Video security systems
IDIS America has published an educational eBook - Understanding Video Tech Requirements for Cannabis Retail and Production - following its success in the sector over the last two years. The eBook is part of the company’s commitment to support its systems integrator partners secure new growth sectors. This free resource will help them understand the risk and threat profile, as well as the security requirements placed upon this fast-growing and highly compliance-driven market. According to...
Bosch Security Systems (Bosch) has introduced the AUTODOME IP starlight 5100i with enhanced image quality and built-in Artificial Intelligence (AI) to help operators react before a potential situation occurs. Designed for outdoor surveillance applications when light levels vary, the AUTODOME IP starlight 5100i has a new ½ inch camera sensor offering 4MP resolution and 20x optical zoom to detect people or objects at a maximum distance up to 1,676 meters (5,498 feet). AUTODOME IP starligh...
In light of the current global events, most of the human workforce is confined to their homes and business owners are actively seeking new ways to guard their personal and commercial assets 24x7. Enterprises of all sizes need smart and scalable security solutions to protect their physical capital and properties automated drones to guard assets Using automated drones to guard assets round the clock has become a necessity, and businesses are reaping great value by adopting autonomous drones for...
Synology Inc., globally renowned high-performance, reliable, versatile, and environmentally-friendly NAS servers and storage solutions firm, has announced the launch of the RackStation RS1221+ and RS1221RP+ (redundant power) 2U 8-bay rackmounted storage servers, which have been specially built to deliver high performance in a space-efficient and cost-effective manner. “The RackStation RS1221+ and RP+ storage server units are designed for small businesses, and indeed, ‘small’ t...
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials...
Finbarr Solutions, a foremost global security & risk management consultancy, announced the launch of free face-to-face video consultations with a member of the Register of Chartered Security Professionals. The service is available to any organization that would benefit from expert independent advice, regarding their security requirements and systems, manning levels, and/or security postures. Assess security provision The Register of Chartered Security Professionals was established under a...
Alarm.com has released the first commercially available video doorbell that rings without requiring any contact to reduce public health risks and make home visits and deliveries safer for all. The Alarm.com Touchless Video Doorbell is the next generation of video doorbells, combining sleek design with some of the most advanced video intelligence available to consumers for touch-free operation. It is the latest technology innovation from the company that pioneered smart home security. Touchless Video Doorbell The Alarm.com Touchless Video Doorbell eliminates the need to physically press a doorbell button. Anyone coming to the front door simply stands on a doormat placed at a safe distance to ring the chime. Rather than using motion detection common to other doorbell cameras, rapid and accurate person detection activates the Alarm.com Video Doorbell to reduce unimportant interruptions. When a person is detected, the doorbell immediately triggers the existing chime in the home, sends a mobile alert to the homeowner and starts recording a video clip. Homeowners can see and speak with visitors through the Touchless Video Doorbell’s live HD video and two-way audio instead of having to answer the door. Touchless security solution Our Touchless Video Doorbell helps homeowners and visitors alike maintain social distance" “Protecting the health and safety of loved ones and our communities has never been more important,” said Anne Ferguson, Vice President of Marketing at Alarm.com, adding “Particularly in the current environment, our front doors have become an even greater hotbed of activity.” Anne adds, “Our Touchless Video Doorbell helps homeowners and visitors alike maintain social distance and avoid encountering germs, bacteria and viruses that may exist on surfaces around the front door. Adding this touch-free solution to an Alarm.com-powered smart home security system is another way we can stay vigilant and protect one another.” Home automation As an integrated part of the expansive Alarm.com ecosystem, the Touchless Video Doorbell can automatically trigger other device activity through user-defined rules. For example, lights can turn on when the doorbell detects a person. Rapid people detection also helps ensure that inadvertent chimes are not triggered by animals, packages or other non-human objects. The device also features: 150° vertical field of view that gives homeowners a full head-to-toe image of visitors and clear look at packages left on the doorstep. Optimized portrait viewing on mobile so there’s no need to rotate the mobile device. Full HD resolution, HDR, and infrared night vision. Onboard heater for low temperature operation. Live video and saved clip viewing using the Alarm.com mobile app or website. The Alarm.com Touchless Video Doorbell will be available through the company’s robust network of professional security service providers.
The Protege Group, a prominent securities transportation specialist in Brazil, has specified its first fully automatic transmission as part of a pilot project to evaluate new armored cash transport trucks. Two armored high-value cargo light trucks, a Volkswagen 9.160CE and a Mercedes-Benz 915 E, have been equipped with an Allison 2000 Series™ transmissions. The trial of fully automatic transmissions is designed to make the company’s operations more efficient and productive by improving vehicle agility and robustness, and by extending the life of the transmission and engine components. They are exceeding the company's expectations. Investment and automatic transmissions "The Protege Group invests heavily in the well-being and safety of its employees, and automatic transmissions greatly reduce the physical and mental wear on the driver," explains Nelson Dias, Automotive Engineering Manager at the Protege Group. "The state of alertness for a prompt reaction in any critical situation is a fundamental condition for good work in our segment." Manual transmission gears “Automatic trucks have been shown to be less stressful for drivers and for the respective working teams, as they are not subject to the swings so common during the shifting in manual transmission gears,” said Dias. “The teams are unanimous that there is less physical wear and tear throughout the workday.” Shorter vehicle downtime Another finding of the Protege Group’s trial is shorter vehicle downtime. Automatic transmissions do not require clutch systems maintenance, which is common in manual transmissions. In addition, they provide a more homogeneous operation of the powertrain, avoiding engine overdrive while acting as auxiliaries to the brake system. Allison 2000 Series Allison 2000 Series automatic transmissions are designed to equip light commercial vehicles for both cargo and public transport applications. They can be equipped with a Power Take-Off (PTO) output and have six gears, including overdrive, which guarantees a more agile and simpler operation. They also have advanced Allison 5th Generation electronic controls, which improve productivity and efficiency strategies as per the needs of the vehicle.
Eagle Eye Networks, the globally renowned company in smart cloud video security, has shared the trends that will have the biggest impact on video surveillance, security, and use of analytics, to drive business intelligence and improvement in 2021. Cloud and advanced analytics Customers are asking for the cloud and advanced analytics will transform video surveillance systems into even more valuable business solutions. Compliance requirements are constantly evolving and IT departments are engaging with, and in many cases, owning video surveillance systems and customers are expecting systems to be open and connected. “A number of factors are driving the video surveillance trends in 2021,” said Hans Kahler, Vice President of Operations at Eagle Eye Networks, adding “Innovation from companies like Eagle Eye Networks and our partners is leading and meeting the demands of customers for their video surveillance systems to provide business insights in addition to security.” Combining AI and cloud video surveillance Combine the promise of AI and cloud video surveillance with the volatility, instability, and remote work environment of 2020" Hans Kahler adds, “Combine the promise of AI and cloud video surveillance with the volatility, instability, and remote work environment of 2020 and we have an environment where people are looking for their video surveillance and security systems to deliver more business value than ever before.” He further said, “The acceleration of cloud adoption and use of analytics to provide improved security and drive business improvement will make 2021 a transformative year for the industry.” Video Surveillance and Security Trends for 2021: Customers are asking for Cloud: The shift to the benefits of cloud in the video surveillance space are powerful and undeniable, including major cost savings, heightened data security, remote access and maintenance, flexible storage and retention, scalability, increased stability, and disaster recovery. Analytics and AI turn security systems into business solutions: Video surveillance systems are not just for security anymore, they’re also a valuable tool for business intelligence (BI). While AI has been talked about for several years, its deployment has lagged. This year, we’ll see AI move from the lab to practical adoption. Compliance requirements are constantly evolving: As video surveillance becomes a more widely adopted tool across industries and continents and more industries are using video for compliance purposes, regulating its use is becoming more prevalent. IT departments more engaged and owning video surveillance: IT leaders have not only got involved in the video management system, but have also started owning it. As part of their IT strategy, corporations are leveraging video for business process improvement while reducing unnecessary operational overhead. Demand for open, integrated systems: An open and connected ecosystem makes it possible for businesses and developers to integrate any number of applications on a single video management system (VMS) platform. The VMS platform handles all the heavy lifting of interfacing with the cameras, recording video, securely transmitting and storing video to the cloud, and making video available for use in the integrated applications. The days of vendors ‘locking’ users into their cameras or touting ‘hybrid’ systems (which require upgrades to vendor hardware to get new features) will not be accepted.
Hanwha Techwin, a global supplier of IP and analog video surveillance solutions, has announced the expansion of its line of public health surveillance technologies with the new Wisenet TNM-3620TDY body temperature detection camera. The multi-purpose device uniquely combines Artificial Intelligence (AI) with a dual-sensor design to securely monitor facility entrances and accurately identify potential health risks. Wisenet TNM-3620TDY camera The Wisenet TNM-3620TDY body temperature detection camera offers two detection modes to discreetly scan people entering a facility. When used in estimated body temperature (EBT) mode, the camera’s 2-megapixel visible light sensor captures and sends AI-based face detection data to its QVGA-class thermal sensor, which simultaneously measures the body temperature of each subject. Temperature monitoring is accurate to within +-0.3⁰ C when used with a blackbody calibration device and the camera will trigger audio/visual alarms and notifications when elevated temperatures are detected. An onscreen display indicates a subject’s temperature measurement, and a color-coded indicator is shown over their face. High-resolution surveillance video The Wisenet TNM-3620TDY camera can also be used as a traditional radiometric device The Wisenet TNM-3620TDY camera can also be used as a traditional radiometric device, with the visible sensor providing high-resolution surveillance video to assist in identifying people and activities. In this mode, onboard video and audio analytics are available to detect area intrusion, line crossing, loitering, and temperature detection. A spot temperature measurement feature also enables operators, via a web viewer, to obtain targeted temperature measurements by isolating specific areas within an image. Keeping customers and employees safe The TNM-3620TDY joins Hanwha Techwin’s full suite of solutions for helping businesses adapt during the COVID-19 pandemic, comply with new public health guidelines and keep customers and employees safe. “Business owners and managers of public spaces need flexible options for remaining open and operating efficiently,” said Ray Cooke, Vice President, Products, Solutions, and Integration, Hanwha Techwin America. Integrated with Wisenet 7 System on Chip (SoC) Ray adds, “With this new camera and all our solutions for occupancy level monitoring, face mask detection and social distancing measurement, Hanwha Techwin gives them a choice of health and safety technologies they can tailor to their operations.” The new TNM-3620TDY is based on Hanwha Techwin’s Wisenet 7 System on Chip (SoC), the core technology driving its enhanced image quality and advanced cyber security protection capabilities. The camera has a Micro SD/SDHC/SDXC slot that allows up to 256 GB of video data to be stored at the edge. This method of recording is useful in the event of a network disruption, enabling video evidence that potentially might have been lost to be easily and quickly retrieved when a connection is restored. Seamless connection to VMS, NVR and video decoder The TNM-3620TDY camera can also complement a facility’s existing COVID-19 safety protocols The camera can connect to a VMS, NVR or video decoder, or be used as a standalone device to comply with healthcare privacy concerns. The camera’s face detection area can be customized, for example to target the eye region, to prevent false positives from a warm forehead. The TNM-3620TDY camera can also complement a facility’s existing COVID-19 safety protocols, as people with detected elevated temperatures can be discreetly asked to enter a separate screening area for secondary screening with an FDA-approved clinical thermometer temperature reading. IEC 60601 certification The TNM-3620TDY is compliant with a series of technical standards for the safety and essential performance of medical electrical equipment published by the International Electrotechnical Commission (IEC). In addition, Hanwha Techwin has completed the Food and Drug Administration’s (FDA) facility registration process, with device registration for FDA 510(k) clearance in progress. The TNM-3620TDY supports H.265, H.264 and MJPEG compression formats, as well as WiseStream II, Hanwha Techwin’s compression technology which dynamically controls encoding, balancing quality and compression, according to movement in an image. Users can improve network bandwidth efficiency by up to 75% when combining WiseStream technology with H.265 compression.
The Security Industry Association (SIA) has named five young security professionals as the recipients of the 2021 SIA RISE Scholarship, a program offered through SIA’s RISE community, which supports the education and career development goals of young industry talent. Through this scholarship program, open to SIA student members and RISE members who are employees at SIA member companies each awardee will receive a $3,000 scholarship to use toward continuing education and professional development courses, SIA program offerings and/or other academic or education programs. Scholarship funds can be used to expand knowledge in the areas of business, human resources (HR), information technology (IT), marketing, sales, project management, security engineering, and/or risk management. Young security professionals “The 2021 SIA RISE Scholarship awardees are an extraordinary group of young security professionals who represent tomorrow’s industry leaders,” said SIA CEO Don Erickson. “SIA is proud to help foster the careers of these talented honourees, and I look forward to seeing their many accomplishments and successes to come.” Winners for the 2021 SIA RISE Scholarship Nadim Hammoud, Software Developer, Feenics As a key member of the software development at Feenics, Nadim Hammoud has contributed to multiple new features in production and bug fixes, built proofs of concept for prospective clients, and contributed new tests to the automated testing of the company’s web API. Hammoud plans to use the SIA RISE Scholarship funds toward a computer and network security course and certification in AI He has a strong interest in the latest technologies, including cloud computing and machine learning. Prior to his time at Feenics, Hammoud served as a teaching assistant at Carleton University and held engineering and software development positions at Bertrandt and Tactical Technologies Inc. He holds bachelor’s degrees in computer science and biomedical and mechanical engineering from Carleton University. Hammoud plans to use the SIA RISE Scholarship funds toward a computer and network security course, a professional certification in the field of artificial intelligence, and attendance at industry events. Olivia Peralta, Account Executive, Allegion In her role as an account executive at Allegion, Olivia Peralta works with teams around the world to plan and sell access control projects – from teaching the company’s security software to implementing hardware installations hosted on the cloud for physical security end-users. Prior to her time at Allegion, she served as an account executive at ISONAS Access Control and completed communications internships at Western Resource Advocates and the Oregon Natural Desert Association. She holds bachelor’s degrees in environmental sciences and communication and environmental studies from Northern Arizona University and a continuing education certification from Colorado Water Education’s Water Educator Network and is IPVM University Access Control certified. Peralta plans to use the scholarship funds toward earning SIA’s Certified Security Project Manager certification and pursuing an education that bridges the gap between strategy, design, and product delivery. Matthew Rios, Regional Sales Manager, Axis Communications Rios plans to use the scholarship funds toward completing the EC-Council MasterClass Certified Ethical Hacker certification In his role at Axis Communications, Matthew Rios promotes the use of IP video and Axis cameras to integrators, distributors, consultants, and end-users and maintains fluid and enthusiastic relationships with current and prospective customers. Prior to his time at Axis Communications, Rios held sales management roles at Hanwha Techwin America, Honeywell, and R&D Lock and Alarm. He holds master’s and bachelor’s degrees in cybersecurity from Fordham University and a bachelor’s degree in the homeland and corporate security from St. John’s University. Rios plans to use the scholarship funds toward completing the EC-Council MasterClass Certified Ethical Hacker certification. Mary Sharp, HRA, Stanley Access Technologies As a key member of the HR team at Stanley Access Technologies, Mary Sharp is responsible for over 220 professional hourly, non-union service and install technicians and provides support on major change management and organization redesign efforts and issues pertaining to team cohesiveness, dynamics, and management. Prior to her time at Stanley Access Technologies, she held HR and administrative roles at Stanley Healthcare, Infrasource Underground Construction, and Frontline Private Security. She holds a bachelor’s degree in ethics and public policy from the University of Iowa. Sharp will use the scholarship funds toward obtaining the Society for Human Resource Management’s SHRM-CP certification. Trevor Zuerlein, System Designer, VTI Security Zuerlein plans to use the scholarship funds to pursue further education in IT, become a member of (ISC)², and to earn CISSP credentialTrevor Zuerlein started at VTI Security in 2017 as a security systems technician and now serves as a system engineer; Zuerlein is skilled in access control security systems, security cameras, computer repair, computer science, technical writing, and AC/DC electronics. Before his time at VTI Security, he held IT and sales roles with Time Warner Cable, Mead Lumber, and Archer Daniels Midland Company. Zuerlein holds an associate’s degree in information technology from Central Community College. He plans to use the scholarship funds to pursue further education in the IT field, become a member of (ISC)², and work toward his goal of earning the Certified Information Systems Security Professional credential. Networking events SIA RISE is a community that fosters the careers of young professionals in the security industry. In addition to awarding the annual SIA RISE Scholarship, SIA RISE offers fun networking events for young professionals, created the RISE Microlearning Series of mini-webinars on top professional development topics, hosts career growth webinars and trade show education tracks. Mentorship program The recently launched the Talent Inclusion Mentorship Education (TIME) mentorship program for early and mid-career professionals in the security industry and presents the annual AcceleRISE conference, an essential experience designed to ignite new thinking, strengthen leadership and sharpen business acumen in young security talent. RISE is available to all employees at SIA member companies who are young professionals under 40 or have been in the security industry for less than two years.
Quantum Corporation has announced the expansion of its Executive Leadership Team with the appointment of Brian Pawlowski as the company’s new Chief Development Officer, alongside the hiring of two senior executives to accelerate Quantum’s software-defined infrastructure and international growth. A technology industry legend with more than 35 years of technical development and leadership experience, Brian Pawlowski will drive excellence in software innovation as Quantum Corp. advances on its goal to be the globally renowned major in video and unstructured data solutions. Hybrid multi-cloud software innovation “Quantum’s transformation requires solving our customers’ most pressing business problems and delivering hybrid multi-cloud software innovation,” said Jamie Lerner, President and Chief Executive Officer (CEO) at Quantum Corp. Jamie adds, “Brian’s track record in building technologies and leading teams in high-growth environments will be critical to our success in achieving these goals.” Technology innovation expert Brian Pawlowski is a pioneer and distinguished technologist who joined Quantum Corp. from DriveScale Brian Pawlowski is a pioneer and distinguished technologist who joined Quantum Corp. from DriveScale, where he was the Chief Technology Officer (CTO). Prior to that, he was serving as the Vice President (VP) and Chief Architect at Pure Storage, where he focused on improving the user experience for the all-flash storage platform provider’s rapidly growing customer base. He was also the 18th employee at NetApp, where he played a key role in the company’s expansion over nearly two decades in various roles including Head of Software Development and Chief Technology Officer (CTO). Brian Pawlowski began his career as a software engineer for companies like Sun Microsystems, where he drove the technical analysis on alternate file systems technologies and was the co-architect of the Network File System (NFS) protocol. Video and unstructured data He is the co-chair of the NFS Working Group at the Internet Engineering Task Force (IETF) and has served on the board of trustees for the Anita Borg Institute for Women and Technology, and as a board member at the Linux Foundation. “As Quantum strives to be the leader in video and unstructured data, I’ll be focused on building synergies across our general business units, driving hybrid multi-cloud data management solutions, expanding our software download strategy, and simplifying our products for ease of customer use,” said Brian Pawlowski. Software-defined infrastructure expansion Quantum Corp. has created a new Cloud Software & Analytics business unit headed by Dave Clack To drive cloud software strategy, develop deeper analytics and data enrichment capabilities for customers, and expand data services, Quantum Corp. has created a new Cloud Software & Analytics business unit headed by Dave Clack, who joins as General Manager following Quantum’s recent acquisition of Square Box Systems, Ltd. Dave has advised several startups and established businesses on marketing, strategy, and growth across a range of industries, including household names like McAfee, Deutsche Bank, Rolls Royce, Ford, and HSBC. Asia Pacific market expansion As part of its mission to become a truly global company, Quantum Corporation is focused on developing and supporting solutions for the expansive Asia Pacific market. To achieve this, in Asia Pacific region, the company has appointed long-term Quantum leader, Jim Simon as its new Malaysia Site Leader. Jim Simon will continue to grow and develop Quantum’s operations in the Asia Pacific region at the company’s Kuala Lumpur office, serving the unique needs of the local markets. He has also held several business development and marketing roles at Quantum Corp., since 1998, when he first joined the company. Based in Singapore since 2004, Jim brings a deep understanding of the Asia Pacific region.
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimizes passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labor. All these features make it difficult to recognize people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognized or unrecognized people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialized software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorized access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimizes and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorized access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
In today’s fraught times, business continuity and success hinges on how you manage the visitors to your company. By prioritizing safety and security, and coupling them with top-notch attention and customer service, you win loyalty and gain a reputation that will serve you in years to come. An excellent way to accomplish this is by identifying and implementing the best visitor management system for your company. And visitor management systems go beyond ensuring the safety of your visitors and staff safety from your visitors. A feature-rich VMS will track your guests' activities, so you can better understand their preferences for future visits. That way, you can manage visitor experience and tailor amenities and preferences. Both customer loyalty and brand reputation benefit. Visitor management systems: who uses it, and why is it used? Visitor management refers to all the processes put together by an organization to welcome, process, and keep track Visitor management refers to all the processes put together by an organization to welcome, process, and keep track of all the guests daily. A visitor management system (VMS) is the technology used to manage guests for their convenience, safety, and security. Several features are typical in today’s applications. They include preregistration tools, video intercoms, self-check-in stations, and health screening. In visitor management, the term "visitor" doesn't only refer to guests but also anyone without an authorized access credential. For instance, an employee without their access credential logs in as a visitor. The same applies to a delivery man or a technician carrying out routine maintenance. A VMS helps to account for everyone within the organization at any given time. Who uses visitor management systems? You need a visitor management system to manage a school or hospital, an office, or even a residential building. Here's why: Visitor management system for schools: schools are among society’s most vulnerable facilities. A VMS is almost mandatory in this setting. It helps to identify visitors, detect intruders, and alert security of any unauthorized access. Visitor management system for offices: A VMS accounts for guests at all times. They include clients, maintenance contractors, delivery men, employees without credentials, friends, and family, Visitor management system for hospitals: access control is essential in hospitals, and managing visitors plays a major role. Hospitals offer access to pharmaceuticals, medical records, newborns, and expensive equipment. It is crucial to monitor restricted hallways and sections with video intercoms and track unauthorized persons' movements. Residential visitor management system: tracking people's movement is a key VMS component. In case of a crime, knowing who had access to the building within a specific time frame can help in the investigation. Plus, tracking the activities of visitors can deter future crime. Why is the visitor management system important? A video intercom makes it much more difficult for a visitor to impersonate a known guest. VMS accounts for everyone within the organization in cases of emergency. VMSs can prevent intruders and alert the security department of a breach. A VMS creates a positive visitor experience, which shapes perception of the organization. With a trusted VMS in place, employees can focus on being productive. Health screening gives staff peace of mind. It increases employees' willingness to return to work in the midst of the COVID 19 pandemic. How does a good VMS address occupant and visitor safety? The necessary technology to ensure building safety The best visitor management systems contain the necessary technology to ensure building safety. To maximize occupant and visitor safety, a VMS should have the following features: Job one of a VMS is visitor identification. It also helps deter potential criminals. Some VMSs go beyond identification by running a quick check on the visitor's ID and alerting security of any discrepancies. By identifying and proving a visitor's identity, the VMS ensures the safety of employees and other visitors. VMS helps with compliance A good visitor management system helps the organization follow regulations, such as for occupancy. In the COVID era, some states may require health screening for guests. Health screening helps protect the building's occupants from exposure to health hazards. Information security VMSs also aid in information protection. It takes mere seconds for a rogue visitor to download files into a jump drive, photograph exposed blueprints, or copy customer lists. Visitor management systems restrict visitor access to parts of the building and track the whereabouts of guests. Visitor privacy With pen and paper systems, walking up to the receptionist often gives visitors full view of the visitors list. Visitor management systems seal that vulnerability. Visitors can check in without fear that anyone nearby can see their information. Emergency evacuation With a good VMS, the exact number of people within the building is always known. In the case of an emergency, first responders can use VMS data to identify everyone on site. This is a safety net for both the occupants and visitors to the organization. How to manage building visitors System features depend on the purpose and setting of the VMS. Yet certain features and processes are essential. Preauthorization and health screening The first step is knowing the visitors upfront. Preauthorisation allows everyone to know who is coming and when. Guests specify the time and purpose of their visits. You get to welcome and accommodate your visitors accordingly. Some systems may also be able to upload documents of interest, such as proposals, contracts, presentations, or agendas. Health screening is critical today. It signals that the organization cares about its guests. A visitor is more likely to visit an organization that prioritises health and safety. Health screening is a way to protect your staff and send the right message. Video intercom Along with health screening, video intercom is a key element of VMSs. It enables secure video identification with remote, touchless, and COVID-safe access into buildings. Intercoms are a safe and secure way to communicate with audio and video without physical contact. Video allows you to visually verify the visitor. The audio component enables spoken communication. Some systems even use facial recognition technology and mobile app unlock. When integrated with access control, visitor arrival is seamless. Upgrade to touchless access Touchless access is the safest and most secure VMS option Touchless access is the safest and most secure VMS option. It is more sophisticated because it receives visitors without them having to lift a finger. It's also convenient and effective. In this time of the novel coronavirus, the demand for hands-free systems is surging. VMS has pivoted to met this demand. Many organizations are finding how touchless systems increase safety in the workplace. Visitor logging is essential for managing guests to your building. Besides being a source for verification and data tracing, it also helps in real-time to know who signed into the building and who hasn't signed out yet. Tracking the movement of visitors within the facility makes it clear where they are at all times. This way, there can be an effective emergency action plan for visitors and other occupants. This feature has use in contact tracing, health investigations, and other investigations, such as for theft.
Facial recognition technology has come a long way since it first came to market several years ago. Initially plagued with technical challenges and widely viewed as a futuristic solution, facial recognition is now firmly implanted in numerous consumer and business products and applications. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition, further expanding its use for an increasing number of applications. Facial recognition’s powerful identification and authentication capabilities make it ideal for two applications: first as a security tool, and second as a workforce management solution. The Touchless, Accurate Credential Solution Even before the COVID-19 pandemic, the touchless nature of facial recognition as an access credential was gaining traction with physical and cyber security professionals. Using an individual’s face as an access control credential eliminates the need for physical cards or PIN codes. Facial recognition readers meet the new emerging need to limit physical exposure to germs by offering a highly accurate touchless access control. Facial recognition readers meet the new emerging need to limit physical exposure to germs and viruses As a workforce management tool, facial recognition helps preserve the health of employees checking into work, while providing management with an infallible means of documenting employee time and attendance while providing a detailed history of overall workforce activity and individual personnel tracking. Both of which have been longstanding challenges due to easily compromised time tracking systems and practices. Now, nothing is left to question based on hard data. Selecting the right solution for your specific access control and/or workforce management application is dependent on a very wide range of variables. But there are a few core characteristics that you should look for when evaluating facial recognition readers. Wide And Near-Angle LEDs Most facial recognition terminals employ some form of IR (Infrared) technology to help ensure high visibility by the unit’s image sensor. This often limits where the unit can be installed such as outdoors or near windows due to strong ambient light. More advanced facial recognition readers employ as many as 80 wide-angle near infrared LEDs and 60 narrow-angle near infrared LEDs, allowing the unit to recognize faces even in full daylight and brightly lit environments (not direct sun). This enables installation at indoor locations near windows, lobbies and building entries. 3D Pixel Intensity Distribution Analysis Another advancement to look for involves three-dimensional pixel intensity analysis. Ambient lighting contains ultraviolet rays which can negate near infrared LED lighting, and can also cast shadows making it difficult for a facial recognition reader to pinpoint the facial recognition points required for identification and authentication. Three-dimensional pixel intensity distribution analysis minimizes the effects of ambient light when acquiring facial images by minimizing lighting contrasts. As a result, it is easier for the algorithm to recognize the shape of the face, enabling it to extract more facial features and create higher quality face templates. Functional Ergonomics The angle and position of a facial recognition reader directly impact the performance of the unit. Facial recognition readers with different viewing angles for built-in visual and infrared cameras allows users to stand at positions that are most suitable for facial recognition with little or no effort of contortions. This results in a faster, more comfortable, and convenient user experience. High Performance Processing The performance of a facial recognition solution is directly reliant on its processing power. New advanced facial recognition readers employ enhanced face template extraction technology and powerful processors. A 1.4 GHz quad-core processor can perform up to 3,000 facial database matches (1:N) within one second. More advanced solutions also feature Group Matching functionality capable of executing up to 30,000 matches in one second. Live Face Detection It is most important that the facial recognition readers you evaluate are capable of analyzing faces in real time to maintain fluid entry/egress even during high volumes of employee traffic. Hardware-dependent live face detection systems employing technologies such as facial thermogram recognition and facial vein recognition require expensive hardware components, provide less accurate matches and slower authentication performance, which is counterintuitive for mainstream access control and workforce management applications. Dual Authentication For Added Security Although the use of an advanced facial recognition reader provides the convenience, health benefits and cost-savings of touchless identification and authentication, there are many applications where more than one credential may be necessary to ensure the highest levels of security. Advanced facial recognition readers with multimodal, multifactor credentialing capabilities provide this added security benefit. Videophone Or Intercom Capabilities Facial recognition readers with multifunctionality can solve several challenges with one solution. A perfect example includes devices with SIP (session initiation protocol) videophone capabilities which effectively eliminate the need and associated expense of installing separate intercom devices while adding another layer of security to one’s facility. The COVID-19 pandemic and post-pandemic world have accelerated the need for highly accurate, cost-efficient, reliable facial recognition technologies. Selecting the right solution for your access control and/or workforce management is more important than ever before, making extra due diligence during the evaluation process a smart decision.
Consolidation continued in the physical security marketplace in the turbulent year 2020. There were several mega-deals in addition to shuffling among small and medium-sized companies. Here is a sampling of M&A from this year, compiled from our archive of company news. With the changing economic climate, how much more is ahead in 2021? Stay tuned. Wesco merges with Anixter WESCO International, Inc., a provider of business-to-business (B2B) distribution, logistics services and supply chain solutions, announced it completed its merger with Anixter International Inc., creating a premier, global B2B distribution and supply chain solutions company. Anixter becomes a wholly owned subsidiary of WESCO International. ACRE acquires Razberi ACRE acquired Razberi Technologies, Farmers Branch, Texas, and the product line of intelligent video appliances, automated security software and health monitoring software will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Motorola acquires IndigoVision Among the benefits is enhanced geographical reach across a wider customer base Motorola Solutions says the IndigoVision range of products, global presence and customer base are ‘highly complementary’ to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. Motorola acquires Pelco “Pelco’s track record of innovation, internationally recognized brand, global channel and customer installed base enable us to further expand our global footprint with enterprise and public safety customers,” said Greg Brown, Motorola Solutions’ Chairman and CEO, about the iconic brand. Johnson Controls swallows Qolsys Qolsys Inc., residential and commercial security and smart-home manufacturer, enhances Johnson Controls global innovation platform, delivering next generation security and smart building solutions. JCI had already owned a majority stake in the company since 2014. ADT and Google Home partnership The partnership will combine Nest’s award-winning hardware and services, powered by Google’s machine learning technology, with ADT’s installation, service and professional monitoring network to create a more helpful smart home and integrated experience for customers across the United States. Upon the closing of Google’s equity investment in ADT, Google will own 6.6% of ADT’s outstanding aggregate common equity. Securitas acquires STANLEY in Five Countries The acquisition is aligned with Securitas’ ambition to double the size of its security solutions Securitas acquired STANLEY Security’s electronic security businesses in Germany, Portugal, Switzerland, Singapore and India. The acquisition is aligned with Securitas’ ambition to double the size of its security solutions and electronic security business and expands Securitas’ electronic security footprint and capabilities. Allied Universal to Buy G4S Ending the year on a high note, the boards of directors managing Allied Universal and G4S reached an agreement on the terms of a recommended cash offer. The deal brings to a close a six-month bidding war for G4S. The combined business is expected to generate approximately $18 billion in annual revenues with a global workforce of more than 750,000 people in 85 countries. Quantum acquires Western Digital business line Quantum Corporation entered into an agreement with Western Digital Technologies, Inc., a subsidiary of Western Digital Corp., to acquire its ActiveScale object storage business. The acquisition demonstrates Quantum’s commitment to innovation and growth, extending the company’s leadership role in storing and managing video and unstructured data using a software-defined approach. AVA/Vaion/Jazz Networks Ava, a unified security company, announced the completion of the merger between Jazz Networks, renowned cyber security insider threat detection and response firm; and Vaion, an end-to-end video security solutions provider. Ava is now positioned to deliver unified cyber and physical security solutions to organizations worldwide.
Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects). The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” Federal rules Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government. Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking. “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment. Limits and prohibitions The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems. Security Industry Association (SIA) The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.” Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. Easing compliance burdens The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess. The 'blacklist' The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts. A growing threat Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.” SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.” SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.” The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighborhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighborhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customized central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Synectics, a globally renowned company in the design, integration and support of advanced security and surveillance systems, announced that the company has won a new contract with Irish Rail (Iarnród Éireann) to upgrade all InterCity Mark 4 rolling stock on the Dublin to Cork route to an IP-based video surveillance solution, following a competitive bid process. The IP video security system contract will see Synectics develops and installs an innovative safety-critical IP video surveillance system that enables full connectivity from trains to the control room, there by replacing the existing CCTV approach. Safety-critical IP video surveillance system installation Each eight-coach train set, using Synectics’ T2000 platform, will help utilize a suite of IP 360-degree ‘fish-eye’ cameras Each eight-coach train set, using Synectics’ T2000 platform, will help utilize a suite of IP 360-degree ‘fish-eye’ cameras, in the vestibules and saloon areas, to provide high-quality surveillance information. Installation is expected to commence in September 2021, to be followed by an additional support contract to provide a five-year in-territory maintenance program. IP video security technology Iain Stringer, Managing Director of Synectics, commented “We are delighted that Irish Rail has chosen our IP video security technology, alongside our design, program management and installation capabilities, to upgrade surveillance on one of their premier InterCity routes.” Iain adds, “This win with Irish Rail represents a further step into on-vehicle heavy rail solutions for our Synectics Security business, building on our deep experience across light-rail markets.” Smart technology developments He further stated, “Irish Rail is our second public transport win in Ireland over the last few months and reflects our growing reputation for smart technology developments that meet next generation operator requirements. Our approach is opening up new opportunities for all rail operators to transition their video management capability to the cloud and improve operational effectiveness.”
Harper Security Systems, which specialises in specifying and installing smart security solutions for residential and private properties, has selected OPTEX’s range of Intelligent Passive Infrared (PIR) sensors for their reliability in detecting external threats, especially in rural environments. Three properties in the Home Counties and Lincolnshire are using a combination of OPTEX’s proven PIR sensors to protect property, people, and other important assets including horses from the dangers of vandalism and theft. OPTEX’s range includes sensors which offer panoramic 180-degree detection coverage and 12m/40ft radius to detect any intrusion around a residential or commercial building. Commercial business environments They are ideally suited for protecting larger residential grounds and flat roofs typical with outbuilding on farms and stables. “We have worked with OPTEX for a number of years and have found their range of PIR sensors to be extremely accurate and reliable, which is critical when specifying external detection,” says Alan Harper, Director at Harper Security Systems. The flexibility and versatility of the sensors is such that they are ideal for multiple environments" “The flexibility and versatility of the sensors is such that they are ideal for multiple environments,” Alan continues. “For example, we have recently installed them at a private stables in Lincolnshire to protect horses and valuable equestrian equipment, residences in rural villages in both Bedfordshire and Hertfordshire to protect property and personal items, as well as in commercial business environments.” Innovative security solutions Ben Linklater, Sales Director at OPTEX Europe, says that while the focus is often on towns and cities, crime in the countryside is a huge issue, costing the rural community in the UK more than £9 million this year alone: “Reliable external protection is becoming increasingly important not only to secure equipment and assets, but also livestock and other animals like horses. The earlier the detection the better chance there is to prevent intruders." "External intrusion detection is essential in rural environments as most assets, many of which are expensive to replace (and some are irreplaceable), are stored outside. We are very pleased to work with Harper Security who understand the benefits of early detection to keep premises, assets, people and animals secure, delivering innovative security solutions to their customers.”
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organized at a grand scale at Nashik, Haridwar, Ujjain, and Prayag. As Kumbh Mela is being celebrated after a period of 12 years in Nashik, 100 million people are expected to visit, security is a major concern for the Government bodies. Nashik will be getting an opportunity to host these guests from July 14 to September 25 and no stone will be left unturned in hosting the massive gathering. Challenges Nashik Railway Station authorities wanted video surveillance devices that would not consume larger areas when it comes to installing them as the railway station had congested platforms. Moreover, they wanted a surveillance solution that gave them superior image quality and at the same time did not consume heavily on the bandwidth. Furthermore, the authorities wanted to monitor the whole place centrally and gain central control of the entire place. Installing devices and control room in the congested platforms Restricted allotted bandwidth for the video surveillance solution Requirement Prompt and smooth installations of cameras and hybrid video recorders within 30 days Setting up the control room for monitoring railway station entrance, platforms, and connecting bridges High reliability of the solution for utmost security Storage of the entire 4-month period as evidential proof Matrix offering Installation was completed within 20 days with highly skilled manpower. Cascading of all the connected devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. 4 months scheduled backup of all cameras is configured centrally for storing all the streams. Matrix being an Indian brand, efficient pre-and post-sales support is a part of the solution. Results Secured entry and exit from the city with 24x7 video surveillance of the railway station Installation of the solution done within the defined time frame Products offered SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralized Monitoring Software (CMS)
Specialist property developer and investor, Kajima Properties’ new project development at 77 Coleman Street in the City of London is a luxury multi-tenant office set over seven floors. BNP Paribas acts as the managing agent, while the redevelopment was designed by architect, Buckley Gray Yeoman. The prominent London location is a minute’s walk from Moorgate Tube station and the Elizabeth Line. The redevelopment included installing elegant external facades as well as creating floors of new office space, and 16,000 sq. feet of retail, leisure and restaurant space. The site offers exceptional internet reliability and speed for tenants, and is one of just 22 buildings in the UK to achieve a platinum connectivity rating by WiredScore, the Mayor of London’s digital connectivity rating scheme. Seamless access control system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system to allow bona fide users and visitors easy access through reception and lifts to their desired location. This needed to be underpinned, but not impinged by, a robust security management system including CCTV to keep people and the building safe. They wanted to keep any waiting time in reception to an absolute minimum to avoid crowding, including good access for disabled users, and for all entry to be touchless. Tenants and reception staff would need an efficient, secure and easy to use system for managing visitors. While an entry phone and door automation would be required for anyone arriving out-of-hours, or at the rear of the property, such as for deliveries and trades people with equipment. Bespoke security solutions Finally, a key part of the brief was for any installed equipment, such as turnstiles and lifts, to be in keeping with the sophisticated, minimal look and feel of the building. The Team Antron Security project managed the design, supply and installation of the access control and security system for 77 Coleman Street and acted as the ‘go to’ contact for client, Kajima Properties and BNP Paribas. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 29 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Integriti access and security management system Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for 77 Coleman Street in London, UK. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions since 1988. More than 150,000 Inner Range systems have been installed in over 30 countries till date. The company’s flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls for single sites through to global estate portfolios. Seamless, touchless entry for tenants Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles The building’s 2000+ regular users are issued secure proximity cards, carrying encrypted information about when and where the user is allowed to go. Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles, which also allows them to be read by the KONE lift integration. The high level lift integration with ‘destination control’ means the lift software takes into account where each of the building’s four lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. Antron Security and IDL collaboration The user is immediately directed to the most efficient lift via a display screen on the turnstile. If users are able to go to more than one floor, they can update their preference in the lift itself. For the turnstiles in the reception area, Antron Security and IDL worked closely with the vision set out by the architect to create a high-performing system that was in keeping with the sleek, minimalist design of the building. A bespoke set up of slim ‘speed lane’ turnstile pedestals, together with a separate glass gate were an ideal solution for a reception area where space is limited but security provisions and good disabled access are needed. IDL’s Glassgate 200 opens away from the user, and closes behind, preventing tailgaters and all IDL items are manufactured in the United Kingdom. Readers for proximity cards and QR codes were set into the speed lanes to create a seamless flow through the reception area. Fully integrated visitor management system Inner Range’s Integriti also allowed Forge’s Bluepoint visitor management system to integrate with IDL’s turnstiles and the KONE lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint. An email is generated and sent to the visitor’s inbox where they can create a mobile QR code pass and save it to their smart phone wallet. When the visitor arrives, they scan their QR code on their smart phone at the reception desk, at which point their QR code becomes valid on the Integriti access control system. The visitor is then able to enter via IDL’s speed lane turnstiles, and they are directed by the KONE lift display (which is set into the speed lane) to which lift car they need. To leave, the visitor presents their QR code at the speed lane turnstile, which tells the system they’re leaving. The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system. The QR code gives the visitor the ability to access everything they will need, from the entry turnstile and lift through to any locked doors en route. The integration between Integriti and Forge’s Bluepoint visitor management system was achieved with an XML read/write interface, as well as API integration between a SQL database and a cloud-hosted VMS database based on Microsoft Azure cloud services platform. BTP XIP intercom system A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team, or for deliveries and trades people to use in order to access doors at the rear of the building. The XIP system uses an ethernet distribution network, which means the system can be expanded easily, and it’s possible to install long-distance connections that data networks can’t reach. Hikvision CCTV cameras installed CCTV cameras from Hikvision’s ‘superior’ range have been installed throughout the site to create a hard-wired IP closed circuit television system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view in response to alerts, and footage can be viewed holistically along with other information on from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s Enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener, more energy efficient sites by tracking how tenants use the building, and amending heating and lighting settings as a result. Integriti also provides trace reporting, that can identify a user’s movements if they have become unwell and identify who else has been near them. System benefits for users Touch-free entry to the building via the speed lanes and lifts. No unnecessary stops for users and visitors on their way into the building. Less crowding in the lift areas. Easy to use visitor management system. Robust security that doesn’t impinge on access. Sleek and minimal design in keeping with the building design. Jamie Crane, Commercial Director at Antron Security, stated “The flexibility of Inner Range’s Integriti access control system and Forge’s Bluepoint visitor management allowed us to incorporate high-level lift integration (known as ‘destination control’).” He adds, “Together, they create a future-proof solution as we can continue to meet the ever-changing requirements of the landlord and tenants via our ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.”
One of the largest public train operators in the United Kingdom, Southeastern Rail Network, now relies on a smart video security solution from Bosch Security Systems to secure twelve train depots, including five unmanned locations, against theft and intrusion. The fully digital video surveillance system presents a significant upgrade to the British train operating company, which provides train services between London, Kent and parts of East Sussex and transports 6, 40,000 passengers each weekday on its 392 trains. built-in Intelligent Video Analytics Powered by cameras featuring built-in Intelligent Video Analytics, the solution was installed and configured to the specific requirements at the train depots by Bosch integration partner, Taylor Technology Systems Ltd., over the course of six months. Video security system relies on machine learning algorithms to automatically sound alarms on security threats Fully operational at all twelve locations, the video security system relies on machine learning algorithms to automatically sound alarms on security threats, such as intruders and perimeter breaches. Beyond security applications, the system also tracks important metadata on the arrival times of trains, while also monitoring deliveries at the train depots, among other AI-assisted functions that it carries out. IP-based cameras with Starlight technology The cameras portfolio installed across the twelve depots replaces an analog legacy solution with IP-based security cameras from the Flexidome, Dinion, and Autodome product lines of Bosch Security Systems. These smart cameras include Bosch’s Intelligent Video Analytics capabilities as a built-in feature, ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Because night-time security and surveillance is critical, especially at the five unmanned train depots on the network, the Bosch cameras rely on Starlight technology to provide full intelligent analytics at night and in low light levels. The Starlight technology supports color filtering down to a light level of only 0.0077 lux, so as to deliver detailed monochrome images where other cameras show no image at all, and guard against intruders and unauthorized entry around the clock. Featuring digital ‘trip wire’ to counter false alarms Highly resilient against false alarms, the smart cameras can detect movement at the perimeters of the train depots using a digital ‘trip wire’. In case of a security breach, the system alerts Southeastern Rail Network’s watch personnel, who can view live camera footage, as well as recordings of incidents for heightened situational awareness and total perimeter security. Instead of relying on the pre-configured capabilities, such as vehicle tracking and more, security personnel can also use the built-in camera trainer function to ‘teach’ new functionality, such as detecting certain types of objects or situations. Remote video recordings storage with Divar recorders Recordings from the depots are safely stored and managed remotely with Divar recorders in encrypted format As an integral part of this end-to-end Bosch security solution, recordings from the depots are safely stored and managed remotely, using Divar all-in-one recorders in encrypted format. When looking at the bigger picture, the video security solution adopted by Southeastern Rail Network is part of an industry-wide evolution from cameras as mere video capturing devices to smart sensors capable of collecting rich metadata. Insights beyond security This metadata unlocks unique insights beyond security, including video analytics at the train depots that support applications such as monitoring deliveries to onsite buildings, providing access to personnel and logging the arrival and departure times of incoming trains. The system thereby not only ensures that all train depots remain fully guarded and protected 24/7 against criminal access, but also provides a data-based foundation to keep efficiency gains and cost savings on track in the long run.
Since its completion in 2017, the Gazprom Arena has served as the home ground stadium for the Russian football club Zenit St. Petersburg. And as one of the host stadiums for the 2018 FIFA World Cup and the 2021 Euro Football Championship, the Gazprom Arena must also satisfy the strict security regulations of FIFA, UEFA and ESSMA. When selecting the video security system, the managers responsible at Zenit therefore opted for a solution from the German manufacturer Dallmeier. With its patented Panomera multifocal-sensor system, Dallmeier guarantees the security of many stadiums all over the world. The objective was providing coverage with video security technology for the entire area surrounding the stadium, the entrance gate approaches, the rooms below grand stands, and the grand stands themselves in one of the largest video security projects ever undertaken in a football stadium. Video security system Under enormous time pressure, a high-performance system had to be implemented in the stadium with a capacity of 60,000 fans and yet had to remain adaptable and flexible in response to changing customer wishes as the project progressed. One requirement which from time to time presented the greatest challenge was capturing all areas of all the grand stands all of the time, so that unequivocal identification of offenders could be assured in all circumstances. In order to achieve this, the Russian Interior Ministry stipulated two key requirements for the video security system: Firstly, it must capture the entire grand stand area with a "minimum resolution density" of 250 pixels per meter (px/m). This also corresponds to the performance criterion defined in the globally valid standard DIN EN 62676-4 for video security systems for purposes of enabling identification of an unknown person. Minimum resolution density A Dallmeier video security system has already been operating in the Petrovsky Stadium since 2012 And secondly, the image frequency must not fall below a frame rate of 25 frames per second (fps). Because it is typically only the combination of the specified minimum resolution density and a fluid representation of events that can ensure incontestable evidence that is usable in a court of law. In order to meet these stringent requirements, the security managers invited a number of vendors to present their solutions in advance at Zenit's former home ground - the Petrovsky Stadium - to enable them to choose the right solution for the Gazprom Arena. A Dallmeier video security system has already been operating in the Petrovsky Stadium since 2012, and after a thorough evaluation of all the solutions, the operators decided to install a stadium solution from Dallmeier in the Gazprom Arena as well. Multifocal-sensor system Because compared with conventional camera technologies such as megapixel or PTZ cameras for example, the patented Panomera multifocal-sensor system from Dallmeier can guarantee coverage of even the largest expanses with the stipulated minimum resolution density and frame rate. And Panomera systems continuously capture everything that is happening in full resolution and allow high-resolution zooms - both live and in the recording and by several operators at the same time. This enables stadium operators to track and reconstruct relevant occurrences in detail both live and after the fact. Besides the technical superiority of the Panomera technology, another decisive advantage of the Dallmeier stadium solution was the innovative 3D planning approach, with which a digital reproduction of the Gazprom Arena was created. Conventional single-sensor cameras This makes it very easy to fulfill the requirement according to which at least 250 px/m must be assured literally "in every last corner": color coding in the 3D simulation makes it possible to see exactly where the value has been reached and where a correction should be made, perhaps by setting up in a another position or using a different camera model. An alternative solution would have required a substantial four-figure number of conventional single-sensor cameras A further major advantage of this planning approach is the extreme efficiency of the solution: For example, Zenit St. Petersburg is able to provide security on the terraces throughout the Gazprom Arena with way less than 100 Panomera camera systems, covering all areas with at least 250 px/m and 25 fps. An alternative solution would have required a substantial four-figure number of conventional single-sensor cameras. Minimizes uncertainty factors Apart from enormously high infrastructure costs (masts, cables, etc.) this would also have generated a practically unmanageable deluge of images for the video system operators. Another benefit of Dallmeier's 3D planning program is the automatic generation of "CamCards" - exact configuration documents for every single camera. Armed with this information, installers on site know exactly which camera must be mounted where, how high and at what angle. The big advantage besides the immense amount of time saved consists in the planning reliability: It can be predicted with great accuracy how much labor the installation of the total solution with entail, because this approach minimizes uncertainty factors. Total storage capacity Thanks to Dallmeier's unwavering assistance throughout the project, testing by the state technical personnel in Russia was also successful in the subsequent project phases, with the result that the stadium operators were able to begin operating the video security system after final project commissioning in good time for the 2018 FIFA World Cup. The total storage capacity for the video security system amounts to more than six petabytes Recently, over 1,000 single-sensor cameras have been installed in the Gazprom Arena in addition to the Panomera systems - these safeguard the remaining areas of the stadium. Due to the large number of cameras, the total storage capacity for the video security system amounts to more than six petabytes (equivalent to about 6,000 TB). High-performance recording appliances from Dallmeier are used to process this information. Largest stadium project Authorized personnel from various departments and stakeholders can access the system at 80 workstations. The video security system from Dallmeier has provided ample evidence of its performance capabilities and reliability in the running of the Gazprom Arena, not least during the seven matches of the 2018 FIFA World Cup. On this subject, Karlheinz Biersack, Director Sales Eastern Europe/RUS/GUS at Dallmeier explains: "Of course we were delighted that the security managers of Zenit St. Petersburg also decided to rely on Dallmeier again for their new home, the Gazprom Arena. This success in the largest stadium project we have ever undertaken shows once again that Dallmeier's holistic security and solution approach - above all the patented Panomera technology and our unrivalled project and consulting services represent an immense benefit for our customers."
Round table discussion
Protecting the oil and gas market is key to a thriving economy. The list of security challenges for oil and gas requires the best technology solutions our industry has to offer, from physical barriers to video systems to cybersecurity. We asked this week’s Expert Panel Roundtable: What are the security challenges of the oil and gas market?
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Tools such as standard operating procedures (SOPs) and checklists ensure that every factor is considered when installing a physical security system – or do they? Security system installations are detailed projects, and any overlooked detail is a missed opportunity to make the system better. We asked this week’s Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
Video security systems: Manufacturers & Suppliers
- Dahua Technology Video security systems
- Teleste Video security systems
- Hikvision Video security systems
- Videotec Video security systems
- Vanderbilt Video security systems
- Meyertech Video security systems
- Pelco Video security systems
- Bosch Video security systems
- ComNet Video security systems
- Hanwha Techwin Video security systems
- VIVOTEK Video security systems
- Vicon Video security systems
- LILIN Video security systems
- Seagate Video security systems
- Fujinon Video security systems
- OT Systems Video security systems
- Avigilon Video security systems
- Hunt Electronic Video security systems
- AMAG Video security systems
- Milestone Video security systems
10 Step Guide to Staying Ahead of Emerging Security ThreatsDownload
2021 Trends in Video SurveillanceDownload
Exploring New Vertical Markets for Professional Security SystemsDownload
Capture New Opportunities With Computer Vision And Video AnalyticsDownload