Video security systems
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilized in the education arena. Historically, video has been used as a forensic tool in the education ma...
Johnson Controls is introducing the integration of the Tyco Kantech EntraPass go Mobile App with the Tyco American Dynamics VideoEdge software, enabling remote management of access control, video and intrusion tasks for seamless, on-the-go security system operation from a mobile device. The American Dynamics VideoEdge integration with the EntraPass go Mobile App provides a single easy use interface for managing, responding and controlling aspects of your Video Management System infrastructure t...
Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the addition of Desjardins Technologies to its Authorized Manufacturer’s Representative Program to increase coverage for customers in Canada. Desjardins Technologies will deliver French and English pre-sales support in much of Eastern Canada, including the National Capital Region and the provinces of Quebec and New Brunswick. “Desjardins Technologies brings a wealth of experience in both the...
While security salesmen are touting megapixels and anti-passback features, they are missing an opportunity to communicate the role of technology in the broader context of risk management and incident response – and in saving lives. That’s the message of Gerald Wilkins, PSP, Vice President of Active Risk Survival. Incident response is at the core of how an enterprise reacts to risk and is a standardized approach to the command, control, and coordination of emergency response. Effect...
The basic need for public safety is one of the biggest forces driving the adoption of smart city solutions: approaches that seek to solve urban challenges through technological means. The thinking behind these initiatives is that with enough internet connectivity and real-time data, surely environmental, social, economic, and public health issues should become more manageable. However, just adding more technology is not the whole answer. Although technology is necessary for an urban area to tra...
Security video wall and visual display solutions experts Ultimate Visual Solutions (UVS) works on projects in 15 countries around the world since its launch nine months ago. UVS changed its name from eyevis UK last September following the acquisition of eyevis GmbH by the Leyard group. Providing turnkey solutions The rebranding has allowed the company to offer an expanded range of products and services The rebranding has allowed the company to offer an expanded range of products and services...
DW (Digital Watchdog) Complete Surveillance Solutions, globally renowned manufacturer of digital video recorders, surveillance cameras and management software solutions, has announced the release of our new 5MP complete Universal HD over Coax (UHDoC) surveillance solution. The new products include 5MP Star-Light Plus color in ultra-low-light UHDoC cameras, VMAX A1 Plus UHDoC digital video recorders (DVR) and C3 CMS, a brand new remote management software for DW’s VMAX A1 Plus DVRs and VMAX IP Plus NVRs. The complete solution and individual products are ideal for users looking to discover new ROI by utilizing their existing coaxial infrastructure and upgrade to HD multi-megapixel resolution image quality. Star-Light Plus Universal HD over Coax cameras 5MP Star-Light Plus Universal HD over Coax cameras offer image enhancement features such as Star-Light Plus ultra-low-light technology for clear color or monochromatic images in almost zero light, true WDR and Smart DNR 3D digital noise reduction. The new cameras come in a variety of housing options, including new vandal ball cameras with true 90° field-of-view angles and zero IR distortion. All DW Universal HD over Coax cameras are engineered to work with our new VMAX A1 Plus Universal HD over Coax DVRs to easily get new ROI from existing coaxial infrastructure. The DVR’s powerful capabilities are easily managed with an intuitive and simple-to-operate User Interface A VMAX A1 Plus DVR can record cameras with up to 5MP resolution, including 1080p video at real-time 30fps. The DVRs simplify camera installation and adjustment through Up the Coax (UTC) remote configuration, available with all compatible cameras. The DVR’s powerful capabilities are easily managed with an intuitive and simple-to-operate User Interface. Unique and dynamic features include P2P Pathfinder remote connection, camera event group recording, auto channel signal swap and live system monitoring. VMAX A1 Plus DVRs The VMAX A1 Plus DVRs can be controlled remotely via a built-in web server, our new powerful and easy-to-use C3 CMS software, DW mobile apps including the new state-of-the-art DW Mobile Plus app for iOS and Android smartphones or tablets, as well as on Apple TV with the DW Site Viewer app. The VMAX A1 Plus models are available with up to 20TB of storage. The C3 client and event server make up a remote management software suite for DW VMAX A1 Plus and VMAX IP Plus embedded recording solutions. It provides users a powerful and easy-to-use new way to monitor a system from anywhere. Full-featured yet lightweight, the software delivers simultaneous live views and playback of recorded video. The C3 client and versatile event management software support hundreds of devices simultaneously. C3 CMS provides actionable information in real-time, helping users to make more informative decisions as events happen. HD video over coaxial infrastructure “HD video over coaxial infrastructure is one of the fastest growing segments in the video surveillance industry,” said Mark Espenschied, Director of Marketing, DW. “DW makes it easy to breathe new life into that investment in cabling by swapping recorders and cameras for an instant HD upgrade. Our development of the C3 software has made it possible for us to offer powerful remote management features at no charge for which users would expect to pay a premium.”
Visitors to the 2019 edition of Secutech Vietnam will have plenty of opportunities to gather market intelligence, thanks to the introduction of the new ‘Smart Factory Conference’ to the show’s fringe program. As the region’s leading trade fair for the security, fire safety and smart building sectors, the fair provides a program of educational events that cover technological trends, government regulations and industry outlook. Smart factory systems “Vietnam’s Smart Factory market is on an upward trajectory,” said Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd. “Newly built manufacturing facilities are being integrated with smart factory systems and there is also a need for ageing manufacturing infrastructure to be upgraded with smart solutions. For this reason, there is a growing appetite for information among prospective buyers which we hope the Smart Factory Conference will fulfill. It will be especially useful for investors, owners of industrial parks, consultants, contractors, architects, suppliers and government officials.” Vietnam’s manufacturing base is gradually moving towards industry 4.0, an automation trend of connected devices, IoT and AI Vietnam’s manufacturing base is gradually moving towards industry 4.0, an automation trend of connected devices, the internet of things, artificial intelligence and cloud computing. Against this backdrop, speakers at the Smart Factory Conference will demonstrate how factories that use new technologies to automate processes such as production and energy management can become more efficient and cost effective. Intelligent video solutions Another discussion point will be intelligent video solutions. With a focus on video analytics, access control and production surveillance, conference speakers will explain how both factory security and production efficiency can be improved. In addition, there will be an exploration of government regulations and the most up-to-date fire safety systems, including alarms, detectors, fireproof materials and extinguishing systems. Smart access control systems Besides the Smart Factory Conference, visitors to Secutech Vietnam 2019 will be able to benefit from two other elements of the fringe program. The Fire and Industrial Safety Seminar will cover best practices and solutions for disaster prevention in buildings and industrial settings The Fire and Industrial Safety Seminar will cover best practices and solutions for disaster prevention in buildings and industrial settings. Meanwhile, the Smart Hotel Seminar will update attendees on solutions that improve hotel management and guest experiences, including energy and building management platforms and smart access control systems. Market intelligence platform The Smart Factory Conference is jointly organized by Houselink JSC, Messe Frankfurt New Era Business Media Ltd and Vietnam Advertisement & Fair Exhibition JSC. Houselink JSC is Vietnam’s first developer of an online e-bidding and market intelligence platform for the construction market. The conference will take place on 15 August at Secutech Vietnam 2019, which runs from 14 – 16 August at the Saigon Exhibition and Convention Center. In 2018, the fair set new records, attracting over 13,800 buyers (2017: 12,097) and 310 exhibitors from 20 countries and regions (2017: 270).
Avigilon Corporation, a Motorola Solutions company, announced that it is launching its Avigilon Blue™ platform in the United Kingdom. For Avigilon partners, the Avigilon Blue cloud service platform provides an easy-to-install, cloud-based video security solution with features and capabilities that allows them to remotely monitor and manage more sites with fewer resources. Partners can easily monitor the health of customer sites, update configurations and deploy system updates, all remotely. Key benefits Other key benefits of the Avigilon Blue platform for partners and end-users include: Patented Avigilon self-learning video analytics – technology that works with almost any IP camera already installed on site, to recognize threats with greater accuracy. Quick video verification – with easy and secure access to video via the Avigilon Blue Mobile app or a desktop browser, users can verify video clips instantly on site or remotely. Monthly subscription costs – helping provide a recurring monthly revenue opportunity for partners, while end-users enjoy the peace of mind of predictable fees for video security services. Patented Avigilon bandwidth saving technology – providing users the simplicity of using a standard internet connection, helping keep internet connectivity costs down. Avigilon Blue for businesses The Avigilon Blue solution is ideal for small and medium size businesses and distributed enterprises. It provides flexible security by allowing businesses to monitor their own security operations or enable third-party remote video monitoring service providers that use technology like I-View Now or SureView Systems to monitor their sites. “The Avigilon Blue video security platform continues to help customers globally to stay secure,” said Ryan Nolan, senior vice president of Commercial Operations at Avigilon. “We are excited to expand the Avigilon Blue platform into the United Kingdom, helping our partners create a new recurring monthly revenue stream. End-users benefit from a simple and highly effective video security solution to keep their businesses safe.”
VuWall, the provider of video wall and AV network management, and TBC Consoles — a world-class technical furniture designer, manufacturer, and installer— announced a partnership to provide customers with an affordable and efficient control room kit that addresses the specific requirements of small to midsize control rooms — and fully complements VuWall solutions. Engineered to simplify the design, quoting and purchasing, and installation process for small and medium size control rooms, the new visualization kit includes TBC SmartTrac Console System and the VuWall ecosystem in one solution. Customers simply need to add the displays of their choice for a complete control room deployment. Simple and efficient workstation Customers are requesting a simple and efficient workstation that scales to smaller environments""As the need for surveillance, monitoring, and collaboration capabilities proliferate across facilities of all sizes, customers are requesting a simple and efficient workstation that scales to smaller environments with robust monitoring and collaboration requirements," said Paul Vander Plaetse, CEO at VuWall. "TBC Consoles has long-standing expertise in designing modular technical furniture for the AV industry, making them a great partner in creating a combined solution. Now these customers have an affordable, easy-to-deploy and intuitive solution that leverages innovations often only seen in large, high-end control rooms." Powerful video wall management solutions The kit provides organizations with VuWall's flexible and powerful video wall management solutions that drives the best video wall visualization experience. It includes the VuStation KVM multiviewer, a control workstation that enables operators to seamlessly interact with multiple sources from a single keyboard and mouse on their desktop; VuScape, a series of power and modular video wall controllers for small and large-scale video walls; and VuWall Touch Panel, featuring a PoE tablet with an intuitive interface designer, that doesn't require any programming skills to configure. TBC's SmartTrac Console System is designed to meet modern surveillance and monitoring demands As an integrated platform, organizations have a comprehensive ecosystem driving the video wall that is easy to use and deploy. TBC's SmartTrac Console System is designed to meet modern surveillance and monitoring demands within a lightweight aluminum and steel-based workstation that can be combined with other consoles, carts, or accessories to allow the system to adapt to any sized control room. It features full cable management, height adjustment, rack modules built into the countertop, and the ability to mount a variety of accessories without tools. These features speed up deployment and maximize versatility for any system components and user requirements. Modular control room furniture "Our customers look to us for modern, ergonomic, and modular control room furniture," said Jansen Hahn, chief operations officer at TBC Consoles. "In these environments, we are tasked with providing workstations where the operators can view a variety of sources on multiple monitors in a setting that incorporates all hardware and software to meet their needs and allows for future expansion. “Working with VuWall allows us to suggest a package kit which does just that. We see great value in our ability to provide a number of discrete solutions that include furniture, processors, and visualization software all in one."
The Canadian technology company Genetec offers a broad solutions portfolio that encompasses security, intelligence, and operations. With the integration of the Dallmeier Panomera systems in Genetec Security Center, the proven Panomera functionality is now available to the users of one of the most widely used unified security platform for the first time. This gives users completely new possibilities for observing and monitoring expansive areas and large spatial contexts. The Panomera multifocal sensor systems from Dallmeier have allowed customers all-encompassing monitoring of expansive areas since 2011. With the integration of the Panomera systems into the Genetec Security Center platform of version 5.7 SR4 or higher, Genetec customers can now benefit from all advantages of the Panomera solutions. The integration requires a regular Genetec camera license. Monitoring areas in high resolution All areas of the entire scene are comprehensively monitored in high resolutionPanomera intelligently stitches the images of up to seven detail sensors and one overview sensor into an overall picture in a single camera system. In contrast to traditional solutions such as combining megapixel and PTZ cameras or multi-sensor systems, all areas of the entire scene are comprehensively monitored in high resolution. Operators are able to zoom into multiple areas at the same time while the high-resolution display of the overall action continues to be maintained. This eliminates switching between camera perspectives, which is often complicated and cumbersome, and also eliminates unnecessary searches on building and area maps while significantly reducing the number of cameras and screens to be monitored. This makes the camera operators’ work much easier. In addition, all views are recorded in high definition, which allows operators to perform any number of zooms at an extremely high resolution – in all detail areas of the overall action – at a later time in the backup. This is a very important functionality, for example, for complex situations or for a successful forensic evaluation not possible with PTZ and single sensor solutions. High-Performance video security system It offers customers an ideal combination of a convenient management platform and high-performance video security systems""We are very happy about the cooperation between Dallmeier and Genetec. It offers customers an ideal combination of a convenient management platform and resource-saving, high-performance video security systems. The ability to precisely define the resolution density across the entire scene already takes place during the planning stage and ensures precise adherence to the previously defined security objectives," said Thomas Dallmeier, Member of the Board at Dallmeier. "The high operation efficiency and significantly lower number of cameras required by the Panomera solution compared to traditional approaches significantly reduces the total cost of ownership and costs for the deployment of the system."
Matrox Graphics Inc. announces Secure Reliable Transport (SRT) streaming protocol support on its complete range of Matrox Mura IPX capture and IP encode/decode cards. The SRT open-source protocol and technology stack focuses on performance, reliability, and security for video delivery over private and public networks. As SRT-ready products, the high-density Matrox Mura IPX capture and IP encode/decode cards allow OEMs and system integrators to build cutting-edge solutions capable of streaming and recording desktops, entire video walls, and selected regions of interest over both LAN and internet. Matrox Mura IPX capture, video wall, and multiviewer cards will be in action at InfoComm 2019, in Matrox booth 3055. Industry-Leading capture and multiviewer cards OEMs and system integrators can mix and match a premium selection of 4K DisplayPort 1.2, 4K HDMI, and 12G-SDI card options to capture a wide variety of physical, baseband sources. Matrox Mura IPX cards with the SRT streaming protocol is a natural pairing" Matrox Mura IPX capture cards also include a dedicated onboard network interface controller (NIC) for unprecedented, high-density encoding and decoding of up to two 4Kp60, four 4Kp30, eight 1080p60, sixteen 1080p30, or exponentially more SD streams. Matrox Mura IPX cards are available in passive and active cooling options. Software and APIs Matrox Mura IPX cards include a complete range of video wall software, APIs, and libraries. These software toolkits allow OEMs and developers to deploy intuitive, ready-to-use software and build custom interfaces and applications. "Matrox Mura IPX cards with the SRT streaming protocol is a natural pairing," says Fadhl Al-Bayaty, business development manager, Matrox Graphics Inc. "OEMs and integrators can couple Matrox Mura IPX’s next-generation capture, encoding, and decoding functionality with the industry’s low-latency video streaming standard to bring out the best-quality live video – even across the most bandwidth-limited, unpredictable, or noisiest of networks."
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Today, more and more video security cameras are increasingly connected to the internet and transitioning into intelligent sensors that collect significantly more data than video security images alone. However, as this level of connectivity and collection of business-sensitive data becomes more widespread, the threat from cybercrime also rises. This is clearly an issue that affects everyone. After all, nobody is immune from cybercrime, not even the experts, which raises the question: What is the viewpoint of the experts when it comes to data security? Geoff Kohl, Senior Director of Marketing for the Security Industry Association, was keen to get the opinions of those who are experiencing the current situation with regard to data protection, and its impact on video security, first-hand. What follows is an outline of the discussion with Gregor Schlechtriem, Senior Vice President business unit Security of Bosch Building Technologies, a global player in video surveillance, and Pierre Racz, CEO of Genetec, who are world-renowned for their software in the safety and security domain. End-To-End Security System According to the experts, data security starts with an end-to-end solution The introduction of a key statistic started the conversation: by 2025, it is expected that 75 billion devices will be connected to the Internet. Clearly, this also impacts video security as it is no longer isolated and part of a ‘closed’ system; it has become part of the IoT. Therefore, the focus cannot remain solely on image quality and the reduction of bitrates; equal prominence must be given to data security. According to the experts, data security starts with an end-to-end solution. For example, the consequences of having an unprotected computer inside your firewall are immeasurable; it’s like an open door to cyber criminals. To successfully minimize the risks the complete video security infrastructure needs to be considered, rather than single components. This is a key advantage of an end-to-end security system that eliminates potential weak links. Secure Communication Between Trusted Devices So, end-to-end data security solutions have their advocates, but what makes them so persuasive, and effective? Well, solutions such as those developed by Bosch and Genetec are designed to safeguard communication between trusted devices, ensure that video in transit (streamed) or in storage remains encrypted and any commands and configurations to control cameras and other devices are transmitted via a secure channel (HTTPS). When one side questions the design of the other we accept that the observation is accurate" To achieve this effectively requires collaboration, which is why, according to Geoff Kohl, an ecosystem of trusted partners is invaluable, “Risk is not the responsibility of one company. Everyone has to be working together. Bosch and Genetec are obviously doing this.” To support Geoff’s opinion, Pierre Racz believes that trust is a quality to be earned, not bought. A case in point is the 15-year working relationship between Bosch and Genetec, “The engineers know each other. We have a trusted relationship, so when one side questions the design of the other we accept that the observation is accurate.” Management Of Massive Data In what ways can more focus be applied to data security? Although the basic task of video security systems remains unchanged, new technologies are consistently being introduced that offer new possibilities. An example of this is IP technology which, when combined with the increasing computation power, enables video security cameras to capture images of a quality that was previously unimaginable. GDPR instills an obligation to guarantee privacy by design According to Gregor Schlechtriem, “As the industry moves to delivering great image quality it creates new challenges, like how to intelligently manage the massive influx of data. On the other hand, video security devices connected to the internet and the wealth of their collective data is a fantastic enabler for new opportunities.”Video security has undergone substantial changes and offer limitless possibilities He is also of the opinion that video security data should be viewed as business tool that provides insights to improve efficiency, increase security or create new business opportunities. It is clear that, compared to the earlier days, other departments, like marketing, are getting more interested in video security data. Meanwhile, as CEO of Genetec, Pierre Racz confirms that video security has undergone substantial changes and offer limitless possibilities. The change to a digital (IP) infrastructure enables the use of video analytics that deliver metadata. This metadata adds sense and structure to video data and provides metrics such as speed, direction, color, size, object class and trajectory. The result of this enriched, more business-focused video data collection is a deeper level of business intelligence. Minimizing Risks Gregor Schlechtriem is only too aware that this level of connectivity also brings a higher level of risk, “Because there is valuable information included in videos we have to focus more on data security, and think beyond the basic tasks of a security system.” Pierre Racz agrees.A digital infrastructure and connectivity opens up countless opportunities The consequences of being hacked are clearly front of mind for him, “If we turn on the news today we can see the circus that has resulted from the global chaos caused by a recent cyber-breach.” By focusing on minimizing these risks, Pierre Racz believes that IoT and the technology enabling us to collect and interpret video data will outweigh the risks and provide improvements in health, and wealth. The key learning here is that a digital infrastructure and connectivity opens up countless opportunities, as expressed by Gregor Schlechtriem, “It is the enabler to generate valuable data for your business, to understand what’s going on with video analytics at the edge and derive invaluable data for situational awareness to improve your business. If you don’t use IP, you miss out.” The change to a digital (IP) infrastructure enables the use of video analytics that deliver metadata Operational Efficiency Pierre Racz agrees, “Compared to video cassettes we can provide so much more value with the kind of technology that can be initially utilized for security, but then leveraged for operational efficiency and even shared with other departments, such as marketing.” He also believes that, although the economic lifetime of analog equipment is almost double that of digital equipment, analog is a low pass filter, so image quality is limited to standards established in 1937. As Geoff concludes the interview and the various opinions are assessed, it’s clear that the end-to-end data security solutions such as those employed by Bosch and Genetec are the way forward for video data security. GDPR Influence Considering the recent changes in European regulations, Geoff Kohl of the Security Industry Association now invites invited Gregor Schlechtriem and Pierre Racz to briefly share their thoughts regarding GDPR – one of the first official data protection acts – and its impact on solutions and business models. If these regulations are applied to Facebook, the resultant penalty will be $1.6b"Pierre Racz highlights the recent Facebook case, “If these regulations are applied to Facebook, a technologically savvy company with $40b of revenue, the resultant penalty will be $1.6b. There is no better example of why data negligence and fiduciary irresponsibility is simply unacceptable.” Gregor Schlechtriem’s point of view is that GDPR instills an obligation to guarantee privacy by design, therefore it should influence any business model from the moment of conception. “You have to bring the right ingredients to the table to guarantee privacy, it’s the responsibility of the system owner. That’s why we analyzed our systems to ensure our technology was capable of meeting the requirements.” And, of course, trust. But the significance of this to people's everyday lives must also be considered; a sentiment which Pierre Racz captures perfectly, “Privacy is our democratic right.”
Who is more likely to rob your home – a friend or a stranger? Is a burglary more likely to occur when you are at home or away? Does gun ownership contribute to more effective home security? What about a loud, barking dog? A recent survey by Reviews.org considered these and other consumer preconceptions about home security and how they compare with the facts. "Everyone wants to feel safe at home but not everyone knows which home safety measures will actually help protect them,” says Mindy Woodall, Reviews.org’s Home Security Expert. “This survey was interesting because it gives us a better idea of how some people think about home security and what measures they personally feel they should take to protect themselves and their families, as well as how their chosen methods compare to what experts say actually works." Survey results and facts Here are some of the survey’s results (compared with the facts, according to experts): Survey results: 50.4% of respondents thought a stranger is most likely to rob them, while 28% thought a friend (even a social media friend) is most likely to rob them. Another 21.6 percent thought a family member most likely to rob them. Fact: In robberies, 65.1% of attackers are someone the victim knows. In nonviolent robberies, 30% of attackers are known to the victim, 24% are strangers, and 46% are unable to be identified. Survey results: Guns were voted as providing the most effective home security by 24.4% of respondents, while 20.6% rated them as least effective. The next highest percentage, 22.8%, thought a professional home security system is the most effective. Only 11.8% of people thought dogs to be the most effective method for home security, although burglars often recommend a loud dog to deter theft (it ranked third most effective). Fact: Residents are three times more likely to be robbed if they don’t have a security system. Time when burglary takes place Survey results: 89.4% of people (correctly) thought that they are most likely to be burglarized when away from home. Survey results: 44.2% of people thought that burglaries occur in the middle of the night, between midnight and 5 a.m. (which conflicts with the above stat because most people are at home during those times.) Fact: Burglaries are more likely during the day, between 10 a.m.– 3 p.m., when people are away from home for work and errands, and kids are at school. Survey results: 50.8% of respondents don’t think burglars knock on the door before breaking in. Fact: Burglars often knock on the door before entering. It’s a good way to see if anyone is home, or if there is a big noisy dog on the premises. If anyone answers, they often say they were looking for their friend’s house, need directions, or will offer cleaning/repair services. The survey results from consumer website Reviews.org are based on a survey of 500 people in the United States of varying ages and locations to find out what they thought they knew about home break-ins, robbers, and burglars.
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduction in error rates since 2013 is due to wholesale replacement of the old algorithms with new ones based on deep convolutional neural networks — completely revolutionizing the technology. Optimal recognition results SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds One entrant in the newly energized market is RealNetworks, whose SAFR for Security is an AI-based facial recognition solution for live video that integrates video management system (VMS) solutions. With 24/7 monitoring, SAFR detects and matches millions of faces accurately in real time, enabling teams to manage a watchlist across any number of video feeds. SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds, even in real-world conditions where faces are in motion, at different angles, under poor lighting, or partially obscured. SAFR builds on RealNetworks’ 23-year history in video technologies. Launched in July 2018, SAFR — secure, accurate facial recognition — is enabling new applications for security, convenience, and analytics. Create security responses “We seek to be the world’s most trusted facial recognition platform and are delighted to partner with customers in the security industry and elsewhere to shape a more secure, convenient future worldwide,” says Dan Grimm, Vice President of Computer Vision and General Manager of SAFR at RealNetworks. “Security professionals are asked to keep us safe 24/7, monitoring a burgeoning number of cameras, and we help make them more effective.” SAFR targets facial recognition for live video, identifying camera-unaware faces moving in real-world conditions. In the April 2019 NIST results, SAFR tested as the fastest and most compact solution among algorithms with less than 0.022 False Non-Match Rate — 62 percent faster than the average speed, according to the company. SAFR now provides capabilities such as live video overlays alerting security professionals to events in real time, automatic bookmarks with rich metadata for investigative work, and alerts that can be customized to create security responses. SAFR uses one-sixth the compute power of competing facial recognition solutions Facial recognition algorithms Five years ago, facial recognition algorithms would struggle to match forward-facing people from still images, let alone camera-unaware moving faces from live video with variations in rotation and tilt. SAFR says they have achieved a balance of accuracy and performance for live video. A contributor to this accuracy is consistency across a range of skin tones. The algorithm was trained on a highly diverse global set of over 10 million non-simulated real-world faces. SAFR was optimized for speed and can sample a face multiple times during the same period of time as other algorithms, subsequently increasing its accuracy. SAFR achieves the performance through edge processing. Distributed architecture enables efficient bandwidth consumption, reducing the roundtrip latency of facial recognition speed to under 100 milliseconds. The savings lower total cost of ownership (TCO): SAFR uses one-sixth the compute power of competing facial recognition solutions, equating to $500,000 or so in savings on a 250-camera deployment. Integrated experience SAFR also uses off-the-shelf hardware and is optimized to leverage inexpensive GPUs SAFR also uses off-the-shelf hardware and is optimized to leverage inexpensive GPUs. SAFR can be deployed on premises or in the cloud, and supports Windows, Linux, macOS, iOS, and Android. When SAFR is paired with a VMS, such as Milestone XProtect or Genetec Security Center, the integrated experience includes 24/7 monitoring to detect and match faces in real-time. Features include live video overlays within the VMS to identify strangers, threats, concerns, unrecognized persons, VIPs, employees, or other tagged individuals in live video. Real-time alerts can be customized for when persons of interest appear on a video camera feed. Additionally, automatic bookmarks with rich metadata make for easier investigative review of security footage. Facial recognition technology is increasingly in demand to improve safety across various industry verticals. Better customer experience Large enterprises with high-visitor flows and heightened security — such as transportation hubs, stadiums, universities, and hospitals — need to know in real time when persons of interest or those on watchlists appear on camera. Sports stadiums could apply facial recognition to deny entry to banned patrons, locate lost children, or recognize VIPs to deliver a better customer experience. Hospitals need access control to restricted areas and pharmaceutical storage closets Hospitals need access control to restricted areas and pharmaceutical storage closets. Airports and transit centers value traffic flows, demographic composition, and dwell times to help improve scheduling. SAFR for Security is available worldwide, and the company partners with VMS providers such as Milestone, Genetec, Digifort, and IPConfigure by Paliton Networks. They are actively working to support additional VMS solutions and have sales teams located in major metropolitan cities around the world. Security professionals “The job of the security professional is critical in today’s world,” says Grimm. “SAFR for Security helps mitigate the challenges of the important work security professionals do to keep us all safe.” In designing and developing SAFR, RealNetworks considered diversity and the uniqueness of each person; Grimm says their massive global training data set is a competitive advantage. SAFR is designed with privacy in mind. All facial images and signatures are AES-256 encrypted in transit or at rest. “SAFR is powerful enterprise-grade software that is continuously improving through innovation and many years of expertise,” says Grimm.
Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combined reader and access control panel, is used to connect to existing electric strikes, mag locks, electronic push bars and other hardware components at the door. It also communicates via Bluetooth with a smart phone credential. Users approach a door, choose the door they want to open in the app, and wait for the app to say ‘unlocked’. Replacing Key Cards And Fobs With App Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enterThe electronic ‘core’ device can be switched out with existing mechanical lock cores to provide electronic access control in locks such as deadbolts, mortise locks, Euro-cylinders, levers and camlocks. It is compatible with 95 percent of mechanical locks, using a changeable tail piece to adapt to various configurations. The core communicates via Bluetooth with a smart phone credential that links to a cloud system. Users approaching a door open the app, tap the core, and wait for the app to say ‘unlocked’. A Nexkey goal is to ‘replace all keys, key cards and fobs with one app’. The Nexkey app recognizes which ‘key’ goes to which door and reveals the right key as you approach. ‘Keys’ are created and access rights are assigned from a smart phone, using email addresses and phone numbers to verify identity. Temporary codes can be texted for one-time entrance for cleaning crews or contractors. Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enter the building. The Nexkey Portal provides a snapshot of system operation, who enters which door at what time, and logs that can be reviewed and downloaded for audit reports. Affordable Access Control Systems For SMBs Nexkey is targeting the small- and medium-sized business (SMB) market, basically companies with 20 to 500 employees, which are looking for access control systems that are affordable and easier to manage. The Nexkey controller costs $999, and the core is $499. Monthly fees start at $15 to $29 per month per door, but the prices go down as additional doors are added. Nexkey is targeting the SMB market, which are looking for access control systems that are affordable and easier to manage Larger enterprises tend to want out-of-the-box integration with alarm systems and video, which Nexkey does not offer, so SMB is their “sweet spot,” says Eric Trabold, CEO. There is an API (application programming interface) that integrates with third-party applications. According to Nexkey’s customer surveys, 30 percent of customers say they bought Nexkey to have a simpler access control credential (a smart phone instead of a key, card or fob). Another 30 percent favor simplified management and quick access through the app. Some 17 percent like the ‘unified’ experience to manage shared, single and multiple workspaces using smartphone credentialing and a cloud-based system. Involving Security Dealers And Integrators Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was highIn the early days, Nexkey looked to work directly with businesses to foster communication and to gain understanding of how the product can best be deployed. Having gained that insight, the ‘next level’ is to engage security dealers and systems integrators to install the system, says Trabold. Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was high. Trabold says 134 integrators/dealers sought to engage. In coming weeks, the company will be finalizing that program, enhancing the dashboard to enable dealers to manage the system on behalf of their customers, for example. “We will be looking at how we can go from that amazing level of interest to being actively engaged with partners in the channel,” says Trabold. Using NPS To Measure Product Quality Nexkey uses the Net Promoter Score (NPS) as a benchmark for how well the product is accepted in the marketplace. NPS measures the quality of a product by analyzing how likely customers are to recommend it to a friend or colleague. As an example, Apple currently has an NPS of 65%. In comparison, Nexkey has achieved a score of 60 percent, and is looking to improve it even more. “A year from now, we want to get the same positive feedback from our dealer/integrator community,” says Trabold. “That’s the challenge, engaging with partners and scaling the business forward. We still have work to do.”
Todd Burgess has an easy answer when asked why he’s used a March Networks video solution in his Quik-E Food convenience stores for more than 15 years. “It’s simple. The system is constantly saving us money.” Networking and IT In his role as Vice President of Quik-E Food Stores, Burgess oversees all the networking and IT requirements for the Lynchburg, Virginia business, which includes 13 convenience stores and gas stations, six car washes, a laundromat and a craft beer pub called The Filling Station known for its unique combination of ‘growlers, grub and gas’. Finding those incidents and stopping them quickly can directly impact Quik-E’s profitability While many things about the family-owned business have changed since its founding in 1973, the need to keep a close eye on each location’s inventory hasn’t. Like every retail organization, Quik-E can cite numerous examples of theft, fraud and inventory errors that have cost the business thousands of dollars in lost revenue. Finding those incidents and stopping them quickly can directly impact Quik-E’s profitability, and that’s where its March Networks intelligent video solution really proves its worth. Video system helps curb thefts “I can’t tell you how many thefts I’ve caught with the help of our video system,” said Burgess. “I had a former employee just finish paying me back $13,000 they owed us in stolen goods, and we recently caught another employee who was stealing probably $50 worth of cigarettes each day.” “And just this morning I was reviewing video of a weekly delivery with one of our managers,” continued Burgess. “We were able to confirm that we’d been charged for $77 worth of gloves that we didn’t actually receive. The video showed the delivery guy come into the store and put everything down. Two boxes of gloves is easy to spot, so it was obvious that that portion of the delivery was missing.” Quik-E Food Stores has upgraded its video solution over the years and Burgess uses the Searchlight software regularly to check for any unusual or suspect transactions and review the data when an incident occurs New software capabilities Over the years, Quik-E Food Stores has upgraded its video solution to take advantage of better performance and new software capabilities. The March Networks video recorders first installed more than a decade ago have been slowly replaced by new generation 8000 Series Hybrid NVRs, able to support both analog and IP cameras or a full complement of IP-only video. Hosted networking solution Burgess has also overseen the transition from older Visual Intelligence software to March Networks Command Enterprise software working with Integrated Technology Group (ITG), the retailer’s long-time systems integrator and March Networks certified partner. That’s in addition to moving the organization from office servers to a hosted networking solution and switching from an existing point-of-sale (POS) system to a new Gilbarco Passport POS solution. “We’ve been proactive about upgrading our IT infrastructure over the last few years, and our video system has always come back online, except in one instance where we couldn’t get the cameras connected again in a couple of locations,” said Burgess. “March Networks Tech Support was wonderful. They managed to diagnose the issue, which wasn’t related to the video products in the end. They were just a big help.” March Networks Searchlight™ Burgess says that he’s a satisfied customer and he won’t be looking for another video solution anytime soon Quik-E is also using March Networks Searchlight™ for retail, a software application that integrates surveillance video with the retailer’s POS transaction data to provide powerful search and investigation tools. Burgess uses the Searchlight software regularly to check for any unusual or suspect transactions and review the data when an incident occurs. “I use Searchlight primarily to look for voids and cancellations, or high dollar value transactions,” said Burgess. “We actually just used it to help catch a manager who probably stole thousands of dollars from us. I knew I was short in inventory, so I pulled up the video and transaction data to see if things were being rung up. It was clear they were not and we had the evidence to prove it. Now we’ll use that evidence to hopefully recoup our losses.” Satisfied customer Ultimately, Burgess says that he’s a satisfied customer and he won’t be looking for another video solution anytime soon. “I think it’s one of the best video surveillance systems on the market. March Networks has been good to me over the years and I’m a very happy customer.”
Queensland University of Technology (QUT) is a major Australian university at the forefront of innovation and development in tertiary education. With a strong focus on research, technology, and sustainability, QUT has state-of-the-art facilities and equipment located across three campuses in Brisbane, as well as multiple remote research sites. With highly-valuable assets and facilities, open campuses, and a combined population of approximately 58,000 staff and students, it is imperative for QUT to have a robust yet discreet security and site management system operating 24/7. In 1995, QUT selected Gallagher as their technology partner to develop and implement a seamless security and site management solution. More than 20 years on, this partnership remains strong as QUT continues to seek new and innovative technology to manage their campuses and simplify operations. Intelligent access control readers QUT’s three campuses have diverse physical environments which are essentially open to the general public. One campus is situated between the Brisbane River and Brisbane Botanical Gardens, another is located in the center of an urban retail village, residential area and high-school. “The QUT campuses, while tertiary education institutions, are open to the public. This open and accessible environment presents a challenge when trying to protect the people and property of QUT” says Tracey Bartlett, Security Systems Officer. We have high expectation of the Gallagher system to manage the security of the non-public domain" “We have high expectation of the Gallagher system to manage the security of the non-public domain whileallowing staff, students and authorized visitors the access they require.” To do this, QUT operates 1500 intelligent access control readers across their sites. Integration with Command Center With the readers communicating directly with Gallagher’s site management software platform, Command Center, QUT is able to manage, monitor, and report on facility access. “We have buildings that are open until 10pm and others that are accessible 24 hours a day, 7 days a week.” says Bartlett. “Our security staff in the CMS (Central Monitoring Stations) are able to create building and cardholder schedules, quickly lock down areas, grant immediate access and generate report. These reports assist the QUT Space Management Team on exactly how and when our facilities are being used.” Key objectives Secure multiple campuses that have open perimeters Protect staff and students and assets Ensure quick identification and response to alarms from multiple systems Streamline cardholder administration processes Staff and Students Security The safety of students and staff is the number one priority for QUT and the university works hard to ensure they operate safe and secure campuses. Through Gallagher’s site management solution, QUT is able to integrate multiple systems – including emergency control points and alarms for temperature change, fire, and flooding - and feed the information into Command Center. Having one central monitoring platform ensures staff quickly identify, locate, and respond to any potential risks on campus. CMS Operators are highly skilled with the Gallagher system and, in conjunction with our CCTV system" “Our CMS team operates 24/7, of CMS Operators are highly skilled with the Gallagher system and, in conjunction with our CCTV system, have a complete view of what’s happening on site. They are then able to direct the field staff to areas of the campus that need attention,” says Bartlett. Ease-to-use software With tens of thousands of cardholders, all with ever-changing access needs, QUT requires a large number of staff to be able to administer and manager cardholder profiles within Command Centre. “The feedback from staff new to the CMS have commented that Command Centre is very easy to use software and they’re surprised at just what the system can do.” says Bartlett. In addition to streamlining the administration processes involved in cardholder management, Gallagher’s system also streamlines operations for QUT. More than just a card controlling physical access, QUT’s cards act as staff and student IDs, are used to operate printers and borrow from the library and can be used to monitor time and attendance. Through Command Centre, audit trails are generated for quick and easy reporting on each card function. Site Management software As a technology focused university, QUT continuously reviews and implements new systems and technology as they become available. In order to keep up with the very latest site management software available from Gallagher, QUT opts for an ongoing Software Maintenance agreement. “We’ll continue to welcome the opportunity to embrace Gallagher’s latest products as we are confident, they will meet our needs” says Bartlett.
Avigilon Corporation (‘Avigilon’), a Motorola Solutions company, announces that the New Bedford Housing Authority (‘NBHA’) in Massachusetts, USA has selected Avigilon video security solutions to help improve safety and reduce crime within its community. With close to 1,750 federal public housing units and 748 state aided units, the NBHA services over 6,000 individuals by providing safe, well-maintained and affordable housing units. New Bedford has faced challenges related to crime, which prompted the NBHA to seek out a security system that delivers actionable results to increase public safety throughout its community. Monitor critical areas The NBHA has deployed a complete Avigilon solution to monitor 13 of its properties throughout the city The NBHA has deployed a complete Avigilon solution to monitor 13 of its properties throughout the city. The system includes more than 125 Avigilon cameras and Avigilon Appearance Search™ technology, which is powered by AI to help enable security officers to quickly sort through hours of video with ease to locate a specific person or vehicle of interest across an entire site or multiple sites that are connected to the same Avigilon Control Center™ client software. “Our goal is to provide a safe environment for our residents and deploying an Avigilon system has allowed us to monitor critical areas more efficiently and respond more quickly,” said Steven Beauregard, executive director of NBHA. Video security solutions “So far, the results are tangible as we’ve made great strides in improving the safety and security of our communities.” “The NBHA is taking significant action to proactively address crime and other security concerns to help protect what matters most: its residents,” said Ryan Nolan, senior vice president, Commercial Operations of Avigilon. “By using our AI-powered video security solutions they are able to increase the effectiveness of their security system and provide a new level of public safety.”
A video surveillance system with around 40 IP and thermal cameras from Dahua Technology has been installed at Yarmouth Harbor on the Isle of Wight. The harbor consists of a large marina, docks for the Wightlink Ferry terminal, and pontoons and boat moorings upstream. The previous system was becoming outdated, with poor picture quality and cabling issues. Following a number of thefts from boats and boat fires in neighboring harbours, a new solution – including a thermal imaging capability – was specified. Thermal, IR, Ultra PTZs, fisheye cameras Dahua cameras are a mix of thermal bullets, IR bullets, Ultra PTZs, IR domes and fisheye cameras The Dahua cameras are a mix of thermal bullets, IR bullets, Ultra PTZs, IR domes and fisheye cameras. The thermal cameras are especially suited to wide area outdoor video surveillance and are ideal for the large, water-based environments at the harbor. The cameras feature Vox uncooled thermal sensor technology and high thermal sensitivity at less than 40mK, enabling them to capture more image details and temperature fluctuations. With a built-in fire detection functionality, the cameras provide an extremely sensitive fire alarm system. H.265 encoding technology The IR bullet cameras feature highly efficient H.265 encoding technology, PoE and IR illumination at up to 50 meters, as well as a wide dynamic range, providing vivid images even in the most intense contrast lighting conditions and delivering powerful day/night surveillance in a compact package. At one of the moorings upriver, there is no power supply on isolated pontoons, so wind power and solar energy have been harnessed to operate the cameras. Images are transmitted wirelessly back to a control room at the main harbor office. When the control room is not staffed, Yarmouth Harbor can nominate individuals to receive alerts and images on their tablets and smartphones via the Dahua surveillance app. Automatic people-counting technology The new surveillance system has transformed our ability to monitor the harbor" As well as the harbor itself, the system also covers the adjacent Yarmouth pier, a Grade II listed structure said to be the longest wooden pier in the UK and recently refurbished. Automatic people-counting technology has been incorporated into the cameras at the pier’s entrance to monitor numbers on the pier as a health and safety measure. “The new surveillance system has transformed our ability to monitor the harbor for the safety and security of our customers, staff and the visiting public,” said Dave Rice of Yarmouth Harbor Commissioners. “The HD picture quality is superb, and you can pick out people’s faces, so there is no comparison with the previous cameras. The system has proved straightforward to use and we are delighted with its performance to date.” “This proved an interesting project to work on, not least because parts of the installation had to be carried out by boat,” said Chris Snell, managing director of security installation firm, Central Southern Security. “The Dahua equipment has been a pleasure to work with and will provide Yarmouth Harbor with a great solution for many years to come.”
Indiana Department of Correction (IDOC) is a state-wide organization, comprised of 21 adult facilities housing over 28,000 inmates. Safety of both inmates and the public is a top priority for IDOC and forms part of the organization’s mission and vision. The inefficiency and increased cost associated with managing multiple security technologies and systems led to IDOC’s Director of Construction Services Kevin Orme to seek a solution that not only increased efficiency and reliability for the prison facilities staff but ensured that both inmate and public safety remained consistent with their organization mission and vision – the top priority. Effective pulse fence systems Gallagher security monitored pulse fence systems are safe, effective, reliable, and safely deter and detect disturbancesGallagher Certified Channel Partner Security Automation Systems (SAS) is a valuable partner to both Gallagher and IDOC. SAS has worked with IDOC and Gallagher to design and manage the installation and maintenance of the current system and to develop further solutions to meet future requirements and increase efficiency and safety. Gallagher security monitored pulse fence systems are safe, effective, reliable, and safely deter and detect disturbances without triggering false alarms. An essential requirement for upgrading a number of low security level 1 facilities to level 2 is perimeter detection. Some IDOC facilities require up to 1000 feet of interior chain link fence to be covered by effective non-lethal perimeter detection. SAS worked with the IDOC requirements and proposed the Gallagher D21 disturbance sensors to provide the perimeter detection solution. Perimeter security for correctional facility “Gallagher’s system changed the way I think about perimeter security,” says IDOC’s Director of Construction Services Kevin Orme. “Gallagher is the specified standard for any correctional facility above minimum security.” The product is great, works reliably every day, and I don’t have to worry about it" Gallagher’s perimeter security system is included in all new IDOC construction, as well as being retrofitted into existing facilities throughout the state. The efficient installation process of the Gallagher system meant IDOC could significantly reduce time in comparison to other technology in the agency. “The product is great, works reliably every day, and I don’t have to worry about it,” he adds. “We’ve been able to make more effective user of security resources too. Officers have been reallocated from the perimeter to in-prison offender contact areas.” Operator-friendly software “Hardware failure rate and recurrent costs are very low, and the software is operator-friendly reducing human error,” says Mr. Orme. “Maintenance is much easier; the prison’s maintenance staff have the ability to fix any minor issues.” The D21 Disturbance Sensor measures and analyzes the impact on the fence when disturbed. The sensor raises an alarm only when specified limits are exceeded, preventing any nuisance or ‘false’ alarms caused by disturbances such as wind or rain. Integration with Command Centre software Compared to other technologies considered by the state, the D21 sensors were the most cost-effective solution"Ryan Tomlinson from SAS says the D21 sensor was suggested for two main reasons. “First, the D21 sensors integrate seamlessly with the Gallagher Command Centre software, which was a key factor in the decision process. We were already integrating non-lethal electric fencing, door control and video systems with Command Centre and the state preferred not to add another, separate system. The second reason we chose the D21 sensors was cost. Compared to other technologies considered by the state, the D21 sensors were the most cost-effective solution.” Mr Tomlinson had confidence in Gallagher and its products to carry out the job successfully. “Although this was to be our first installation of the D21 product, we were confident that between the technical ability of our staff and the support from Gallagher, we would be able to provide a successful installation,” he says. “The D21 sensors were simple to install. They easily mounted to fence posts and other structures the system was monitoring and installing the communications backbone was low-cost and straightforward.” Monitoring real-time data in Command Centre We were able to power-up each new zone of sensors and get them on-line with the Gallagher Controller 6000s"“After the initial process of setting the address of each sensor, we were able to power-up each new zone of sensors and get them on-line with the Gallagher Controller 6000s. Next, we were able to individually adjust the parameters of each sensor and monitor real-time data in Command Centre according to the particular characteristics of the structure the sensor was affixed to." “Overall, I was impressed with the ease of installation, the adjustability of the sensors and how well the sensors integrated with the Command Centre software.” Following the installation of the Gallagher system, IDOC was able to reclassify the facility as level 2, thus allowing them to house a wider group of offenders using the cost-effective, yet highly secure perimeter security solutions offered by Gallagher.
The first forensic science-based crime prevention system in New York State was installed at luxury Swiss watch manufacturer, Richard Mille. It is the fourth system to be deployed in the United States. The technology, the Intruder Spray System from SelectaDNA, utilizes forensic science to reduce burglary, robbery and high-value theft by a documented range of 40 to 86 percent. The cutting-edge technology was installed at the world-renowned watch brand’s architecturally stunning flagship boutique, located on ‘Billionaire’s Row’ on 57th Street in Manhattan. Irrefutably identify criminals The forensic technology is synthetically manufactured in an accredited ISO 17025 laboratory The system uses the power of forensic marking science to considerably deter crime and, if a crime is committed, enhances law enforcement ability to irrefutably identify criminals, then apprehend and prosecute them. The technology has been used for more than ten years in 46 countries on five continents. It is now available and beginning to be deployed in the United States. The forensic technology is synthetically manufactured in an accredited ISO 17025 laboratory. It is scientifically structured, and functions, the same as organic DNA – but is more durable. Each unit of the forensic solution contains a universally unique code (sequence), which is never replicated; thus; providing an exclusive identifying marker for each client. Each unique forensic code provides an uncontestable link between a criminal, or stolen item, to a specific crime scene and the rightful owners. Remote video monitoring The system – comprised of a control box, spray head and PIR – is easily integrated with other security systems such as burglary, access control, intrusion, video, and many others. Installations take approximately four hours. The system can also be installed as a standalone crime-fighting solution. There are various modalities of system activation, including but not limited to panic buttons, money clips, remote video monitoring via Milestone Systems, RFID and facial recognition technology. When the system is activated, the invisible, non-toxic and water-based forensic solution remains on marked criminals’ skin for four to six weeks, and clothing for two to three months. The solution is only visible via a special frequency UV light, leaving criminals exposed to identification and apprehension well after leaving the crime scene. Crime-fighting technology SelectaDNAs forensic marking technology is a well-documented tool to prevent and deter a large percentage of crime" “We’re pleased to provide Richard Mille with a proven crime-fighting technology to further enhance its already impressive security measures,” said Henrik Olsen, CEO of CSI Protect, the exclusive provider of SelectaDNA technology in the United States. “SelectaDNAs forensic marking technology is a well-documented tool to prevent and deter a large percentage of crime across the globe and now in the United States.” Many Fortune 500 and iconic, well-known companies have used SelectaDNA technology, including, Tag Heuer, LVMH, Chanel, Pandora, Watchfinder & Co., 7-Eleven, Circle K, G4S, Securitas, GlaxoSmithKline, Lloyds Bank, The Royal Bank of Scotland (RBS), Bank of New Zealand, McDonald’s, KFC, Balfour Beatty, Shell, Texaco, Raptis Rare Books and thousands of others. Offender marking solutions The co-founder of Milestone Systems, Henrik Friborg Jacobsen, is a major proponent of the technology and anticipates major growth of its use in the United States. Friborg Jacobsen is also an investor in, and chief advisor to, CSI Protect. SelectaDNA is a pioneer in forensic marking offering a full range of property, infrastructure and offender marking solutions, using a completely secure and unique forensic technology. SelectaDNA, which is water-based, non-toxic and non-flammable, is proven to reduce crime (especially robbery, burglary and high-value theft) by up to 86%. SelectaDNA not only reduces crime, but also enables law enforcement to link criminals to crime scenes and secure convictions.
Round table discussion
With the advent of online shopping, brick-and-mortar retail businesses are challenged to make transactions more convenient while enhancing the “experience” aspects that differentiate real-life shopping from the simpler route of clicking on a website. Technology is helping retailers create that differentiation, including technologies such as video systems, deep learning analytics and point-of-sale (POS) integrations that have evolved from innovation in the physical security market. For more insights, we asked this week’s Expert Panel Roundtable: What new security industry technologies are having an impact on the retail market?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Video security systems: Manufacturers & Suppliers
- Dahua Technology Video security systems
- Teleste Video security systems
- Hikvision Video security systems
- Videotec Video security systems
- Meyertech Video security systems
- Pelco Video security systems
- Bosch Video security systems
- Vanderbilt Video security systems
- ComNet Video security systems
- Hanwha Techwin America Video security systems
- VIVOTEK Video security systems
- Vicon Video security systems
- LILIN Video security systems
- OT Systems Video security systems
- Hunt Electronic Video security systems
- Hunt Electronics Video security systems
- AMAG Video security systems
- Milestone Video security systems
- Geutebruck Video security systems
- Arecont Vision Video security systems