Video motion detection
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What W...
Visitors to The Security Event will be among the first to see live demonstrations of some of the latest products to be launched by Tyco, the security division of Johnson Controls. A wide range of access control, intrusion and video products from the American Dynamics, Exacq, Illustra, Bentel, CEM Systems, DSC, Kantech, Software House and Visonic brands, which are supplied under the Tyco umbrella, will be on show on stand SE102. These include: Access Control Credential iotega, an all-in-one sm...
India’s foremost shop window and business hub for the security industry, Secutech India, is set to return from 25 – 27 April 2019 against a backdrop of rising government investment in smart city projects. Jointly organized by Asian Business Exhibition and Conferences Ltd (ABEC) and Messe Frankfurt Trade Fairs India Pvt. Ltd, the 2019 edition of the fair will introduce a new smart home zone to accommodate India’s growing home automation sector. Indian Security Indu...
Electric Productions presents ‘Trending Today’, a television series airing Saturday, February 23 on Fox Business at 12:00 PM EST featuring Business Leaders and Lifestyle Innovators. This episode of Trending Today features Swann Communications, the pioneer of DIY security systems. Swann is a global leader in security monitoring, consumer electronics and security-centric solutions for the smart homes and businesses of today and tomorrow. Surveillance And Monitoring Technology ...
In preparation for ISC West, the largest converged security and public safety industry trade show, the Security Industry Association (SIA) has identified the top technology advancements to look out for at ISC West 2019. The “Top 8,” presented with ISC Security Events, represent the key technology advancements impacting the converged security and public safety landscape. The “Top 8” Security Technologies At ISC West 2019: Cloud Artificial intelligence Robotics/autono...
At ISC West 2019, in booth #14079, Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, will showcase version 4.0 of its Wisenet WAVE VMS solution along with new features and functionality across several Wisenet camera lines. Significant Development Focusing on ease of installation, the new, highly modular Wisenet X series Plus cameras will be shipping at the show. Attendees will also be able to see the affordable new 5MP Q series cameras and the latest XRN...
OPTEX Corporation Ltd, global sensor manufacturer, has launched a new series of outdoor PIRs in EMEA (Europe Middle East and Africa) and in South and North America that offer 180° detection coverage and 12m/40ft radius to detect any intrusion around a residential or commercial building. Outdoor Intruder Detection Sensors The WX Infinity series comprises two wired and two wireless models available either as the standard or anti-masking version. The new models are built upon OPTEX’s extensive track record in providing outstanding sensing performance for outdoor intruder detection applications, while the wide (180°) detection area coverage brings a new feature that is ideal for protecting larger residential grounds. Outdoor warning technology can help prevent crimes by detecting and reporting intruders before they attempt to break into a building" “Outdoor warning technology can help prevent crimes by detecting and reporting intruders before they attempt to break into a building,” says Hiraku Shibuya, Section Chief, Sales and Marketing Department, Security Division at OPTEX Global Headquarters. “Early intrusion detection is what OPTEX has been focusing on for the last 40 years by delivering an extensive line-up of outdoor intruder detection sensors that provide reliable outdoor security.” Two 90° 12m/40ft Detection Areas The WXI sensors can provide two, independent 90° 12m/40ft detection areas, one for the left side and one for the right. The detection distance ranges from 2.5m (8ft) to 12m (40ft), and the sensitivity and alarm output can be set up independently for these left and right areas. For instance, the left output can trigger for a simple awareness alarm while the right-side output prompts CCTV camera system to set an event index. A patent pending area-masking shutter allows a sliding mechanism to quickly mask an area and makes the detection area narrower to avoid obstructions such as swaying vegetation. The set-up procedure has been made easier by including an automatic walk test mode to ensure a quicker and more accurate installation. WXI Motion Sensors All WX Infinity models feature a tamper-proof back panel to detect if anyone is attempting to move the sensor from the wall The WXI motion sensors benefit from OPTEX’s sensing analytics that filter out noises that are common in outdoor environments, and also distinguishes between humans and small- to medium-sized animals thanks to its Super Multidimensional Analysis (SMDA) logic. The sensors also include temperature compensation and double conductive shielding to ensure best performance in sunny and hot outdoor environments. The selectable pulse count also has the option to enhance the sensor sensitivity when needed. All WX Infinity models feature a tamper-proof back panel to detect if anyone is attempting to move the sensor from the wall, and the anti-masking models (WXI-AM/ WXI-RAM) will alert when anyone tries to cover the lens to block its view. 180° Outdoor PIR Sensor Series “We are pleased to bring our first 180° outdoor PIR series to the market that complements our existing 90° and curtain sensor range,” adds Hiraku Shibuya. “We first presented the first WXI models at Securex in South Africa in May 2018 and had a fantastic response from installers. We are now in a position to roll out the complete WXI series across the whole European and African and Middle East (EMEA) region, as well as in North and South America.”
Ava Group (AVA), a provider of security risk management services and technology will be showcasing its portfolio of security solutions at Intersec Dubai 2019, stand S3-C48. Intersec Dubai features a rich selection of exhibitors in Security, Safety & Fire Protection, attracting visitors from the Middle East, Africa, the Indian subcontinent and well beyond. Ava Group will be presenting the latest exciting solutions from its technology division - which incorporates Future Fibre Technologies (FFT) and BQT Solutions. As a provider of risk management services and technologies, Ava Group offers a portfolio of complementary solutions encompassing both fibre optic intrusion detection and high security access control and locking. Increased Investment As a key event for the region and beyond, Intersec Dubai is the perfect way for security providers and buyers to start 2019" Mark Horton, Global Sales & Marketing Director commented, “As a key event for the region and beyond, Intersec Dubai is the perfect way for security providers and buyers to start 2019. Our solutions offer the very latest in security technology and the highest levels of protection, key benefits that we know are always well-received by visitors at the event.” Mark continued, “Over the last couple of years we have seen a significant growth in demand for our products in the Middle East, with increased investment in infrastructure across the region as a whole. Because of continued growth in the market, we have also invested in the expansion of our Dubai-based office and regional support team to ensure we are perfectly placed to supply and service our customers.” Reporting Multiple Disturbances Future Fibre Technologies will be showcasing its enhanced Aura Ai-2 controller. Featuring unrivalled high-sensitivity detection, location accuracy, cut resilience capability and the industry’s longest linear range - this product features new ultra-low noise optical detection electronics. This ensures a single controller can cover a distance up to 110 kilometres, accurately detecting, locating and reporting multiple disturbances to just +/- two metres. Also on stand S3-C48, BQT Solutions will be demonstrating the new high-strength Orca lock to the middle east market Also on stand S3-C48, BQT Solutions will be demonstrating the new high-strength Orca lock to the middle east market. Building on the success of the award winning YG10, the Orca lock is designed for securing gates, roller doors, shipping containers and any other large door or entryway. Alongside the Orca’s impressive physical attributes, a unique feature is its ability to fully integrate into an access control system, surpassing any other solutions available in the market. Security Risk Management Orca is fully monitored, weatherproof, and user configurable - providing the perfect indoor and outdoor locking solution. As well as the products themselves, the Ava Group team will be on hand to explain how its solutions are being used in real-world projects to address the latest threats. Mark concluded, “We are looking forward to discussing recent key examples of our technology in action, including a major military closed data network where our data network infrastructure protection solution is protecting against tapping and tampering. These projects illustrate the depth of our expertise in security risk management and highlight the level of protection which we achieve to client’s assets and infrastructure. If you are visiting the event come and have a chat with our friendly and expert team on Stand S3-C48 about your specific security needs.”
CHeKT announces a partnership with OPTEX, the supplier of outdoor sensors for intrusion security. CHeKT delivers a visual-monitoring platform for alarm monitoring centers. This partnership with Optex will significantly advance the protection capabilities of security integrators globally. The solution relies on ‘The CHeKT Bridge’, the first product brought to market by CHeKT. With years of development, the CHeKT Bridge premiered in April 2018 at the ISC West trade show. The vision of CHeKT is to allow an integrator to provide visual monitoring services at prices that compete with a traditional intrusion alarm. CHeKT’s President, Wes Usie says, “In today’s culture, when an integrator installs an alarm system and a video surveillance system at a location, there’s no reason why we shouldn’t provide that client with visual monitoring services.” Amplifying The Value Of Sensors With CHeKT’s innovation, OPTEX has found technology that instantly amplifies the value of our sensors and creates truly proactive security systems"“There’s a recognized need in our industry for this exact technology,” said Mac Kokobo, president, and CEO of OPTEX Americas. “With CHeKT’s innovation, OPTEX has found technology that instantly amplifies the value of our sensors and creates truly proactive security systems.” OPTEX will co-sell their existing and new products with the CHeKT Bridge in North America through its current distribution channels. Pricing of the device was not disclosed, but the companies expect to offer the CHeKT Bridge at a cost that allows integrators to remain competitive with existing alarm systems and provide a much higher level of service to the end user. Both companies recognize that a visual monitoring solution must be affordable, scalable and adaptable. Integration Of Alarms And ONVIF Video System “We’re thrilled to partner with OPTEX,” said John Milliron, CHeKT’s Vice President of Sales. “For OPTEX to invest in CHeKT is a tremendous validation of our innovation. The industry is changing rapidly and Integrators must decide if they will adopt innovative technologies to meet escalating consumer demands, police response requirements and false alarm ordinances. “Ring, Nest and others have started a disruption that integrators may not yet have a strategy to address. The CHeKT Visual Verification solution provides an adoptable smart integration of any alarm system and ONVIF video system, existing or new, providing a CS Operator a view of what caused an alarm to occur in just seconds. Together, we intend to reset the Alarm Industry’s best practices.” Quick Access To The Visual Verification Video The platform agnostic Bridge manages cameras locally allowing an operator to access video instantly, unencumbered by firewalls and login credentialsThe CHeKT Bridge pairs on-site cameras with sensors, on new or existing security panels. The platform agnostic Bridge manages cameras locally allowing an operator to access video instantly, unencumbered by firewalls and login credentials. When a sensor of any kind goes into an alarm state, the alarm panel communicates the signal to the monitoring center. Simultaneously, the bridge sends the applicable video to the cloud for viewing by the operator processing the alarm, enabling visual verification of the situation and premises within 5 seconds. This powerful simplistic approach allows central stations to provide a much higher level of service without increasing signal traffic or increasing the time an operator spends processing an alarm signal. The operator can forward the clip, via SMS text, to the emergency contacts when additional verification is necessary, and to the police responding to the alarm. Formidable And Affordable Security Solution “We’re impressed that CHeKT understands the needs of every stakeholder in the security space – end users, integrators and installers, the operators who processes alarms and the emergency responders. This product is an exceptional response to those needs and, paired with our sensors, makes a formidable yet affordable security solution,” said Rob Blair, president of OPTEX’s Security Division. CHeKT has overcome these barriers and dealers can freely design a true security solution that detects a crime before a break-in happensOPTEX’s outdoor rated sensors create reliable detection across a premises’ exterior, detecting motion within inches of a building. With the Bridge connecting sensors and cameras and sending video immediately, “an operator can see troublesome behavior before a person breaks in through the door or window,” Blair said. “When you can communicate to the police that you are watching apparent criminal behavior, instead of reporting an alarm with no other context, the response is much quicker.” Detecting Crime Before A Break-In Barriers into the visual monitoring space were over complicated setups that did not scale into the existing security system and monitoring centers. CHeKT has overcome these barriers and dealers can freely design a true security solution that detects a crime before a break-in happens. “The sensors and alarm systems were doing their jobs, and the camera systems were recording. However, those systems have worked in parallel, not in unison,” Usie said. “Past efforts to create visual monitoring have been cumbersome, slow and expensive. We couldn’t find what was needed…that’s how CHeKT was born, a technology that enables operators to immediately visualize what tripped an alarm.”
Carbon Black, a provider of next-generation endpoint security delivered via the cloud, announces that it delivered zero delayed detections and zero tainted detections in the MITRE Corporation’s Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) assessment. The MITRE assessment tests the ability to quickly detect specific adversary tactics and techniques as captured in the ATT&CK knowledgebase. The evaluations for this initial testing period used a MITRE-developed APT3 emulation plan on behavior detection, telemetry and enrichment, among other elements. In the assessment, CB Response demonstrated it could automatically detect and display adversarial behaviours without humans-in-the-loop across the entire MITRE ATT&CK Matrix, which includes: initial access, execution, privilege escalation, defense evasion, credential access, discovery, lateral movement, collection, exfiltration, and command and control. Real-World Attacks MITRE has set an excellent standard for how testing should be conducted in an open, rigorous, and sophisticated way" “We’re proud to be among the initial vendors evaluated by MITRE and we’re extremely proud of these results. We attribute our very strong showing to our philosophy of building products the right way for the long haul,” said Scott Lundgren, Carbon Black’s Chief Technology Officer. “Objective, transparent and open testing is critical as a means of driving the industry forward, and the MITRE ATT&CK framework offers a critical look at how real-world attacks play out. We believe MITRE has set an excellent standard for how testing should be conducted in an open, rigorous, and sophisticated way. We thank MITRE for its leadership.” “We’re very pleased with the participation in our first round of ATT&CK-based evaluations,” said Frank Duff, MITRE lead engineer for the evaluations program. Endpoint Data Collection “Effective cybersecurity can’t be done alone. We look forward to continued collaboration with the industry to help vendors understand their capabilities against known adversary behaviors and empower customers to more effectively buy and deploy these security solutions.” Carbon Black’s MITRE ATT&CK feeds combine the power of Carbon Black’s unfiltered endpoint data collection and a robust collection of adversary techniques In conjunction with the assessment results, Carbon Black announced it has added MITRE ATT&CK threat intelligence feeds to CB Response and CB ThreatHunter to deliver new behavior-based threat intelligence to customers. Carbon Black’s MITRE ATT&CK feeds combine the power of Carbon Black’s unfiltered endpoint data collection and a robust collection of adversary techniques to simplify threat detection and threat hunting. Unfiltered view The new threat feeds map directly to the various attack tactics outlined by MITRE. “By adding ATT&CK threat intelligence feeds to Cb Response and Cb ThreatHunter, organizations now have an unfiltered view into all endpoint activity viewed through the lens of attack building blocks and behaviours noted by MITRE. We believe this results in more comprehensive and advanced threat hunting capabilities for security professionals,” said Lundgren. “The ATT&CK threat intelligence feeds directly integrate detection of ATT&CK tactics and techniques into the CB Response and CB ThreatHunter products, underscoring Carbon Black’s commitment to ATT&CK and other open standards and frameworks.”
ONVIF, the global standardization initiative for IP-based physical security products, has announced the final release of Profile T, a new specification with advanced video streaming capabilities and an expanded feature set for metadata streaming and analytics. Profile T also offers support for H.265 video compression, which more efficiently handles image streams from high-definition cameras. With Profile T, ONVIF will employ a new media service that offers support for both H.265 and H.264 video codecs. The media service gives ONVIF the ability to more easily incorporate new video and audio codecs as needed as the industry continues to advance. By supporting H.265, Profile T supports more efficient compression rates, which translates into decreased storage requirements on hard drives and less bandwidth usage – reducing the overall costs of system ownership. Features Bidirectional Audio Streaming The new Profile T features bidirectional audio streaming, supporting audio input as well as output from the camera “Profile T is an excellent example of how ONVIF has embraced technological advancements within its specifications to serve the changing requirements of this industry,” said Per Björkdahl, chairman of the ONVIF Steering Committee. “In addition to the H.265 support, Profile T standardises analytics, metadata streaming and other important features to satisfy current and future market requirements for end users, systems integrators and consultants.” The new Profile T features bidirectional audio streaming, supporting audio input as well as output from the camera. Using standardized event types, Profile T ensures that video management systems and other software clients use one set of events to support all cameras, regardless of manufacturer. This includes alerts such as tampering, digital input and relay output. Profile T also enables a specific area of an image to be selected for analysis, using the conditional motion region detector configuration through the analytics service. Profile T also covers the streaming of metadata, including analytics and events.
Centralite Systems, Inc., premier manufacturer of reliable, wirelessly connected devices based on the Zigbee home automation platform, has announced that its 3-Series Micro Motion Sensor and Micro Door Sensor have been certified to work with Echo Plus, Amazon’s popular voice assistant. Centralite Motion And Micro Door Sensors Amazon recently added support for motion and door sensors to Echo Plus Amazon recently added support for motion and door sensors to Echo Plus; with this announcement, Centralite becomes one of only two hardware partners whose sensors have been designated as ‘Works with Alexa’ devices in connection with Echo Plus. Because Centralite’s sensors are Zigbee-based, and Echo Plus has built-in ZigBee capability, no third-party hub is required; both sensors can be easily integrated directly into Echo Plus. According to an Alexa blog on Amazon.com, the incorporation of the new door and motion sensors opens up a range of new use cases. The blog explains that customers “can view their connected sensors in the Alexa App, query their status by asking Alexa, and use sensors to activate Routines to control other connected smart home devices and automate a wide variety of custom-built Routines.” Amazon Echo Plus Compatibility These two sensors join an extensive list of Centralite devices that are already Echo Plus-compatible, including the company’s Smart Outlet, 4-Series Smart Outlet, Smart Dimming Outlet, In-Wall On/Off Switch, and In-Wall Dimmer Switch. The newest ‘Works with Alexa’ certification is part of building a long-term relationship with AmazonAccording to Sean Bryant, Centralite CEO, the newest ‘Works with Alexa’ certification is part of building a long-term relationship with Amazon. Smart Home Ecosystem “There’s no doubt that voice assistants are becoming an increasingly vital component in the smart home ecosystem, and Amazon leads the way with Alexa and Echo,” he noted. “Consequently, Centralite is committed to include Alexa and Echo Plus integration and support in our future product roadmap.” Bryant also added that Centralite, long known for its ‘white label’ smart home devices and solutions, will capitalize on this new integration as a way to build on the company’s rapidly growing consumer brand.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalize the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras, and other products suffice for their security. Increasingly Competitive Landscape Smart home services can provide additional revenue streams for the security industry For instance, IP cameras are a highly popular smart home device rooted in security, and Parks Associates estimates 7.7 million standalone and all-in-one networked/IP cameras will be sold in the U.S. in 2018, with $889M in revenues. Product owners may feel their security needs are fulfilled with this single purchase, as such dealers and service providers are under increasing pressure to communicate their value proposition to consumers. Categorically, each type of player is facing competition uniquely—national, regional, and local dealers all have a different strategy for overcoming the increasingly competitive landscape. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. While white-label devices are acceptable in some instances, dealers need to integrate with hero products whenever possible when those exist for a category. For dealers who have added smart home devices and services are all potential benefits and good for business Improved Customer Engagement That 2017 survey also revealed 36% of security dealers that offer interactive services report security system sales with a networked camera and 16% report sales with a smart thermostat. For dealers who have added smart home devices and services, enhanced system utility, increased daily value, and improved customer engagement with the system are all potential benefits and good for business. Security has served as the most productive channel for smart home solutions, mainly because the products create natural extensions of a security system’s functions and benefits, but as smart home devices, subsystems, and controllers expand their functionality, availability, and DIY capabilities, many standalone devices constitute competition to classical security. Particularly viable substitute devices include IP cameras, smart door locks, smart garage doors, or a combination of these devices. Products that are self-installed offer both convenience and cost savings, and these drivers are significant among DIY consumers—among the 6% of broadband households that installed a security system themselves, 39% did it to save money. Enhance Traditional Security Self-installable smart home devices may resonate with a segment of the market who want security While many security dealers believe substitute offerings are a threat, some dealers do not find such devices an existential threat but instead view them as another path to consumer awareness. They argue that the difference between smart product substitutes and traditional security is that of a solution that provides knowledge versus a system that gives one the ability to act on that knowledge. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market who want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth Increased Market Growth A key counterstrategy for security dealers and companies is to leverage their current, powerful role as the prime channel for smart home devices. Many security dealers now include smart home devices with their security systems to complement their offerings and increase system engagement. For example, as of Q4 2017, nearly 70% of U.S. broadband households that were very likely to purchase a security system in the next 12 months reported that they want a camera to be included as part of their security system purchase. In response, many security system providers now offer IP cameras as optional enhancements for their systems. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth. Security dealers have an opportunity to become more than a security provider but a smart home solutions provider rooted in safety. Provide Status Updates Comcast has entered both the professionally monitored security market and the market for smart home services The alternative is to position as a provider of basic security with low price as the key differentiator. Comcast has entered both the professionally monitored security market and the market for smart home services independent of security. It has discovered that monetizing smart home value propositions through recurring revenue becomes increasingly challenging as the value extends further away from life safety. Since the security industry remains the main channel for smart home services, security dealers are in a unique position to leverage that strength. Value propositions must shift from the traditional arming and disarming of a system to peace-of-mind experiences that builds off the benefits of smart devices in the home to provide status updates (e.g., if the kids arrived home safely) and monitoring at will (e.g., checking home status at any time to see a pet or monitor a package delivery). These types of clear value propositions and compelling use cases, which resonate with consumer and motivate them to expand beyond standalone products, will help expand the home security market.
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security Industry Experts The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritize Safe School Environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organizations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organizations recognize their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilize, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack Of Consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings. A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right Protection Equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive Security Plan Quantifying and mitigating risk are the jobs of security professionals and school administratorsA risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay Adversarial Behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorized visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier Target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security. It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety And Security Components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms Layered Security While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-Device Artificial Intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent Automotive Solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualization. Based on 10nm ultra-low power processing technology, the CV25 chip is optimized for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual Security Guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-Integrated Devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber Security Standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and Assa Abloy (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions And Consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasizing the impact of consolidationEmphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specializing in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New Avenues Of Growth" The early days of new ownership is opening fresh opportunities for both organizations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organization, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance SearchThe company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The Growth Of The Cannabis Market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalized in dozens of U.S. states, and Canada is on the verge of legalizing the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Dundee’s rejuvenated waterfront has breathed new life into the city, and not far from the new V&A Museum building is Foxlake Dundee, an exciting new water sports facility. Taking advantage of the regenerated docks area, Foxlake Dundee offers cable wakeboarding – where boarders are propelled by an electric cable rather than a boat – paddle boarding and Scotland’s first urban Aqua Park. Hikvision Thermal Video Solution Foxlake Dundee was the second Foxlake water park to open, following the very successful adventure park in Dunbar, East Lothian, on the Scottish coast. The Dundee facility, which opened fully in summer 2018, includes a large floating assault course, which has proven hugely popular with visitors, featuring huge obstacles, slides and rafts, and a giant 3.5m inflatable tower known as ‘the Mountain’. Unfortunately, due to its city center location, the assault course and the wider facility was likely to be something of a magnet for unauthorized activity, primarily of the inebriated variety, explains Zak Hegarty, Foxlake Dundee’s manager. “Because of our location, right in the heart of Dundee city center, we’re quite near a lot of pubs,” Hegarty adds. “And sometimes a 3.5m floating inflatable tower looks pretty inviting to someone with a quantity of ale in their system – it looks like an irresistible challenge.” Remote HD CCTV MonitoringI introduced myself as I saw they were opening and was invited initially to look at a CCTV system" The concern was that accidental or deliberate damage or vandalism to the equipment was a real risk – and along with that came the danger of injury or worse to those attempting to exploit the park, at night, in the dark, unsupervised on the water. Hegarty’s first instinct was to investigate the option of manned guarding: having a security officer on-site during those out of hours periods overnight when the facility was at its most vulnerable. But an approach from Brian Davidson of Webster Security & Fire was to change his mind. Davidson had noticed the development in the docklands with interest. He approached Hegarty to see if Webster Security & Fire might be able to help with securing the site. “I introduced myself as I saw they were opening and was invited initially to look at a CCTV system,” Davidson says. “This then blossomed during further conversations into a proactive, remotely monitored CCTV solution. They were looking at going down the route of employing manned guarding for when the site was closed, but we thought this would provide a cost-effective and workable solution that offered the same level of protection.” GJD Motion Detectors The challenges presented by the Foxlake Dundee site were not insignificant. The system needed to be remotely monitored and based on some form of movement detection – on a site which itself was constantly moving, due to the changing tidal water levels. Davidson and Webster Security & Fire got in touch with Hikvision in Scotland and together they designed a solution to meet all of Foxlake’s needs. The centerpiece of the system proposed by Davidson and Webster Security & Fire was the use of Hikvision thermal cameras to detect activity on the jetties. This is complemented by the use of GJD motion detectors and Hikvision cameras to pick up movement on approach areas, further Hikvision cameras which monitor the internal office reception areas, and additional Hikvision cameras providing a security, health and safety and management overview of the both the assault course and the paddle and wakeboarding facility areas. A public address tannoy system is also connected to the surveillance solution. Hikvision Thermal Bullet Cameras The Hikvision thermal bullet cameras highlight areas of heat difference in the field of view The Hikvision thermal bullet cameras highlight areas of heat difference in the field of view – so a human body is always visible as hotter than its surroundings, particularly in a marine or waterfront environment. Hikvision’s thermal cameras also utilize behavior analysis technology, so figures moving into specific zones in the image can automatically generate alarms. The advantage of thermal cameras for a water-based site like Foxlake is that they can operate in all weather conditions – they’re not impeded by fog, mist, heavy rain, snow or other environmental factors, the sorts of conditions which could severely impede even the most advanced of conventional cameras. Hikvision 8-Channel DeepinMind NVRs The other cameras in the Foxlake Dundee system benefit from Hikvision’s Darkfighter technology, allowing for video monitoring and recording in even the lowest of light conditions. And the whole solution records to a Hikvision 8-channel DeepinMind network video recorder, which utilizes powerful AI technology to learn to filter out false alarms and accurately raise alerts. In the evening, after normal operating hours, the site is locked up and alarms are set. It’s then remotely monitored by the Corps of Commissioners, who are alerted when the thermal cameras or motion detectors pick up any movement on the site. Operators check the live cameras to confirm that intrusion has occurred. If an intruder is detected, they immediately contact Foxlake management via phone, and are also able to contact police if required. At the same time, the Corps operatives can use the PA system to issue warning announcements to allow the intruders to know they are being monitored. The effect is almost instantaneous, Hegarty says. Enhanced Intrusion Detection The overall reception for the video surveillance solution has been extremely positive “We’ve had three incidents since the system was installed,” he says, “and the response by the intruders is pretty remarkable. I’ve reviewed the footage and compared it to the time notification I’ve received a missed call on my phone: you can see the intruder on the video footage hear the warning, and then they’re off. They just leave straight away. It’s amazingly effective.” The overall reception for the video surveillance solution has been extremely positive. “We’re really happy with the system,” Hegarty says. “The video footage quality is very high and we’re glad we haven’t had to go down the manned guarding route, as similar facilities have done. We appreciate that Webster and Hikvision took the time and thought to design something that would work for us in our specific circumstances. Of course, the proof is in the performance, and the fact that a number of intruders have been quickly and effectively warned away is evidence that it is doing the job it was designed for.”
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, working alongside Sonitrol of Fort Lauderdale, is pleased to announce the completion of a highly-anticipated security system upgrade for Junior Achievement of South Florida (JASF) at the organization’s JA World Huizenga Center at the Lillian S. Wells Pavilion (JA World). JA World is located on the Broward College North Campus in Coconut Creek, Florida. With over 60,000 square feet of learning areas, rentable meetings rooms, and the Huizenga Catering Kitchen, JA World is the largest Junior Achievement facility in the world. Each year, more than 21,000 5th grade and 20,000 8th grade students from Broward and south Palm Beach counties visit the facility. The 5th graders learn basic economic concepts, workplace skills, and personal and business finances in a simulated city built for young students; the 8th graders focus on how their educational choices will impact their future earning potential, managing a budget and learn about high growth industries to help spark their career exploration. The initial security system included remotely managed access control, verified audio intrusion detection, and analog camerasRequirement Of IP Camera Technology “Each day, 450 students participate in JA BizTown and JA Finance Park simulations at JA World. Their safety and the safety of our volunteers, staff, and guests is of the utmost concern to us,” said Laurie Sallarulo, President & CEO, JASF. Sonitrol of Fort Lauderdale started working with JASF in 2008, in the early design/build phase of the facility, and through its completion in 2009. The initial security system included remotely managed access control, verified audio intrusion detection, and analog cameras. At the time, IP cameras were considered too expensive. “Previously, we had 18 analog cameras on the system,” explained Leni Smith, Director of Operations for JASF. “As time went on, it was clear that we needed to bring more areas inside and outside the building under surveillance, we wanted to access more cutting-edge IP camera technology, and we wanted to have all our surveillance under one Video Management System (VMS).” Installation Of 3xLogic Hybrid NVR Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analog camera investmentWorking in tandem, Sonitrol of Fort Lauderdale and 3xLOGIC designed a system upgrade that, through a combination of discounts and donations, JASF could afford. It also helped that John Ray, President of Sonitrol Fort Lauderdale, is a long-time, active JASF Board member. In order to fit JASF’s budget, Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analog camera investment, while adding in higher-resolution IP cameras for expanded coverage. The hybrid solution also creates a migration path, allowing JASF to continue improving visibility with new IP cameras over time as their budget allows. “As part of ongoing security and safety improvements, our staff participates in an annual active shooter training,” explained Monica McNerney, VP Operations, “and during those trainings, two things became clear. We needed to cover more areas with surveillance, and we needed to partner more closely with local law enforcement to give them real-time access to our system in case of an emergency.” Viewing Discrete Areas With VIGIL Software JASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server softwareJASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server software. These include the reception area, two loading dock areas, other exterior doors, their large meeting rooms, and the student areas, known as JA BizTown and JA Finance Park, where 450 young people spend most of their time each day at JA World. The receptionist controls public access to the building by viewing who is requesting entry, and buzzing that person in. The receptionist also monitors the loading dock area and notifies the appropriate staff member when a delivery has arrived. Leni Smith, who manages day-to-day security matters, reviews video after an incident is reported to her. “I really like how with the upgraded system, I can use motion detection alarms to hone in on exactly the video I need to review—I bet we’ve cut the time for review easily in half, if not more. I also really value how I can draw a box in a camera view and zoom into that area easily and quickly to find out exactly what happened.” Working With Community Partners We work very closely with our community partners to help them understand and access our facility and security system"Monica McNerney expanded on how the upgraded system is positively impacting another aspect of the JASF security program. “We work very closely with our community partners like Broward College security and local law enforcement to help them understand and access our facility and security system. We also routinely ask for their expert feedback on whether we’re managing our security effectively. “So far, they’ve told us we’re doing exactly what we need to be doing, and they’re excited about the expanded access they have to our camera views, although we hope that no event ever warrants that need.” TotalGuard Solution For Emergency Situations Jennifer Thomas, Vice President of Operations for Sonitrol of Fort Lauderdale, also discussed continued improvements that are planned for JA World. “We are actively designing phase II of the camera upgrade, which will include improved coverage and image clarity for camera views outside the front doors. TotalGuard allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring center “We are also ready to deploy our latest technology for the main lobby area—TotalGuard. TotalGuard is a great solution for emergency situations, it allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring center, for prioritized verified police response.” Sallarulo had a final thought on how things have been going with the system upgrade, “As for Sonitrol of Fort Lauderdale, they always provide us an amazing response. As a non-profit, we could not do what we do without the help of partners like Sonitrol. We are very grateful for their support and service.”
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Wide Area Monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Matrix IP Bullet And Dome Cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
A Manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Centralized Surveillance Solution Large area to monitor - The company is spread across a wide area employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing good quality image and can cover a greater area for monitoring was the requirement. Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brands Centralized control - The company is divided into various branches which are located at various places in Satara. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Low Light Images For Enhanced Security To cover the large monitoring area, Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images which aid in providing high-class security. For storing the streamed videos, Matrix offered Network Video Recorders. These NVRs have features such as Adaptive Recording which aid in storing more data in a defined space. Moreover, it has Intelligent Video Analytics such as Intrusion Detection and Motion Detection which were also applied. Instant notifications and alerts ensured real-time security of the premises. Results: Centralized Control 24x7 Real-time Surveillance Higher Security with Intelligent Video Analytics
Exabeam, the next-gen SIEM company, announces that NTT DATA Corporation (NTT DATA), its partner and one of the providers of technology and services for government and business, has chosen to secure its global operations using Exabeam’s Security Management Platform (SMP), which provides unlimited data collection, machine learning and analytics for modern cyber threat detection and response. NTT DATA’s internal system is used throughout more than 50 countries and regions, 210 cities and by 34,500 employees in Japan and 75,500 employees overseas. It is a fast-moving company that has acquired many businesses over the last five to 10 years, resulting in the inheritance of a number of different legacy SIEM platforms. However, these solutions were lacking, and NTT Data wasn’t obtaining the visibility it needed to keep pace with modern cyberthreats. Disparate Legacy Systems Exabeam was already our valued partner, and we were so confident in the company’s security solution" “Exabeam was already our valued partner, and we were so confident in the company’s security solution, we decided to use it ourselves, to remove complexity and unify our disparate legacy systems that were ineffective at protecting against modern threats,” said Hiroshi Honjo, head of Cyber Security and Governance at NTT DATA. “Having Exabeam’s unlimited data lake and attractive pricing model made the difference for our large organization.” Exabeam’s SMP provides NTT DATA with scalable, behavioral modeling, machine learning, and advanced analytics for comprehensive insider and entity threat detection throughout Japan, APAC, North America, and Europe. This functionality was vital to the NTT DATA team because they required greater visibility into potential cyberthreats throughout the organization and in all locations around the world. Automated Incident Response “NTT DATA’s journey was a unique one, since they had multiple legacy logging platforms in use globally. Exabeam was able to replace or consolidate each system using our next generation platform, and we accomplished the initial rollout in a matter of months,” said Nir Polak, CEO, Exabeam. “The swiftness of that transition is critical to maintaining secure operations, especially when dealing with such a geographically dispersed enterprise.” Automated incident response allows teams to respond to security incidents rapidly and with less effort Automated incident response allows teams to respond to security incidents rapidly and with less effort. At the SMP’s foundation is the Exabeam security data lake, designed to store all event logs at a predictable and flat price. This frees the NTT DATA security team from manually analyzing data logs – and instead they can focus on quickly identifying and responding to security threats. SIEM Solution According to Honjo, “The second phase of our project will be to look at use cases and fine tune the SIEM solution to work for our business needs. Overall, we are very happy with how well Exabeam met our stated deadlines and how quickly we are able to realize value from the product. We look forward to introducing Exabeam to our global customers.” Recently, Exabeam was identified by Gartner, Inc. in the 2018 Magic Quadrant for Security Information and Event Management. The company was positioned as a Leader based on completeness of vision and ability to execute.
Immersive Display Solutions, Inc. (IDSI) announced that it has selected the Barco F70 for its advanced dome display project. Using thirteen F70-4K6 projectors per dome and featuring the powerful Barco Pulse electronics processing platform and unique Single Step Processing (SSP) pixel-shifting technology, the integrated solution from IDSI will support high-performance fast jet pilot training. This selection continues the successful relationship which has been built between IDSI and Barco over many years and has produced some of the highest quality display systems in the industry. Barco F70-4K6 Display Projector The F70-4K6 is a high performance, robust laser-phosphor projector with sealed optics and minimal number of moving components inside. This construction enables rugged performance that ensures stability and predictability over the 60,000-hour lifetime of the product. 4K resolution is achieved using the high bandwidth Barco Pulse electronics platform and the proprietary SSP technology. All this leads to the delivery of exceptionally sharp and detailed dynamic imagery allowing trainees to detect moving objects at long distances and totally immersing them into the perfect simulation experience. The team at IDSI is well-respected throughout the industry for their precision, quality, and low-risk approach to program requirements “Our relationship with Barco is built on performance, support, and trust,” says George Forbes, President and founder of IDSI. “When we decide on which projector to use for a project, we consider much more than the technical performance- which has to be there. We know we can rely on Barco, and that the entire Barco Simulation team from top-down is behind us, and that is a big factor in who we choose to partner with.” IDSI-Barco Partnership “The team at IDSI is well-respected throughout the industry for their precision, quality, and low-risk approach to program requirements,” says Dave Fluegeman, VP, Simulation at Barco. “Our teams have always integrated very well, and when there is a seamless approach and singular focus to a project, the likelihood of success is always very high.” Recently IDSI won the ‘Small Business of the Year’ award after careful selection by the MS&T judging panel and votes by the simulation and training industry. The honor was awarded for their way of leveraging human capital, innovation and agility to grow and meet client needs, all while cultivating and growing technical and social influence in the community. The Barco F70-4K6 in turn received an honorable mention as an Outstanding Innovative Product that has positively impacted the client’s ‘way of doing business.’
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
In the analog era, videotape was the storage media of choice for CCTV systems. Since the advent of digital video, and of IP-based systems, a variety of other storage formats have come to the fore, including hard drives, flash drives, SD cards and others. Now we are in the age of the cloud, which offers new opportunities to store vast amounts of video and presents challenges such as bandwidth and cybersecurity. For a current perspective on storage, we asked this week's Expert Panel Roundtable: How are new developments in video storage impacting the video surveillance market?
Ensuring privacy is often a concern for video surveillance systems, especially in situations where a system intended for “public” surveillance could somehow, perhaps inadvertently, view private areas or situations. The classic example is an apartment building whose windows are within the range of a video surveillance camera. How can you provide video surveillance without invading the privacy of the apartment dwellers? Integrators and end users often turn to technology for a solution. We asked this week’s Expert Panel Round Table: How can smart camera features (such as privacy masking and programmable pan-tilt-zoom) address concerns about privacy?