equal Joint Development Successful partnerships are all about communication, and in my experience, having organizational alignment throughout both companies does wonders to improve the development processes. Executive support in particular is key, and a mutual understanding between leaders makes for a more successful go to market strategy. Equally as important is joint development, especially for engineering teams. Often, software engineers are just thrown the software from the larger of the two partners and told “make sure we integrate with this.” It is then down to the engineering teams to figure out how the partner software works and figure out their integrations. This is less difficult if the partner is using open standards, but there is still a high degree of difficulty involved. It also takes longer to create, test, adjust and release software integrations in this way. Then you have to repeat the process whenever there is a software update on either side. Successful partnerships are all about communication If you work collaboratively as engineering teams with defined co-development plans and processes, this process is simplified, and a better solution is realised for the customer. Working as equals also allows you to drive technology advancement faster, especially for the longer established vendor. New technology companies are forced to innovate faster to stay alive and that is well worth remembering. Your mutual sales teams also have a large part to play here, since working together in front of customers with a connected message will deliver better feedback into the engineering teams for future developments and projects. If you build your technology partnerships on these foundations, then you are well positioned to deliver great solutions to your customers, real value when it comes to forming a major part of the wider security ecosystem and will be well on your way to becoming a mainstay in the physical security world.
As businesses, schools, hospitals and sporting venues look to safely reopen in a COVID-19 world, thermal imaging systems will play a critical role in helping to detect and distinguish skin temperature variations in people. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, is now being deployed to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. In the coming weeks and months, the security industry will look to implement thermal camera solutions for customers, yet many questions remain as to the differences between different system types and how to properly install thermal imaging cameras. In this Q&A, Jason Ouellette, Head of Technology Business Development for Johnson Controls, answers several of these questions. Q: What are some of the different thermal imaging solutions available in the market to detect an elevated temperature in a person? For the general market, there are three types of these thermographic screenings. There is the handheld device, which is typically lower cost, very portable, and very easy to use. Typically, this is a point and shoot type of device, but it requires you to be three feet or less from the person that you're screening, which, in today's world, means the user needs to wear protective personal equipment. For the general market, there are three types of these thermographic screenings The second type of solution would best be described as a thermal camera and kiosk. The advantage of this system over a handheld device is this can be self-service. An individual would go up to and engage with the kiosk on their own. But many of these kiosk type solutions have some integration capability, so they can provide some type of output, for either turnstiles, or physical access control, but not video management systems (VMS). Some of the downside of this type of system is that it’s less accurate than a thermographic solution because it does not have a blackbody temperature calibration device and the readings are influenced by the surrounding ambient temperature, called thermal drift. So instead of being able to achieve a ±0.3ºC accuracy rating, this system probably provides closer to ±0.5ºC at best. Some of these devices may be classed as a clinical thermometer with a higher degree of one time accuracy, but do not offer the speed and endurance of the thermographic solution for adjunctive use. And then there are thermal imaging camera systems with a blackbody temperature calibration device. These types of systems include a dual sensor camera, that has a visual sensor and a thermal sensor built right into the camera, along with a separate blackbody device. This provides the highest degree of ongoing accuracy, because of the blackbody and its ability to provide continuous calibration. These systems can provide much more flexibility and can offer integrations with multiple VMS platforms and access control devices. Q: When installing a thermal imaging camera system what is the most important element to consider? Camera placement is critical to ensure the system works as expected, however the placement of the blackbody device which verifies the correct calibration is in place is equally as important. If the customer wants to follow FDA medical device recommendations for camera placement, both the height of the camera and the blackbody as well as the distance between these devices should comply with the product installation instructions. This takes into account the device focal range and calibration parameters in addressing the distance from the person undergoing the scan. Also, integrators should minimize camera detection angles to ensure optimal accuracy and install cameras parallel with the face as much as possible, and again in compliance with installation instructions. Integrators should minimize camera detection angles to ensure optimal accuracy The blackbody should be placed outside of the area where people could block the device and located more towards the edges of the field-of-view of the camera. You need to keep in mind the minimum resolution for effective thermographic readings which is 320 by 240 pixels as defined by the standards. To achieve this, you would need to follow medical electrical equipment performance standards driven by IEC 80601-2-59:2017 for human temperature scanning and FDA guidelines. Within that measurement, the face needs to fill 240 x 180 pixels of the thermal sensor resolution, which is close to or just over 50 percent of the sensor’s viewing area typically, meaning a single person scanned at a time in compliance with the standards for accuracy. Along with height and distance placement considerations, the actual placement in terms of the location of the system is key. For example, an expansive glass entryway may impact accuracy due to sunlight exposure. Installations should be focused on ensuring that they are away from airflow, heating and cooling sources, located approximately 16 feet from entry ways and in as consistent of an ambient temperature as possible between 50°F and 95°F. Q: Once a thermal imaging camera system is installed, how do you monitor the device? There are several choices for system monitoring, depending on whether the solution is used as standalone or integrated with other technologies, such as intrusion detection, access control or video systems. For standalone systems, the ability to receive system alerts is typically configured through the camera’s webpage interface, and the cameras include abilities such as the live web page, LED display for alerting, audio alerts and physical relay outputs. When done right, these features will all follow cybersecurity best practices which is important for any network solution today, including changing default passwords and establishing authentication methods. The ability to receive system alerts is typically configured through the camera’s webpage interface These types of thermal cameras can also integrate with turnstile systems, VMS platforms and access control systems. This is typically done through the integration of a relay output, activated by a triggered temperature anomaly event on a thermal imaging camera which can then be used for activities such as locking a turnstile, or through access control and video systems to send an email or provide an automated contagion report for contact tracing. These capabilities and integrations extend the monitoring capability above that of the standalone solution. The camera can be configured to monitor a specific range of low and high alerts. Users can determine the actions that should be taken when that alert exceeds the preset low or high threshold. These actions include things like a bright and easy-to-see LED can provide visual notification through pulsing and flashing lights as an example. Q: What about system maintenance? Does a thermal imaging camera require regular service in order to operate accurately? First it’s important to make sure the system is calibrated. This can be done after the unit stabilises for at least 30 minutes to establish the initial reference temperature source known as the blackbody. Calibrations conducted before this warm up and stability time period can throw off accuracy. Also, as part of your system maintenance schedule you will want to perform a calibration check of the blackbody device every 12 months, along with following recommendations of the FDA and IEC. If you install the solution and don’t perform maintenance and the blackbody calibration certificate expires, over time there’s a risk that the device will experience drift and a less accurate reading will result. There’s a risk that the device will experience drift and a less accurate reading will result Q: What final pieces of advice do you have for either an integrator who plans to install a thermal imaging camera system or an end user who plans to invest in this solution? Before you buy a thermal imaging camera check to see if the manufacturer ships the camera with a calibration certificate. Also, become familiar with FDA’s guidance released in April 2020, Enforcement Policy for Telethermographic Systems During the Coronavirus Disease 2019 (COVID-19) Public Health Emergency. This document places thermal/fever products for adjunctive use under the category of a Class I medical devices and subject to its regulatory control. Driven by these regulations and categorisation, users need to understand specifically what is required to meet the required level of accuracy for successful detection. While thermal imaging camera systems are more complex than traditional surveillance cameras, they can prove to be a valuable resource when set up, configured and maintained properly.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
ADT Commercial has grown organically in double digits since 2016, in addition to growing through 15 acquisitions completed since the merger of ADT and Protection One. Acquisition of integrator companies such as Red Hawk Fire and Security and Aronson Security Group has expanded ADT Commercial’s presence geographically to more areas of the country. Most of the employees of the acquired companies have stayed with ADT and “helped to create a corporate culture and a good place for employees to work,” says Dan Bresingham, Executive Vice President of ADT Commercial. Happy employees ensure good customer service. Enterprise resource planning Bresingham will lead ADT Commercial as it becomes a separate business unit in 2020 “We adapt to where our clients want us to be,” adds Joe Sanchez, Senior Vice President of Customer Operations of ADT Commercial National Accounts. “We take a strategic approach as we determine how adaptive our customers are going to be to the new technology.” I caught up with ADT Commercial at the GSX trade show in Chicago. Bresingham tells me ADT Commercial has benefitted from the caliber and breadth of leadership talent that have come along with the various acquisitions, including Mike McWilliams of Red Hawk, Bob Dale of Protection One, and Phil Aronson of Aronson Security. The transitioning of internal systems such as enterprise resource planning (ERP), billing and customer repair software will further steamline the ADT Commercial operation in the next several months. Bresingham will lead ADT Commercial as it becomes a separate business unit in 2020. We caught up with ADT at the GSX trade show in Chicago Providing new opportunities for regional integrators Additional acquisitions are also likely; in fact, growth is likely to accelerate. ADT Commercial offers a national footprint that can provide new opportunities for regional integrators it brings into the fold. New acquisitions will continue to fill out ADT’s skillset requirements in specific geographic areas where more expertise is needed. Security directors have a small staff and we help them know what they should be looking at in terms of data"“The industry doesn’t change a lot,” says Bresingham. “The technology just gets better, faster, and cheaper. As a service provider we take the best technology and combine it to provide the best solutions. We’re product-agnostic. Most of our jobs are down-and-dirty, doing the same things, but we’re pushing ourselves to be the best every day at the basics.” An emphasis at ADT is to provide customers ‘actionable’ data compiled from their various security systems. “We have a range of customers,” says Sanchez. Managing networks and video remotely “From small businesses to large data centers, there is no electronic system we cannot do. We are adaptable, from providing basic intrusion all the way to more sophisticated elements. Security directors have a small staff and we help them know what they should be looking at in terms of data.” “Our customers are our ‘true north’,” says Sanchez. A strong relationship with clients forms the basis for ADT Commercial’s success. Helping customers track data utilizes ADT Commercial’s eSuite account management system, homegrown software that compiles and analyses various customer data inputs. It also allows the ability to manage networks and video remotely. “We built it from scratch for customers. It’s a web-based system that helps them manage their business,” says Bresingham. “We hold ourselves accountable. We don’t hide from data, we encourage it.” Monitoring refrigeration units The solution is different in every case, just as every customer is uniqueIn addition to data from customer systems, eSuite can compile local weather information, crime statistics and other information that can help provide trending information to guide a customer’s business. The system’s flexibility enables ADT to provide the data each customer needs. ADT helps customers manage their business beyond the security department, too. “We do a lot of things in environmental control, monitoring refrigeration units and making sure humidity and temperature readings are correct,” says Sanchez. Leaving a door open could cause product loss at a pharmaceutical company, for example. In the food industry, a freezer malfunction could cause huge losses. In either case, an alarm can draw attention to the problem in a timely manner. Other customers face regulatory requirements that demand an audit trail of compliance, which ADT’s systems can provide. At the end of the day, ADT asks customers ‘What’s your security need?’ The company then adapts and assembles its solutions using internal resources and outside vendors, to meet that need. The solution is different in every case, just as every customer is unique.
GSX 2019 got off to a jaunty start Tuesday. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their booths. There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side), while the trend toward system sales is continuing. Here's a review of Day 1 from the show floor. Dahua continues to educate market “Traffic-wise, the show is better than last year,” observed Tim Shen, Director of Marketing at Dahua Technology USA, at midday on Tuesday. “We met more people from Latin America,” he added. Shen theorized that Chicago is at the center of a larger territory of customers than last year’s location (Las Vegas).Dahua’s presence at the show makes a statement: “We’re still here" Dahua has faced some negative publicity in the last year since they were banned from procurement by U.S. government customers by the National Defense Authorization Act (NDAA). Dahua’s presence at the show makes a statement, says Shen. The statement is “We’re still here.” Shen said only one visitor to the Dahua booth even mentioned the NDAA on the first day of the show, and the visitor was misinformed about the provisions and implications of the law. “There is a lot of misinformation,” he says. “We need to continue to educate the market.” Facial recognition, video metadata, and people counting New at the show is the Dahua Analytics+ line of cameras that feature more in-depth analysis of data such as facial attributes, video metadata, and people counting. For example, the cameras can identify 128 points in a face, with an additional 256 attributes analyzed by the back-end recorder. Analysis can provide information such as age and gender, which can help a retailer analyze the demographics of their customers, for instance. Dahua is also adopting some of its consumer line of products for sale through the commercial channel. These include a flood light camera, a 2-megapixel WiFi camera and a doorbell camera. The products might be used outside of a retail store, for example, to complement Dahua commercial cameras that are used inside the store, says Shen. Dahua previewed a new multi-sensor camera that also includes a speed dome. The multi-sensor component combines eight views, each 2 megapixels, for a total of 16 megapixels. Below the multi-sensor camera is mounted a speed dome that can zoom in on regions of interest in the larger multisensor view. The camera will be launched in the fourth quarter. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their exhibits ACRE reports continued North American growth “The industry’s momentum will continue to grow,” predicted Joe Grillo, Principal of ACRE. New areas such as cloud and mobile credentialing have the fastest growth rate, but are starting from a much smaller base, he said, so momentum in those categories will take time.ACRE sees continued rapid growth with no slowdown in the North American market Grillo noticed the first morning of GSX was busy, although there was a bit of a lull at midday. In terms of the business outlook, Grillo sees continued rapid growth with no slowdown in the North American market, although there have been some negative elements creeping into the outlook in Europe. Cybersecurity concerns in access control I caught up with Grillo at the booth promoting RS2, a Munster, Ind., access control company that Acre acquired last May. It is the only Acre company that is exhibiting at GSX. RS2 is one of two access control companies acquired by Acre in the last year — the other was Open Options, Addison, Texas. Grillo said the two acquired companies are complementary, especially in terms of their sales channels and geographic strengths. Although both are national companies, RS2 tends to be stronger in the Midwest, while Open Options sales emphasis is centered in Texas and emanates to the rest of the country. Concerns about vulnerabilities are a growing issue in access control, said Grillo, and more large endusers are conducting penetration testing of systems. The industry should welcome the scrutiny, he added. Cybersecurity also represents an business opportunity in access control, noted Grillo. Concerns about the vulnerabilities of legacy technologies such as 125Khz proximity cards and the Wiegand protocol will likely accelerate the pace of companies upgrading their access control systems There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side) Eagle Eye Networks and cloud-based VMS Ken Francis of Eagle Eye Networks had already realized some new client opportunities during the first day of the show, although he was not optimistic at the outset. In contacting potential clients to meet at the show, he had heard that many were not attending. Among Eagle Eye Networks’ news at the show is full integration of body-cams into their cloud-based video management system. “It’s the most unique thing happening from a video management perspective,” Francis said. Previously, if someone needed a video clip from a body cam, they had to use a separate software system. Five years from now, at least 80 percent of all VMS systems will be cloud-managed" Francis continues to be bullish on the subject of cloud adoption of video management and made a bold prediction: “Five years from now, at least 80 percent of all VMS systems will be cloud-managed.” Eagle Eye Networks is doing its part with “rocket growth” that is reflected in an increase of company employees from 27 to 165 or so. Economies of scale have enabled Eagle Eye Networks to lower subscription prices by up to 45 percent. Genetec's release self-service PIAM system Many of the “new” products at GSX 2019 are slight variations on what was introduced at ISC West last spring. An exception is Genetec’s introduction of ClearID, a self-service physical identity and access management (PIAM) system that enforces security policies while improving the flow of people within the organization. The new system is integrated with the Genetec's Security Center Synergis access control system. PIAM systems have historically been customizable, complex to install and costly, which is why a lot of companies have not used a system. Genetec’s differentiator is that it is an off-the-shelf, out-of-the-box solution for a broader base of customers. “We scanned the market and found a lack of off-the-shelf identity management systems,” said Derek Arcuri, Product Marketing Manager, Genetec. “Targeting the mid-market, we are providing an accessible, ready-to-go cloud-based system that is ‘baked’ for the average company but can be integrated and expanded to include other systems.” The trend toward system sales at the show is continuing ClearID will simplify operation for the security department, which was previously tasked with a lot of administrative work in response to various departments. ClearID “pushes down” the authority to use the system to stakeholders (such as IT and/or facilities directors) and provides a system they can use themselves without involving security. “It empowers stakeholders and employees to work directly through the system rather than going through security,” says Arcuri. “It gives employees access based on stakeholder policies and improves the flow of people through an organization. The security director is relieved of administrative work and can work on ‘real’ security.” I saw some other things today, too, which I will share in a future GSX article... And more about the show tomorrow.
Inaugurated in 2012, the government of West Bengal had taken an initiative to build a Cultural & Research Institute to commemorate the birth anniversary of Bengal’s polymath, known as the Bard of Bengal, globally. Spread over an area of 4.89 acres, the institute is in the heart of New Town with facilities including an auditorium, art gallery, exhibition hall, mini cinema hall and music room. Every year, thousands of guest tour exhibits, attend cultural programs, enjoy movies, and view artifacts. Incident management While the Cultural & Research Institute had delegated personnel to keep a watch on the premises, manning the expansive property proved to be time-consuming and inefficient. For security team, round-the-clock security preparedness at the location was crucial and ensuring the safety and security of the guests was quite a challenge. The management wanted to build a unified solution, aiming to not only deliver 24x7 surveillance but also empower the on-ground team to manage incidents proactively. Specially, they were facing the conflicting dilemma of keeping priceless objects safe yet allowing millions of visitors a chance to see them Intelligent VMS After analyzing the requirements, the Videonetics team conducted a detailed survey of the property along with the system integrator for the project, Prakash Electricals, to draw out a comprehensive plan for the campus. The state-of-the-art Videonetics unified solution combining Intelligent VMS and Intelligent Video Analytics coupled with IP cameras were chosen to address the unique needs of specific areas. Videonetics Intelligent VMS helps in recording and viewing 25+ cameras throughout the property including gated entrance, open-air pavilion, fountain park, art gallery, auditorium, passages, server room to name a few. The institute wanted a video analytics solution that could help with protecting valuable artifacts in the art gallery. The art gallery is secured with a virtual and invisible protective barrier called Artifact Protection. If an individual breaches this perimeter, in an attempt to touch or steal an artwork/paintings, an alarm is triggered and immediately received both in the centralized location as well as by the security personnel on their mobile devices, allowing them to react and take action quickly. During the survey, some of the vulnerable areas were identified where Videonetics deployed Zone Monitoring as part of the unified solution. The zone monitoring was required at the entrance, operators’ room, art gallery, park space, to detect when a person stays beyond a certain duration in a user-marked zone. Monitored facility The Cultural & Research Institute has been very successful in promoting an open and secured environment where guests and staff could move freely throughout the premises while keeping an eye on strategic locations and limiting access to more sensitive areas such as management offices, cash handling office and crossing barrier near to precious artifacts. Today, incidents are rare at the institute; but if something happens, the team is ready. The security team is alerted in real-time to any irregularities within the site, including tampering with the exhibits and entry into the restricted access zones. From the start of the tour, visitors become aware that they are in a secured and monitored facility. “As we looked to address a variety of surveillance challenges, we were assured to have Videonetics on board to exceed customer’s expectations, in terms of intuitive functionalities, open architecture and accuracy. With Videonetics team, we have successfully provided a right balance between securing the people and protecting assets, to the institute,” expressed, Ujjwal Kumar Dey, Partner, Prakash Electricals.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that the Santa Cruz Beach Boardwalk, an iconic amusement park in California, has recently upgraded its security infrastructure with the Security Center platform. By unifying video and access control park-wide, the park’s security team is able to speed up investigations and emergency response. Touted as the ‘Coney Island of the West’, the seaside park features about 40 rides, 30 restaurants, 15 retail shops, arcades, miniature golf, bowling, and conference and banquet facilities. Video surveillance technology As an admission-free park, guests can enter through multiple entrances to buy food, purchase ride tickets, or simply walk around and enjoy the surroundings. Unlike gated parks which typically have a main security checkpoint, the park’s security team must be hyper-vigilant to spot potential security threats before they can develop. Security operators constantly monitor video cameras and work directly with field officers to handle issues. While video surveillance technology helped security teams watch over the large park, aging equipment began compromising their efficiency. As the search for a new video management system began, the team prioritized openness, reliability, and a vendor’s reputation in the market. Moreover, their aging access control system would soon need replacing too. Actively monitoring cameras The team at Santa Cruz Beach Boardwalk uses the Security Center platform to manage over 400 cameras and 220 doors The Santa Cruz Beach Boardwalk team chose the Genetec Security Center platform because of its unique ability to unify video surveillance, access control, and other systems and sensors. The flexibility of the platform was a key selling point and enabled them to choose their preferred cameras and door hardware. Today, the team at Santa Cruz Beach Boardwalk uses the Security Center platform to manage over 400 cameras and 220 doors across the entire amusement park. From one single interface, operators actively monitor cameras and doors, respond to alarms, handle investigations, and export and share video evidence. This ensures that every security incident is effectively resolved without having to switch applications. Video surveillance system “Like any busy amusement park, our guests sometimes become separated from their groups. When this happens, we are now able to use the Security Center Omnicast™ video surveillance system, along with assistance from our field officers, to quickly reunite guests with their parties,” said Will Graham, Security Technology Administrator at Santa Cruz Beach Boardwalk. If motion is detected near a perimeter after opening hours, the platform will trigger an alarm and display live video and a 10-second replay of the event on a dispatcher’s monitor. This allows them to quickly identify if it’s an actual threat. Unique access privileges The team has also expedited investigations by sharing system access with other departments. This includes food service, loss prevention and ticket sales who can handle their own preliminary investigations, if needed. The team has set up different door schedules and rules and created over 200 cardholder groups “Using the Security Center platform, all door events are linked to video which means our team can quickly gather the information needed and solve cases faster,” said Graham. With Security Center, operators get an instant view of an event as it’s unfolding. So before sending an officer to check on the area, they can quickly identify if it’s a threat or a false alarm. Using the Synergis system, the team has set up different door schedules and rules and created over 200 cardholder groups with unique access privileges for various roles and responsibilities. Managed software maintenance For added peace-of-mind, the Santa Cruz Boardwalk team receives fully managed software maintenance and monitoring via the Genetec Advantage maintenance package to help ensure their systems always available and up to date. “Using Security Center has definitely heightened our response efficiency at Santa Cruz Beach Boardwalk. Everything from video surveillance and access control to alarm management has been consolidated into one solution—it’s just a better, more effective way to work. And we’re confident that with this unified platform, we’ll be keeping our guests happy and safe well into the future,” concluded Graham.
With the potential to generate 1,230 megawatts and provide low carbon energy for 2.3 million homes, it is essential that Heysham 2 nuclear power station is able to operate 24/7 without any disruption. Located in North West England, Heysham 2 held the world record for the longest continuous operation of a nuclear generator without a shutdown. To ensure the generator retains this enviable reputation for reliability, its operator EDF has recently invested approximately £30 million in plant improvements which has included a phased upgrade of the site’s video surveillance system. “Our existing analog CCTV had limited functionality and was not fit for purpose in respect of our wish to more closely monitor the plant and machinery in operation throughout Heysham 2,” said Nigel Buer Telecoms Specialist at EDF Energy. “We decided to take a close look at what we might be able to achieve by replacing the analog system with an IP network based video surveillance solution.” Evaluation process Nigel talked to several manufacturers about which cameras would best help his colleagues to keep a close eye on the generator’s instrument panels and quickly respond to any technical issues. “Heysham 2 covers a very large area and we wanted to avoid the need for colleagues to walk long distances just to verify an instrument reading. Although inefficient use of our colleagues’ time, this had previously been necessary for time critical issues,” said Nigel Buer. After evaluating various manufacturers’ offerings, Nigel established that the Wisenet range of video surveillance cameras and video management solutions manufactured by Hanwha Techwin included everything needed to meet Heysham 2’s requirements. Wisenet cameras Phase one has seen the deployment of 45 cameras, 15 of which are 2 megapixel Wisenet XNP-6120H 12x PTZ dome cameras Phase one has seen the deployment of 45 cameras, 15 of which are 2 megapixel Wisenet XNP-6120H 12x PTZ dome cameras. These are equipped with Wide Dynamic Range (WDR) which performs at up to 150dB to accurately produce images in scenes that simultaneously contain very bright and very dark areas. In addition, 13 Wisenet TNU-6320 network Positioning cameras have been deployed. These 2 megapixel cameras can be programmed to endlessly pan 360° in order to monitor a wide area and they also offer operators the flexibility to select from up to 255 pre-set positions which can be scheduled. WAVE Video Management Software Designed to capture high definition images in challenging environmental conditions, the Wisenet TNU-6320s with a robust aluminum die cast exterior, are able to work effectively even, when the ambient temperature is as high as 55°C, or as low as -40°C. EDF Energy’s control room operators are able to view live and recorded images captured by the cameras with the help of Wisenet WAVE Video Management Software (VMS). This features an intuitive ‘drag & drop’ tool which makes it extremely easy for operators to set up a display of live and recorded images on a single screen or video wall, with customisable layouts and sizes. Success The Wisenet IP network cameras are making a contribution by helping monitor and maintain Heysham 2’s generator" The resolution of a recent health & safety issue, where an electrical item failed and sparked close to a technician, has underscored the importance of Heysham 2 being equipped with the latest video surveillance technology. The quality of the images captured by the cameras monitoring the faulty electrical item enabled Nigel and his colleagues to quickly establish, among several possibilities, what had caused the sparking. “Keeping colleagues safe will always be our top priority, but there is no doubt that the new Wisenet IP network cameras are making a significant contribution by helping us to more efficiently monitor and maintain Heysham 2’s generator and its supporting plant and machinery,” said Nigel Buer. Following on from the success of phase one, Nigel Buer is now looking at how additional Wisenet cameras might meet the specific requirements of colleagues who deal with specialized aspects of operating a nuclear power station.
Evolv Technology announced that Hersheypark® is using Evolv’s artificial intelligence (AI)-based, touchless security screening system as part of the much-loved theme park’s robust COVID-19 safety measures. Hersheypark was originally created by businessman and philanthropist Milton S. Hershey more than 110 years ago as leisure grounds for employees of Hershey's Chocolate Factory. Embodying the passion of its namesake, the park is dedicated to its global reputation as a safe, fun family destination offering something entertaining for everyone, regardless of age. Hersheypark welcomes millions of guests annually and was recently honored by the 2020 USA TODAY 10Best Readers’ Choice awards. Evolv Express™ Using AI software and powerful sensors, Evolv Express™ can screen up to 3,600 people per hour Evolv is involved in the digital transformation of physical security, one that is touchless and addresses the ‘new normal’ threat of pandemic viruses as well as concealed weapons. Using AI software and powerful sensors, Evolv Express™ can screen up to 3,600 people per hour - 10 times faster than legacy approaches such as metal detectors, hand wands and manual inspections. The system enables Hersheypark to facilitate social distancing at its security checkpoints while minimizing person-to-person interaction-requiring no stopping, no emptying of pockets or removing bags. Park guests simply walk through naturally, alleviating potential long lines at their entrances while greatly reducing contact between guests, employees and security staff. By using Evolv Express, organizations have been able to optimize the performance of their security teams while reducing screening expenses by as much as 70%. Renovated main entrance Following state mandates related to the pandemic and an abundance of caution, Hersheypark’s opening was delayed until July 3, which marked the debut of the park’s completely renovated main entrance designed to provide a stress-free, welcoming experience for guests. A component of a 23-acre “Hershey’s Chocolatetown” development and park expansion, the Evolv Express systems are located at Hersheypark’s new main entrance. Health and safety The health and safety of our guests, team members and our community are core to our brand" “Hersheypark prides itself on providing family fun in a clean, green and safe environment where our guests can relax and enjoy the day together,” said Garrett Gallia, vice president of communications and corporate relations at Hershey Entertainment and Resorts. “The health and safety of our guests, team members and our community are core to our brand and our most important commitment to all those who choose to honor us with a visit or work as a member of our team. Using Evolv’s touchless security screening platform is a perfect example of Hersheypark’s forward-thinking application of digital technology. Evolv Express is designed to grow with us to meet the current and future safety needs of our guests and employees, which we view as a significant benefit over traditional solutions.” Response to Evolv Express at Hersheypark has been uniformly positive. Guests welcome how rapid and unobtrusive the process is while making them feel even safer. Optimizing staff resources The park’s security professionals emphasize how easy it is to learn and use the system The park’s security professionals emphasize how easy it is to learn and use the system while optimizing their staff resources. With metal detectors, it typically takes the park four to five seconds per person for the screening, regularly followed by hand searching of bags or other personal items. With Evolv Express, most guests now stroll through at their normal pace not even realizing the screening process is occurring and then begin their day of fun and relaxation. The park’s security team estimates a four-to-five times improvement in the number of guests screened per hour using the system when compared to metal detectors or other dated approaches. The frictionless experience that precludes unnecessary physical contact registers high on the list for everyone. Security screening process Our guests and security staff have been pleasantly surprised at the speed of the touchless screening experience" “We knew our former security screening process would provide challenges in the pandemic environment,” said Jason White, managing director of corporate safety and security at Hershey Entertainment and Resorts. “We’d already been evaluating how we could improve on our guest screening process and had piloted Evolv Express last fall because the system could accommodate thousands of people an hour in a frictionless, no-stop flow. As we began formulating the security screening aspect of our pandemic reopening strategy, it was clear that Evolv Express was the best solution that could meet our requirements. Our guests and security staff have been pleasantly surprised at the speed of the touchless screening experience that largely eliminates manual bag checks. The responsive customer support and working relationship we have with the Evolv team is just as phenomenal as their product.” Touchless security screening Deployed worldwide, Evolv’s touchless security screening systems have been used to screen more than 50 million individuals in an expedient, respectful manner. In addition to Hersheypark, customers include Six Flags Entertainment Corporation, L.L. Bean, Wynn Las Vegas, Georgia Aquarium, Set Jet, Oakland International Airport, two South Carolina school districts, the Biltmore Estate and hundreds of others. “Navigating the path to reopening requires an employee-and-customer-first commitment to safety, combined with the vision to embrace new policies, procedures and technologies,” said Evolv Technology Chief Executive Officer Peter George. “Hersheypark embodies that approach and it has been wonderful to see their security leaders like Jason White helping peers at other venues understand what’s required in this new normal. We’re thrilled to be working with such a visionary team.”
South Africa conservationist, Brett Barlow needed a robust security solution to protect Munu, a blind, South Western Black Rhinoceros, whose species is critically endangered. FLIR video solution Barlow deployed an all FLIR solution, comprising thermal cameras, visible cameras and an NVR, for around-the-clock monitoring, early detection and real-time response. FLIR technology has played an instrumental role to protect Munu’s life and livelihood. Throughout the 20th century, big-game hunters, settlers and poachers have decimated Africa’s black rhino population. In the early 1970s, there were approximately 65,000 black rhinos, and by 2018, that number was reduced to 5,630. In 2020, there are three remaining subspecies of the black rhino, one of the most vulnerable being the South Western Black Rhinoceros, also known as Diceros bicornis bicornis, of which there are only 254 left in South Africa. FLIR thermal and visible security cameras deployed Barlow teamed up with FLIR Systems to use state-of-the-art thermal and visible security cameras to act as Munu’s eyes Munu, a 20-year-old blind male rhino, is one of these critically endangered species. When Munu was in danger, South Africa conservationist, Brett Barlow stepped in to save Munu’s life. Barlow teamed up with FLIR Systems to use state-of-the-art thermal and visible security cameras to act as Munu’s eyes, detecting threats, increasing safety and enhancing his overall quality of life. In 2019, rangers working at a South African National Park found a black rhino walking in circles and visibly disoriented. They knew they had to do something. After safely tranquilizing him, an ophthalmic surgeon confirmed that the rhino, known as Munu, had suffered two detached retinas and was completely blind, likely as a result of disputes with other rhinos in the area. Protecting endangered rhino, Munu As soon as he heard about the situation, renowned South African conservationist, Brett Barlow spoke with the South African National Park and offered to permanently house and protect Munu. “Every rhino matters,” Barlow adamantly affirmed, adding “You wouldn’t put down a blind child, so why would you put down a blind rhino?” The South African National Park later transferred Munu to Barlow’s care. However, Barlow wasn’t the only one who wanted to help Munu. Relocating Munu to the Mantis Founder’s Lodge Adrian Gardiner, globally renowned conservationist famous for founding the Shamwari Game Reserve and the Sanbona Wildlife Reserve in South Africa, extended the invite for Munu to stay on one of his properties, the Mantis Founder’s Lodge. Wasting no time at all, Barlow relocated Munu to the lodge, knowing it would increase his quality of life. The property, spanning 850 hectares, is home to five white rhinos, as well as other animals, including a zebra and giraffe. The White Lion Foundation, in which Gardiner and Barlow are both executive board members, donated funds to construct Munu’s boma, comprising a secure covered boma and a five-hectare open grazing area. American Humane funding Though under Barlow’s care and in a safe enclosure, Munu still faced many grave threats Additional support came from a local internet provider, who donated free internet services for the project. American Humane, a non-profit organization committed to ensuring the safety, welfare and well-being of animals, funded one year of feed for Munu. All donations for Munu go directly to the project with no administration costs deducted. Though under Barlow’s care and in a safe enclosure, Munu still faced many grave threats because of his highly valuable horn. He remained a prime target for illegal poaching. Much of Munu’s horn was removed to protect him, but the amount of horn that remained is still worth thousands of dollars. Experts say that one pound of rhino horn is worth at least US$ 3,000 universally and ten times that, on Asian black markets. Thus, even with much of his horn removed, Munu was still in danger. Self-harm was a risk should Munu charge into the boma. Munu’s next door neighbor, Rodney, a white bull rhino, was also a concern should a territorial fight occur. For all these reasons, Barlow looked for ways to enhance Munu’s safety. Video surveillance for enhanced security Previously, the Mantis Founder’s Lodge employed two guards for Munu’s security. However, Barlow believes guards should only be a second line of defense, a visual deterrent that responds to threats. “I wanted to go down to the electronic security system route,” Barlow said, adding “Technology doesn’t sleep.” The first security manufacturer Barlow hired charged high prices for their security products. More than this, once installed, Barlow discovered that these devices were unable to deliver quality images in extreme weather conditions, such as mist or rain, both of which are commonplace at the Lodge. As such, he decided Munu’s security required for a more robust and reliable video security system. In 2019, Wilke Pretorius, Distribution Sales Manager for Sub Sahara Africa at FLIR Systems, was working with Brett Barlow on a separate project. When Barlow told Pretorius about Munu, Pretorius informed the FLIR team who immediately got involved. FLIR end-to-end video surveillance system FLIR donated an end-to-end surveillance system, featuring thermal and visible cameras FLIR donated an end-to-end surveillance system, featuring thermal and visible cameras, in order to protect Munu from poachers. FLIR’s powerful thermal and visible imaging cameras deliver intrusion detection at much longer ranges and complete, 24-hour perimeter protection, regardless of weather conditions. "Other camera manufacturers don't compare. Their cameras can't see through mist or rain. FLIR delivers images 24/7, rain or shine, darkness or light,” Barlow said, adding “technology like FLIR thermal cameras allow for early warnings for perimeter breaches. Even though rhinos have weak eyesight, without any sight, they are basically defenseless. So, in essence, FLIR became Munu’s eyes.” Beyond FLIR’s high-performing technology, Barlow loved working with the FLIR staff. Barlow said, “What drew me to FLIR were the people involved. Wilke and the rest of the FLIR team have been so passionate and resourceful, always available and willing to help when issues arise.” “When I started working at FLIR, Chief Executive Officer (CEO) Jim Cannon said our mission is to save lives and livelihoods,” Pretorius explained, adding, “These words stuck with me. Working on the Munu project, it was clear that saving lives and livelihoods are indeed a passion of FLIR employees. I am proud to be a part of a company so eager and passionate to produce solutions and technology that make a positive impact in the world.” Installation of FLIR cameras Installing the new security system was not an easy task. Merely two days prior to the arrival of FLIR cameras, in March 2020, South Africa was ordered into an immediate lockdown, due to the COVID-19 pandemic. But Barlow was eager to begin the installation process, so he set out to do it himself. By early May 2020, a two-person crew had manually dug over 600 meters of trenching to run cable and conduit through the lodge’s hard African soil. Barlow also installed a solar array to power the system. He cut bushes, installed polling and connected the entire system to FLIR’s central network video recorder (NVR), to view the camera feeds both inside and surrounding Munu’s boma. The result is a fully functioning, comprehensive video security system. FLIR Elara FB-Series ID thermal security cameras deployed Barlow worked closely with Pretorius to strategically design and lay out the FLIR security system Barlow worked closely with Pretorius to strategically design and lay out the FLIR security system based on a two-tier model. The perimeter is shaped as a big triangle about 110 yards away from the boma enclosure. Six FLIR Elara FB-Series ID thermal security cameras, which use onboard analytics to classify human or vehicular intrusions, are installed to monitor the outer perimeter or the first tier. There are also 11 Ariel Full HD IP Bullet cameras deployed, which deliver 1080p video for high motion, complex and low-light scenes. FLIR Saros Dome DH-390 cameras deployed For effective surveillance of Munu’s boma, six FLIR Saros Dome DH-390 cameras, designed to deliver actionable alerts and alarm data, surround the enclosure. One FLIR Saros DM-Series camera is mounted inside the boma to capture every minute detail of Munu’s movement in all conditions. To manage the video from all the cameras, FLIR also supplied its Meridian TM product, a compact, all-in-one network video recorder (NVR), specially designed to support dozens of channels. Meridian also features a FLIR United VMS EZ Client web interface, which simplifies viewing capabilities and saves the cost of additional workstations. Powering, processing and managing this system are six edge servers, FLIR’s USS Edge Appliances, containing 12TB of storage and preloaded with United VMS software, built to seamlessly manage multiple, varied devices. Heightened perimeter protection Thanks to FLIR’s technology, Barlow is confident that Munu can be an ambassador for his species. He hopes Munu’s story may inspire future conservancies around the world to partner with manufacturers, like FLIR, for heightened perimeter protection. Case in point, actress Shannon Elizabeth, founder of the South Africa-based Shannon Elizabeth Foundation that is focused on wildlife conservation, was deeply moved by Munu’s story. She later asked Barlow to participate as an advisor to her foundation’s Ranger Relief Fund. Importance of early warning technology FLIR could prove invaluable to the efforts of rangers all over the African continent to protect endangered animals" In a time where conservation funding is down because of declining tourism due to the COVID-19 pandemic, the Ranger Relief Fund supplies money and much needed equipment to ensure conservation first responders remain employed and properly resourced. With early warning technology being more critical than ever, the need for conservancies to partner with technology manufacturers like FLIR is urgent. “FLIR could prove invaluable to the efforts of rangers all over the African continent to protected endangered animals,” Barlow explained, adding “With Munu being the proof point, FLIR could be more than Munu’s new eyes, but indeed the eyes of an industry desperate to protect the world’s natural heritage from the burgeoning poaching crisis.” Picking the optimal security solution When asked what advice Barlow would give to other conservancies considering similar security technologies, he said “Speak to the right people. Make sure you talk to someone who understands the product. See the solution in action. View a live site and see how it works. Work with the right people to implement that for yourself.” The longer Munu lives, the more good he’ll do. Barlow plans to expand Munu’s boma, once he has acclimatized to his new home. And he has already begun using the FLIR Saros DM-Series’ live stream capabilities to invite learners around the world to observe Munu up close. The plan for Munu is to mate with a female within his own subspecies, thereby directly contributing to the survival of his kind. If Munu does sire a calf, Barlow plans to donate the calf back to the South African National Park that Munu came from to help with the genetic diversity for the reserve. The future for Munu is bright and, with his new eyes, he will see through to the end.
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, has announced that Army and Navy Academy, a college preparatory military boarding school in California, has upgraded its security infrastructure with Hanwha security cameras. Located on a 23-acre beach-front property, the Army and Navy Academy is home to more than 300 students and employs more than 140 faculty and staff members. Two-fold surveillance upgrade According to Jeffrey Gibson, a system with analytics to keep a close watch on the campus could act as a force multiplier With a commitment to continuously adapt and improve, the Academy developed a strategic plan that focused on supporting the long-term success of their cadets. When the school began building and renovating facilities, they included an upgrade to their technology and physical security system. With a two-fold approach, the school first needed to replace their existing, out-of-date analog camera system. Second, they needed a system that could keep up with current technology. According to Jeffrey Gibson, Assistant Commandant, Operations, Safety, and Security at the Academy, a system with analytics to keep a close watch on the campus could act as a force multiplier. Hanwha security cameras with Wisenet WAVE deployed After an extensive vetting process, the school deployed a video surveillance solution comprised of Hanwha cameras integrated with Wisenet WAVE, a highly customizable and reliable IP-based video management system (VMS). Integrating the Hanwha security cameras using the Wisenet WAVE IP-based VMS made it possible to create a video surveillance solution that was exclusively tailored to the campus’ specific needs. The Academy was able to quickly train security personnel as required, considering the WAVE video management system (VMS) is extremely intuitive and easy to use. Multi-sensor, multi-directional PTZ cameras installed The Army and Navy Academy now has a total of 141 cameras, including PNM-9081VQ multi-sensor, multi-directional cameras for covering wide areas, which allows them to use fewer cameras while seeing more. They have also installed PNM-9320VQP multi-sensor, multi-directional PTZ cameras for zooming in and for covering long distances. Additionally, to be able to effectively monitor between buildings and cover their coastline, the Academy chose PNM-9020V multi-sensor 180° cameras. In-camera and VMS analytics features By taking advantage of the in-camera and VMS analytics available in their new system, the security teams at the Academy can now monitor internal and external areas with high precision and efficiency. The primary cameras installed focus on higher priority, greater risk areas, while the VMS analytics keeps track of the rest of the areas in the campus. Perimeter protection with line crossing analytics With the surveillance system upgrade, most of the campus perimeter is now protected using line crossing analytics As a result of the surveillance system upgrade, most of the campus perimeter is now protected using line crossing analytics. With Hanwha cameras installed above the fence, the system sends an alert to the Security Operations Center (SOC), if it detects something crossing the fence in either direction. Once the system pulls up the camera feeds, operators can see if it’s a false alarm and then decide whether or not to dispatch a security team or call local police. Enhanced students, faculty and staff safety The security team has developed a strategy for inside the fence as well that allows them to focus on specific areas that have higher traffic at specific times of the day. The in-camera analytics looks at the low-traffic areas. If the camera detects movement, the Security Operations Center is alerted and can then determine whether or not to send personnel. Because the new Hanwha security system provides both coverage and analytics, the Army and Navy Academy’s security team is able to focus on what matters most, the safety of students, faculty and staff.
Round table discussion
Traditionally, dealer-installers and/or integrators provide the front line of support to end user customers after a sale. Because integrators assemble and provide the “solution” – often using products from multiple manufacturers – they are most familiar with the total system and can troubleshoot any problems. However, manufacturers may be better equipped to deal with specific problems after a sale and also to provide a variety of resources to end-users. It’s a delicate balance, and the best approach may be dependent on the product or even the market. We asked this week’s Expert Panel Roundtable: What is the role of manufacturers in providing support to end user customers after the sale?
Video management systems (VMS) have been around almost since the advent of IP cameras. During those years, VMSs have evolved from software that provides basic functionality to more user-friendly systems offering a growing list of capabilities, many of them related to analyzing data as well as recording and displaying video. But the evolution is far from over. We asked this week’s Expert Panel Roundtable: What’s new with video management systems (VMS), and what are the new opportunities?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
How to Choose the Right Solution for Video Data to Enhance Security and Operational IntelligenceDownload
Video management software: Manufacturers & Suppliers
- Milestone Video management software
- AMAG Video management software
- Video Storage Solutions Video management software
- Axis Communications Video management software
- Vicon Video management software
- Avigilon Video management software
- Bosch Video management software
- Vanderbilt Video management software
- March Networks Video management software
- AxxonSoft Video management software
- Hanwha Techwin Video management software
- FLIR Systems Video management software
- Qognify Video management software
- MOBOTIX Video management software
- Verint Video management software
- eneo Video management software
- Verex Video management software
- Meyertech Video management software
- IDIS Video management software