Video surveillance equipment
The time needed to plan, design and accurately evaluate the efficiency of a video surveillance system has been significantly reduced with the news that JVSG’s highly acclaimed IP Video System Design Tool now supports all Wisenet IP Network cameras from Hanwha Techwin. Visualization of Security system System designers and system integrators simply need to import 2D or 3D models of the end user’s building or site, and then enter in some parameters specific to the project, such as the...
Utility, Inc., (Utility Associates, Inc.) announced the United States Patent and Trademark Office issuance of patent 10,812,755 for additional BodyWorn camera technology. Patent for BodyWorn cameras The patent covers mounting a BodyWorn camera in a holster that is embedded inside a body armor vest, duty shirt, winter coat or other garment with the camera lens fastened and aligned to provide a clear field of view through an opening in the garment. Embedding the camera within an article of clot...
IDIS, a global security company that designs, develops, manufactures, and delivers surveillance solutions for a wide range of commercial and public sector markets, is proud to be sponsoring and participating in Canadian Security Association’s Security Canada Virtual Trade Show, slated to be held on December 2nd and 3rd, 2020. Security Canada 2020 Visitors to the Security Canada virtual trade show can learn how IDIS’s flagship plug-and-play DirectIP solution offering can significant...
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fiber optic transmission and networking equipment and an ACRE brand, announced that ACRE has acquired Razberi Technologies and the product line will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Intelligent video appliances The Razberi product line of intelligent video appliances, automated security software,...
Boon Edam Inc., a globally renowned provider in security entrances and architectural revolving doors, has announced a new BoonTV event, ‘The Key to Closing the Biggest Gap in Physical Security: Unauthorised Entry’. BoonTV event - webinar In this event, JC Powell, Vice President of Sales at Boon Edam, reveals the assumptions and misconceptions around entrance security in physical security planning and how to effectively bring reliable entrance control to a facility to avoid costly r...
Briefcam, the industry’s renowned provider of Video Content Analytics and Video Synopsis solutions, has announced that its advanced video analytics software platform will serve as the analytics engine for Verizon’s Intelligent Video solution. Intelligent Video solution The comprehensive monitoring service from Verizon helps law enforcement and security teams keep public and private facilities secure with near real-time, actionable data from video content. The combined solution enh...
With system designers having so many options when it comes to specifying the most appropriate cameras to monitor large areas, Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, provides an overview of the merits of some of the most suitable camera formats. PTZ cameras PTZ cameras have traditionally been used for city and wide area surveillance applications such as airports, car parks, shopping centers, sports stadia and warehouses, with operators able to track the movement of objects and zoom in to observe close-up detail of any activity. The ability of an operator to proactively monitor an incident and zoom in to verify what is occurring, ensures they are able to quickly decide on the most appropriate response. Many PTZ cameras feature auto-tracking, as well as continuous pan and pre-set positioning In addition, many PTZ cameras feature auto-tracking, as well as continuous pan and pre-set positioning, which means that images of a moving object will be captured and recorded even when operators are distracted or are away from their workstations. The deterrent effect of PTZ cameras configured to automatically tour an area should also not be underestimated as they will create a strong impression to would be offenders that they are being watched, even if the images captured by the cameras are not being monitored in real-time. 8K cameras While it should be emphasized that PTZ cameras still have a big part to play in detecting anti-social or criminal activity, recent advances in video surveillance technology has meant that system designers now have the option to consider specifying other types of cameras which, depending on the application, might be more suitable. The sharpness and clarity of the images captured by 8K video surveillance cameras, for example, simply ‘need to be seen, to be believed’. In reality, very few users are likely to deploy 8K cameras with the intention of just monitoring an entire field of view. The value of these cameras comes from the fact that 8K is the equivalent of 16 x 1080p Full HD images and this means that a single camera can capture a vast amount of information, enabling operators to digitally zoom into a very small part of the scene without any pixilation of the image. Fixed or PTZ cameras For this reason, a soccer stadium is an excellent example of where an 8K camera can be put to very good use as it would be capable of capturing evidence grade images of 20,000 or more fans occupying a soccer stand. As such, its price/performance ratio makes the 8K camera a viable, cost-effective alternative to the deployment of multiple fixed or PTZ cameras. PTZ cameras are a lower price option and are ideal for when operators need to scan a wide area of view When it comes to deciding whether an ultra-high resolution 8K or PTZ is the best camera format for any given location, it will very much depend on what the end-user wishes to achieve. However, budget limitations also need to be taken into consideration. In simple terms, an 8K camera is a highly impressive, high performance option if there is a requirement to continually record a camera’s entire field of view at the same time that an operator might need to zoom into a specific area of interest. Video surveillance cameras However, PTZ cameras are a much lower price option and are ideal for when operators need to constantly scan a wide area of view, while having the flexibility when necessary, to quickly zoom in to see what may be occurring in greater detail. The case for PTZ cameras is further strengthened when real-time monitoring is more important than recording video for evidence purposes and equally important, the latest generation of PTZ cameras are equipped with adaptive IR technology which adjusts the angle of the camera’s built-in IR LEDs to match the level of zoom. Multi-directional cameras typically offer the capabilities of two, three or four video surveillance cameras in a single housing and yet, as they only have a single IP connection, one will only need to purchase one VMS license. Multi-streaming cameras Those equipped with two separate lenses are designed to capture high definition images of adjacent areas. Depending on the required field of view, there is a choice of interchangeable lens modules which can be easily fitted on site by an installation engineer. These multi-streaming cameras significantly reduce the costs which would normally be associated with installing two separate cameras to monitor, for example, an L-shaped area such as two sections of a corridor or two sides of a building. There are also multi-directional cameras available which feature four separate sensors There are also multi-directional cameras available which feature four separate sensors, with operators able to choose from a broad range of customizable angles and zoom settings per sensor. This offers cost savings for both system integrators and end users, as multi-sensor cameras use less cable, conduit and mounting hardware, compared to what would normally be required to enable up to four separate cameras to do the same job. With less network connections, they also require fewer switches. Built-in PTZ Designed for monitoring large open areas with just one camera, the images captured by the four sensors can be seamlessly stitched to produce a panoramic image covering up to 220° images. Life will also be much easier for installers if models equipped with motorized PTRZ gimbals are specified. These will reduce on-site times as they enable engineers to remotely pan, tilt and rotate the lens’ positions in order to set the camera’s field of view. It is worth noting that some manufacturers, such as Hanwha Techwin, offer 4 channel multi-sensor cameras with an additional integral PTZ camera. This can be configured to automatically zoom in and track a moving object or move to a user configured pre-set position when the motion detection function of one of the four camera sensors detects activity. 360⁰ cameras This addition of a PTZ camera means users are able to avoid incurring the higher capital, installation and maintenance costs of deploying 5 separate cameras to cover a large area, while achieving the same level of functionality. A single 360⁰ camera will quite often offer the most efficient and cost-effective way of monitoring a large area and particularly so when a number of standard cameras might normally be required to avoid any blind spots. Most 360⁰ or ‘fisheye’ cameras offer a variety of alternative viewing modes, including single panorama They also offer a compact option for retail stores and other environments where aesthetics is important. Savings can be achieved on maintenance costs compared to other types of cameras, as 360⁰ models have no moving parts. Most 360⁰ or ‘fisheye’ cameras offer a variety of alternative viewing modes, including single panorama, double panorama and quad views. Video management software They are also likely to feature a digital PTZ which allows operators to electronically pan, tilt and zoom in on specific areas for a more detailed view while continuing to monitor and record the whole 360-degree view. Some of the cameras will have onboard de-warping functionality. Where this is not the case, video management software, such as Wisenet WAVE, can be used to de-warp the fish-eye images. With so many different camera formats to choose from, consultants, system designers and integrators have an interesting challenge in deciding which cameras will best meet the requirements of a specific video surveillance project. To a large extent, the decision can be logically made with the help of the risk assessment process and by taking into account an end-user client’s operational requirements. High quality images PTZ cameras are likely to be strong contenders when the captured images are to be viewed in real-time An 8K camera, for example, would seem the obvious choice when there is a need to monitor large crowds of people in wide open areas, while multi-directional cameras are ideal for capturing images of adjacent areas. PTZ cameras are likely to be strong contenders when the captured images are to be viewed in real-time, as they will provide operators with a high level of control and enable them to proactively track the movement of people. Their greater deterrent effect should also not be underestimated. In reality, a combination of two or more of these types of cameras is likely to be required for most high security or mission critical applications and there is a multitude of other factors to be considered before deciding on the best cameras for a specific project. These include, for example, the required image resolution and if there is a need for the cameras to have built-in IR illumination so that they will capture high quality images regardless of the light levels. Various camera types The need for video analytics and whether the cameras have the ability to support third-party specialist applications should also be considered, as should bandwidth requirements. As always, the best advice is to work with manufacturers one believes that they can trust and ask them to provide live demonstrations of the various camera types. This will allow them to make informed judgements on which cameras have price/performance ratios that will match their specific requirements.
Green Hills Software, the pioneer in embedded safety and security, announces it has adopted the two new international security standards and regulations for automotive cybersecurity – ISO/SAE 21434 and UNECE WP.29 – for the INTEGRITY® real-time operating system (RTOS) and associated products and services. For decades, Green Hills has been helping electronics manufacturers create and deploy embedded systems at the highest levels of safety and security. By offering compliant products and associated evidence reports for these new standards, Green Hills will build upon its proven pedigree as the foundational run-time software provider trusted by OEMs and their Tier 1 suppliers for automotive electronics. Software-Defined services Utilizing these new security standards enables manufacturers to design and deploy purpose-built, secure, software-defined systems in connected vehicles, including highly automated driving, high performance compute clusters, domain controllers, vehicle gateways, telematics, keyless entry, diagnostic connections and electric vehicle charging stations, to name a few. As reliance on vehicle connectivity grows and demand for software-defined services rises, the risk of cyberattacks against connected vehicles continues to rise. With over 100 ECUs and hundreds of millions of lines of code, connected vehicles are a target-rich platform for cyberattacks. Malicious vehicle control A single exploited security vulnerability could put an entire fleet of vehicles at risk, numbering in the millions Multiple points of entry to modern connected vehicles provide opportunities for malicious vehicle control, fraud, and data-breaches that threaten companies, drivers, and road users. A single exploited security vulnerability could put an entire fleet of vehicles at risk, numbering in the millions. With nearly 80% of new cars connected to the internet, cybersecurity breaches have the potential to put billions of dollars in sales and lawsuits at risk – not to mention the damage to brand reputation. As a result, governmental bodies and independent regulators are drafting two related measures for managing cybersecurity threats throughout a connected vehicle’s lifecycle. Ensuring cybersecurity risks Green Hills is collaborating with its customers and adopting cybersecurity assessment policies for the following: The draft ISO/SAE 21434 ‘Road vehicles – Cybersecurity engineering’ Standard was recently published by SAE International and ISO (Organization for Standardization). It is a baseline for vehicle manufacturers and suppliers to ensure cybersecurity risks are managed efficiently and effectively from both a product lifecycle and organizational perspective spanning concept, development, production, operation, maintenance, and decommissioning. The WP.29 regulations from the United Nations Economic Commission for Europe (UNECE) make OEMs responsible for cybersecurity mitigation in four cybersecurity areas spanning the entire vehicle lifecycle: managing cyber risks; securing vehicles by design; detecting and responding to security incidents; and providing safe and secure over-the-air (OTA) software updates. While WP.29 defines concrete examples of threats and mitigations, OEMs can choose how they show the threats are addressed, such as complying with ISO/SAE 21434. The regulation is expected to be finalized in early 2021 and applied initially to many member nations including European nations, South Korea, UK, and Japan, and will likely influence vehicle homologation polices in the US, Canada and China. WP.29 will be legally binding within adopting countries, and while the ISO/SAE 21434 standard is not a regulation, it is expected to be widely accepted in the global industry like ISO 26262. Connected vehicle electronics “Connected cars bring significant risks and rewards to OEMs and their suppliers,” said Chris Rommel, Executive Vice President, IoT & Industrial Technology at VDC Research. “Green Hills has earned a high stature in the industry for supplying security-critical foundational software to companies building life-critical systems like aircraft avionics, vehicle ADAS and medical equipment, and its support of these new cybersecurity standards is noteworthy.” “ISO/SAE 21434 and WP.29 are valuable additional steps towards protecting connected vehicles from cybersecurity vulnerabilities,” said Dan Mender, VP of Business Development at Green Hills Software. “Green Hills has decades of experience developing and delivering security-certified technologies at the highest levels. Adopting these standards expands our offerings to global automotive OEMs and their suppliers bringing the industry’s leading secure software run-time environment to next-generation connected vehicle electronics.”
FLIR Systems, Inc. has announced the FLIR VS290-32, an industry-first, videoscope that combines thermal imaging and a visible camera specifically designed for safer and more efficient inspections of hard-to-reach underground utility vaults. FLIR VS290-32 videoscope The VS290-32 is the company’s first industrial-grade, electrical safety-rated, flexible dual-sensor videoscope on a replaceable, two-meter-long camera probe. For use in the most demanding environments, the VS290-32 is CAT IV 600 V safety rated for electrical inspections, along with an IP67-rated camera tip and IP54 base unit to protect against dust and water. The device features FLIR Systems’ patented Multi-Spectral Dynamic Imaging (MSX), which improves image clarity by embossing visual scene details onto full thermal images, providing crucial context to accurately and safely assess and identify potential issues to prevent blackouts and asset failures. Featuring low-profile tip and bright LED work light A low-profile tip and bright LED work light provides illumination for MSX in dark environments, including under manhole covers or in other tight spaces such as attics, within HVAC systems, and inside machinery. “The ruggedised and electrical-safety rated videoscope with MSX will drastically increase the ease of thermal inspections within tight, hard-to-reach places at power generation plants, power distribution systems, manufacturing facilities, and for public safety, and building diagnostics inspections,” said Rickard Lindvall, General Manager for Solutions Business at FLIR Systems. Equipped with FLIR Lepton thermal sensor The VS290-32 features a FLIR Lepton thermal sensor and offers the option of hot/cold color alarms The VS290-32 features a FLIR Lepton thermal sensor and offers the option of hot/cold color alarms, or isotherms, to quickly identify areas of concern across a temperature range from -10 to 400 degrees Celsius (14 to 752 degrees Fahrenheit). The device includes a dual battery charger along with lithium ion rechargeable batteries that each provides up to six hours of continuous use. Enhanced safety in vented manholes’ inspection “Safety is Con Edison’s top priority,” said Andrew Reid, Section Manager for Engineering and Analysis in Distribution Engineering at Con Edison, adding “This new tool allows our crews to safely, efficiently, and effectively inspect vented manholes and identify potential problems without having to remove the cover or even having to enter the structure.” Andrew further said, “This reduces the physical effort required by our crews, the time it takes to complete an inspection and enhances data collection activities to support our ongoing infrastructure planning and maintenance.”
Panasonic's PTZ camera range is the renowned remote production solution. They have been designed to deliver high-quality images with natural color reproduction, offer ease of use, and provide accurate and smooth camera movements. Panasonic continuously incorporates new features into its PTZ range to meet the changing production requirements - from the FreeD protocol to support AR/VR applications, to IP transmission protocols like high-bandwidth NDI, SRT and RTMP/RTMPS for stable video transmission and live streaming. Case study - Cathedral live streams Sunday mass The Liverpool Metropolitan Cathedral is the largest Catholic cathedral in England and recently upgraded their AV system to live stream their services to an online audience. The Panasonic AW-HN40 PTZ camera system was a perfect fit for this update due to their optical zoom capability, their NDI|HX output and ease of use. Case study - UHD virtual reality studio at RWE campus RWE created an UHD Virtual Studio for their Campus in Essen, Germany. The studio was installed by KST Moschkau GmbH and features 4 Panasonic AW-UE150 UHD PTZ cameras, the KST-CamBot.system and Zero Density's Reality Engine. This solution was employed as RWE relies heavily on TV production automation as they do not employ professional studio personnel. L.I.V.E. video series - smart live production One can follow the company’s Live Integrated Video Experience (L.I.V.E.) video series to find out more about the future of broadcasting. It showcases the ground-breaking capabilities of their technology in virtual studios and addresses the challenges of live production in a rapidly changing industry. This series include managing the move to remote production and the necessary workflow changes, enhancing the production value of live streamed content and the adoption of VR and AR technologies. In detail - Meet the UE100 One can watch the AW-UE100 webinar session to find out why the newest addition to the company’s wide PTZ line up meets the ever-increasing demand for high quality video content from cameras that can be operated remotely, with flexible and cost-effective operation. The 4K/60p capable camera supports high-bandwidth NDI, high-efficiency NDI|HX and SRT without the need for additional licenses, and includes a 12G-SDI output to support a wide array of shooting environments, from event live streams to studio production. EasyIP+ set up tool EasyIP+ is a free-to-download tool used to set up the company’s PTZ cameras with ease. This new tool has a host of new features, including a redesigned graphic user interface (GUI) with all key features in one centralized place, a new and improved camera list function, an Auto-IP Set-Up and firmware update functionality that informs the user about any updates automatically. One can find this and many other useful software updates on the Panasonic update page.
SAFR from RealNetworks, Inc. has announced a global partnership with German tech company G2K Group GmbH to revolutionize real-time video analytics. SAFR features including face recognition, mask detection, person detection, and demographic analysis have been integrated into Parsifal, a robust AI platform providing actionable video analytics for verticals such as retail, transportation, smart cities, and sports and entertainment. contactless temperature scanning SAFR’s mask detection and Parsifal’s contactless body temperature scan were key features that won G2K a contract from the Union of European Football Associations (UEFA) to provide entry screening for spectators attending the Super Cup Final 2020. “SAFR from RealNetworks’ partnership with G2K Group is characterized by the innovation, quality, and professionalism of both companies. SAFR’s computer vision features add critical data to the Parsifal platform enhancing the overall video analytics offering and unlocking new customer use cases such as mask detection,” said Jose Larrucea, Senior Vice President (SVP) EMEA & LATAM regions at RealNetworks. SAFR and Parsifal software integration SAFR’s high performance on live video makes it a natural fit for integration into Parsifal SAFR’s high performance on live video makes it a natural fit for integration into Parsifal, which relies on actionable real-time insights to improve general surveillance, behavioral predictions, access control, and response to COVID-19 health and safety measures. The first major deployment of Parsifal featuring SAFR was in September at the UEFA Super Cup Final 2020, in Budapest, Hungary, where a partial return of fans was tested under guidelines by the Hungarian Public Health Authorities. The SAFR-enabled Parsifal platform enabled more than 15,000 spectators to return to the stadium under the required health and safety conditions. Parsifal was deployed on cameras at each entry, performing rapid, automated fever scanning and mask detection while alerting attendants of any anomalies. Automated screening technology According to Andreas Schaer, Chief of Venue Operations for the Union of European Football Associations (UEFA), “The automated screening technology deployed by G2K helped UEFA and the Hungarian Football Federation deliver a safe and secure major football event with public attendance for the first time since the COVID-19 pandemic began.” Georg Von Rennenkampff, G2K Vice President for Partnership Management stated, “The cooperation with SAFR has reached its next stage with the very successful project with UEFA for the Super Cup Final 2020. The use of SAFR's highly accurate mask detection algorithm strengthened the overall Parsifal solution, making it better able to serve customers dealing with the realities of a global pandemic.” Georg adds, “G2K is looking forward to many more projects and further strengthening its prosperous partnership with SAFR.”
ISC West, in collaboration with premier sponsor, the Security Industry Association (SIA), has announced breaking news and guidance regarding ISC West 2021 event. The international security event was originally slated to be held March 23-26, 2021, but after extensive internal and external consultation and monitoring of the ongoing COVID-19 virus pandemic situation, they have made the decision to reschedule ISC West 2021. Rescheduled ISC West 2021 event The ISC West 2021 security event now will take place from July 19 to July 21, 2020, at The Venetian Resort and Sands Expo & Convention Center, in Las Vegas, Nevada. The organizers thank The Venetian Resort for their leadership, partnership and ongoing dedication to bringing the event back safely. They’re pleased to have a plan in place to host ISC West in 2021, and after a long respite, the ISC and SIA teams look forward to welcoming customers back to Las Vegas for strong education, demos, product announcements, awards ceremonies, networking opportunities, special events, and more. Now more than ever, the security industry’s integrators, installers, dealers, consultants and end-user practitioners have an essential services role, with heightened responsibility for protecting companies, employees, customers and the public. The 2021 event will further accelerate the convergence of security, public safety and health tech solutions, and chart the course for expanded levels of public-private sector cooperation and results. 2021 SIA Education@ISC West program The curriculum will include a new track on health and safety best practices in response to the COVID-19 pandemic The 2021 SIA Education@ISC West program will include an extensive schedule of physical security and converged security content, while also adding in key new topics. The curriculum will include a new track on health and safety best practises in response to the COVID-19 pandemic, including case studies and technology solutions that address employee/customer wellness and access control, business continuity, and facilities management. Plus, the 2021 event model will also offer a hybrid format, with both face-to-face conference pass and virtual conference pass options available, in order to serve the wide-reaching ISC community. The security and public safety community by nature is very face-to-face, with physical presence and engagement being the foundation of the business, solutions and professional diligence. Adherence to health and safety protocols To ensure that ISC West is the safest environment for a live event, the Reed Exhibitions Health & Safety Task Force, along with the expert team at the Sands Expo venue, will be ensuring that all key health and safety protocols and systems are in place for enhanced hygiene and cleaning, air conditioning and ventilation, physical distancing, PPE, health tech and health services. ISC West Topline Schedule: July 19-21, 2021: Monday, July 19: morning Keynote, Day 1 of SIA Education@ISC West, and Day 1 of the Expo Tuesday, July 20: morning Keynote, Day 2 of SIA Education@ISC West, and Day 2 of the Expo Wednesday, July 21: Women in Security/Diversity & Inclusion Breakfast and Keynote, Day 3 of SIA Education@ISC West, Day 3 of the Expo, plus a high-profile closing Keynote general session to wrap up the event
Every building starts with the entrance. A solid enterprise risk mitigation and security strategy include protecting that entrance. Often, risk mitigation strategies protecting the entrance have included high-resolution video surveillance cameras, video management systems, and access control solutions. But that strategy and set of security solutions only tells part of the story. Imagine a security guard who is protecting a facility after hours, when an individual approaches the entrance and seeks to gain access. The security guard can pull up the video surveillance feed and see the individual and his movements, which appear to be suspicious. But he also needs to hear him in order to decide the next decisions and actions. Does he escalate the situation, calling for backup and for first responders’ response, or does he allow the individual access to the building because he works there and is authorized to enter? Meet high-definition voice What the security guard needs is to be able to hear and to communicate with that individual. All enterprise security systems need three primary components in order to successfully protect the entrance and to mitigate risk – access control, video surveillance, and the ability to hear and communicate. Each component plays an integral role in supporting a unified security system, and without all three, the security system is not complete. Access control can be thought of as the brains of a security system by holding data and permissions. It serves as the arms and hands of the system; it can either keep someone out or invite them in. IP video allows a security team to remotely position a set of eyes anywhere an IP camera can be placed on a network. With a video management system, security teams can see what is happening and decide how to respond. However, with remote viewing, the event may be over by the time security physically responds. Audio adds interactivity That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides value. It also means that security is interactive. Security teams talk and listen to the person that’s seen on a video surveillance system, no matter where the location or how remote. If the person is lost or simply needs assistance, security personnel can talk to them and provide direction and reassurance. Even more, in an emergency, an interactive solution becomes a critical life-saving tool, as it provides data that can be shared between security, police, emergency services, and more. Audio can also detect voices, noises, breaking glass, or other sounds that are not within direct view of a video camera. An interactive security system creates an informed response, by providing real-time situation awareness management. Post-event, it supports forensics and investigations to mitigate future security incidents. Audio and COVID-19 We are living in extraordinary times. As businesses begin to reopen and stay open, they are looking for any tools that can help them overcome the enormous challenges they face. In buildings and facilities, the COVID-19 pandemic has created a new security perimeter, one that demands contactless access with entry and exit, and that has also created a new duty of care for security professionals. Now more than ever is the need to interact and communicate with individuals moving in and out of doors and spaces without physical intervention. Intelligent communications, integrated with contactless access control, can help a business to comply with pandemic safety guidelines and ultimately, reopen for business and stay open. COVID-19 has also increased the need for clean-room isolation and quarantine spaces, sometimes in areas not originally intended for that use, where risk of infection is high, and equipment must be easily disinfected between patients. Here, purpose-built cleanroom intercoms, providing clear touchless communications despite the noisy environment, have emerged as critical tools for enabling patient care while reducing the need to enter the contaminated space. For example, voice communication can enable hospital staff to verify identity and to communicate with patients without entering the isolated and infectious environment, which can save on personal protective equipment (PPE) and reduce the amount of exposure to the virus. In non-emergency healthcare facilities, such as medical centers, voice can effectively relay information to building occupants and visitors for screening purposes. Visitors can be seen and heard. For example, a patient who seeks access to a medical center for an appointment can hear important instructions from a nurse via the intercom solution. Seeing the person that you talk to is one thing but hearing them conveys a much better sense of closeness, making it possible to maintain a high level of security and customer service. The whole story Today’s security systems should no longer simply involve video surveillance cameras generating feedback and images to a security guard. Instead, a new ecosystem for enterprise security and risk mitigation has emerged, and it’s one that involves video surveillance, access control, and high-definition voice. That ecosystem can ensure well-rounded and responsive information management and security platform, all communicating with each other and offering actionable insight into risks and potential physical breaches. Audio is the new value hub of the connected and intelligent school, campus, building, correctional facility, and more. Simply put, a silent security system cannot be an effective security system. In every situation, it is crucial for all security professionals to mitigate risk, no matter what they are protecting. This emphasizes the need to hear, be heard, and be understood in virtually any environment.
The coronavirus pandemic has brought about an unprecedented crisis for businesses and individuals. It has also created a new normal, notwithstanding the disruption to our lives, ultimately changing life as we knew it. However, our resilience as humans will ensure that we survive and become better, stronger, and more determined than ever before. As I mentioned, both businesses and individuals have struggled significantly to balance the need for safety versus survival. But at AxxonSoft, we remain committed to keeping our people safe, while ensuring that our support and commitment to our clients are not compromised. Ensuring business continuity At AxxonSoft, our vision has always been to ensure business continuity through enhanced safety and video surveillance offerings. Adhering to the COVID-19 regulations, we are prescribing to social distancing to slow the spread of the virus. As such, we are utilising this time to ensure that our service offering is optimized to afford our clients the ability to repurpose and extend their remote working viabilities. As an essential service provider, we have ensured that we are providing the right tools to our clients to comply with regulations. Our video analytics and face recognition services have no reliance on on-site control rooms and, therefore, clients’ security solutions and personal safety are not compromised. Innovation reimagined During these precarious times, our focus remains on support and service. Our development team continues to work tirelessly to ensure that you can use our software during the lockdown and have accelerated innovation to this end. While we must maintain social distancing, we can and will still be of service to our community Therefore, we are proud to present version 4.11 of the Intellect PSIM, which offers our clients a neural network-based analytical tracker which recognises specific types of objects, such as humans and vehicles. We have also equipped this version with video wall management interface, automatic object tracking and a web reporting subsystem. Behavioral analytics generates data by detecting specific postures, like crouching, shooting or any potentially dangerous scenario. Our surveillance software operates on a three-pronged approach: calibration, detection and measurement, offering a comprehensive bird’s-eye view to clients. This upgrade also upholds mandated social distancing measures and keeps any face-to-face meetings to a minimal. The silver lining is that you can even use this technology when the pandemic is over. Now that’s what I call experiencing the next with AxxonSoft! Finding solutions to the challenges Our specialist technology and frontline technical support staff will ensure that your business is protected during and post-lockdown. We will continue to ensure that we provide solutions to the new challenges that the coronavirus brings, ensuring that our clients can emerge stronger and more responsive to any changes in the future. Our surveillance software operates on a three-pronged approach: calibration, detection and measurement While we must maintain social distancing, we can and will still be of service to our community. After all, change is not just about technology but about mastering mindsets. The COVID-19 disaster has demanded that businesses embrace tech disruptions as early as possible and apply technology in imaginative ways to define the new world of work. Until next time, stay safe!
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorized parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorized personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilizers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Combining artificial intelligence (AI) with cloud video creates systems that are smarter, safer and more cost-effective. Furthermore, adding AI capabilities can widen the advantage gap of cloud video systems compared to on-premise systems, especially for cost-conscious end users. “We strongly believe the total cost of ownership (TCO) for cloud systems is more affordable,” says Ken Francis, President of cloud video surveillance company Eagle Eye Networks. “And introducing really powerful AI will expand the cost differences.” Combining AI and cloud video To finance realization of their vision to combine AI and cloud video, Eagle Eye Networks has raised $40 million of Series E funding from venture capital firm Accel. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end users,” says Francis. In effect, end users have maximum flexibility to manage and analyze their video data however they wish The system sends captured video to the cloud, where a variety of AI or video analytics systems can extract valuable data from the captured video. Eagle Eye offers an application programing interface (API) to enable integration of best-in-breed third-party AI and analytics systems to leverage the video. In effect, end users have maximum flexibility to manage and analyze their video data however they wish. Delivering lower costs In addition to offering integration with third-party systems, Eagle Eye is investing in its own AI development, and hiring additional development and customer service personnel. As new technologies become part of the Eagle Eye platform, customers benefit from lower costs because of economies of scale. Keeping the emphasis on development of cloud systems, Eagle Eye also offers customers maximum flexibility in choosing their cameras. Eagle Eye’s on-premise cyber-hardened “bridge” can connect to almost any camera from thousands of manufacturers, including those connecting with HD-over-coax. The COVID-19 pandemic has expanded the need for end users to view their premises remotely, and in the process has highlighted shortcomings of their existing video systems. As a result, video manufacturers - including Eagle Eye Networks - are seeing a surge in end users updating their systems. Cloud video surveillance Given the costs of installing and maintaining hard drives for local storage (and additional challenges during a pandemic lockdown), more end users are opting to use cloud systems. In effect, the COVID-19 pandemic is accelerating installation of cloud video surveillance. “Our industry is the most resilient in the world,” says Francis. Eagle Eye Networks was on track to double their growth in the first quarter, and then COVID slowed everything down As a whole, 2020 has been a successful year for the cloud system provider. Eagle Eye Networks was on track to double their growth in the first quarter, and then the COVID lockdown slowed everything down. During the second quarter, their revenue from setup fees and appliances fell by 35% or so, but subscriptions increased slightly including customers looking to keep watch over their shuttered businesses. Temperature alerting solutions The third quarter saw another big uptick in business; August and September were booming, and not just from projects that were delayed from Q2. There has also been a spike in customers looking to apply temperature alerting solutions, says Francis. In uncertain economic times, cloud systems require around 40% less up-front costs, and provide flexibility to eliminate the system (and the expense) at any time without losing a large financial investment. Cloud video has reached a tipping point in the United States, Mexico, and the United Kingdom, among other locales, but the technology lags in some other geographic areas such as France. Driving adoption is availability and cost of sufficient upload speed and bandwidth. In addition to Eagle Eye’s branded growth, the company also provides the OEM engine behind a half dozen or so cloud systems offered by other manufacturers. Backing multi-site enteprises About eight years old, Eagle Eye Networks has focused squarely on the small- and middle-sized business (SMB) market, especially multi-site businesses such as retail, banking and healthcare. They also work with local governments and K-12 schools. Moving forward, the company will seek to expand more into multi-site enterprise customers, some of which have 1,000 locations around the world and need to store their video locally to meet regulatory requirements. Multi-site businesses, benefit from the cloud by eliminating the need for local IT equipment and expensive staff Multi-site businesses, especially, benefit from the cloud by eliminating the need for local IT equipment and expensive staff. As Internet connectivity becomes less expensive than installing new cable infrastructure, cloud systems will become more attractive to large campus environments such as colleges and airports, says Francis. The advent of 5G connectivity will also be a plus. All Eagle Eye products are NDAA compliant. Premium support services Further expanding its services, Eagle Eye Networks is poised to launch “Premium Support Services,” in which the cloud provider’s employees will proactively monitor and service customer sites for a minimum additional monthly fee. The cloud structure enables most problems to be addressed and solved remotely without needing to send personnel to a site. The new investment from Accel, a funding partner of top-tier tech companies such as Facebook, Dropbox and Spotify, is Accel's first investment in the security industry. In addition to investing in AI, Eagle Eye also plans to leverage the funding to expand into new regional markets with new data centers and additional staff in business development, sales and support roles.
Facial recognition is becoming more popular in newer systems for access control — a shift that began before the pandemic and has intensified with a market shift toward “touchless” systems. A new facial recognition platform is emerging that responds to the access control industry’s increased interest in facial recognition by expanding the concept with a new higher level of technology. At the core of the new system is high-performance, true-3D sensing with facial depth map processing at low power consumption, which enriches the capabilities of small-footprint access control devices. New proficiencies include anti-spoofing (preventing the use of a 2D photo of an authorized user to gain entry) and anti-tailgating (preventing an unauthorized person from gaining entry by following an authorized user) in real time and in challenging lighting conditions. The system uses “true 3D sensing,” which incorporates single-camera structured-light 3D sensing—as opposed to dual-camera depth sensing or IR video imaging-based approaches. AI vision processing and 3D sensing technologies The new “Janus reference design” incorporates AI vision processing, 3D sensing technologies, and RGB-IR CMOS image sensor technologies from Ambarella, Lumentum and ON Semiconductor. Specifically, Lumentum’s high-reliability, high-density VCSEL projector for 3D sensing combines with ON Semiconductor’s RGB-IR CMOS image sensor and Ambarella’s powerful AI vision system on chip (SoC). The Ambarella, Lumentum, and ON Semiconductor engineering teams worked together to incorporate their complementary technologies into the reference design. A reference design offers OEM product and engineering teams a fully functional engineering reference implementation that they can use as the basis for their own product. Teams will often customize a reference design with their choice of various third-party hardware components to fit their product specifications and positioning. They might also integrate their own software, algorithms, and back-end system integrations. The advantage to this approach is that the manufacturer can get to market quickly with a next-generation product that emphasises their core strengths. 3D depth information for facial recognition Generally, it takes between nine months and a year for a manufacturer to get to market using a fully functional reference design, such as the one developed jointly by Ambarella, Lumentum and ON Semiconductor. The Janus platform leverages 3D depth information generated via structured light for facial recognition with a >99% recognition accuracy rate. Traditional 2D-based solutions are prone to false acceptance and presentation attacks, whereas 3D sensing delivers advanced security—just as mobile phones use true-depth cameras for facial recognition. 3D facial recognition also significantly reduces the gender and ethnic biases demonstrated by some 2D facial recognition solutions. The Janus reference design is also aimed at future smart locks for enterprise and residential use: its unique single-camera 3D sensing solution will help OEMs overcome cost and manufacturability barriers, while the ultra-low power edge AI capability can effectively extend the battery life, which in turn reduces maintenance cost. Video security and access control Ambarella sees touchless access control, as well as the convergence of video security and access control, as the mega-trends driving industry innovation and growth—using video, computer vision, and 3D sensing to not only address safety and security, but also to improve the user experience and public health, says William Xu, director of marketing for Ambarella. The convergence of video security cameras and access control readers has been widely discussed by leading access control OEMs. In many cases, they already integrate video security cameras, readers, door controllers, cloud-access, and the like. In most enterprise installations, one would typically find security cameras installed where there are access control readers. Combining the two devices significantly reduces the maintenance cost and system complexity. “In comparison to fingerprint or other contact-based approaches, Janus-based access control is touchless—requiring no physical contact with authentication hardware such as fingerprint sensors or keypads—reducing infection risk while enabling a seamless experience,” says Mr. Xu. “The Janus platform provides true 3D depth information to prevent unauthorized individuals from mimicking legitimate users, and the advanced embedded AI processor enables tracking and anti-tailgating algorithms. Janus-based devices perform well in challenging lighting conditions and they are capable of authenticating multiple users simultaneously, with imperceptible latency.” Access Control and public health What was once purely a security challenge—namely, how to prevent unauthorized entry into a restricted area—has evolved into a public health challenge as well. Many traditional access control methods, from number pads to fingerprint readers, require touch in order to function, and if the current global pandemic has made one thing evident, it’s that minimizing physical contact between users and surfaces is vital to community well-being. Janus was originally designed to facilitate the next generation of facial-recognition-based access control readers—enabling 3D sensing and high recognition speed for seamless authentication. COVID-19 has accelerated industry-wide research, development, and timelines for Janus-based solutions, says Mr. Xu. Deep learning and artificial intelligence drive all the new capabilities offered in Janus—capabilities that are only possible due to the platform’s high computational horsepower. The core deep learning and AI capabilities of Janus enable a wide range of advanced features only possible with an embedded vision SoC, says Mr. Xu. All are performed in real time, even when multiple users are being processed simultaneously. These include the extraction and comparison of facial depth maps with those registered in the system; 3D liveness detection, ensuring that the system can distinguish between real users and photo or video playback attacks; anti-tailgating, which relies on computer vision algorithms to detect and track when an unauthorized person follows a legitimate user inside; face mask detection; and people counting. VCSEL technology According to Ken Huang, Director of Product Line Management, 3D Sensing, Lumentum: “Lumentum’s VCSEL technology is one of the Janus design’s core strengths and differentiators. The process begins when Lumentum’s high-resolution dot projector projects thousands of dots onto the scene to create a unique 3D depth pattern of a user’s face. Most traditional biometric facial security systems rely on 2D images of users—simple photographs—which reduces authentication accuracy. In contrast, the 3D depth map generated by Lumentum’s technology provides the foundation of a more accurate, more secure, and more intelligent system overall. In addition, Lumentum’s VCSEL solutions incorporate a Class 1, eye-safe laser with zero field failures to date.” Adds Paige Peng, Product Marketing Manager, Commercial Sensing Division, ON Semiconductor: “If we think of Ambarella’s CV25 as the brain of the Janus design, the AR0237IR from ON Semiconductor is the eye. The AR0237IR image sensor captures the information, and the CV25 processes it. Other face recognition systems use two “eyes” – one to recognize RGB patterns to generate the viewing image stream, and another IR module to detect liveliness in motion. The Janus solution leverages a single “eye”—the AR0237IR—to obtain both visible and infrared images for depth sensing and advanced algorithms such as anti-spoofing and 3D recognition. AR0237IR also provides good sensitivity in various lighting conditions and supports high-dynamic-range (HDR) functions.” The single-camera 3D sensing solution for access control operates in three seamless steps: Step 1: Lumentum’s high-resolution dot projector creates a unique 3D depth map of a user’s face; Step 2: ON Semiconductor’s RGB-IR image sensor captures the high-resolution images from Step 1, even in low-light or high dynamic range conditions; Step 3: Ambarella’s advanced vision SoC takes the high-resolution images captured in Step 2 and uses deep neural networks (DNNs) for depth processing, facial recognition, anti-tailgating, and anti-spoofing while video encoding and network software run simultaneously.
Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects). The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” Federal rules Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government. Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking. “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment. Limits and prohibitions The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems. Security Industry Association (SIA) The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.” Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. Easing compliance burdens The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess. The 'blacklist' The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts. A growing threat Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.” SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.” SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.” The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.
One of the key problems in airport security is the sheer size of the perimeter and a large number of incidents are in fact linked to unauthorized access onto the airfield, either runways or where aircrafts are being loaded or refueled posing an extremely high risk. Most airports will combine multiple sensors and technologies to protect the actual perimeter fence and even beyond the perimeter fence, to warn of potential threats. OPTEX LiDAR sensor integration with RSA module Some airports have found the level of information generated by the perimeter security systems quite challenging to deal with and they wanted to decrease the number of events so operators could focus on what was critical. The Airport development team at Genetec integrated the OPTEX LiDAR sensor into their Restricted Security Area (RSA) Surveillance module, an extension of the Genetec Security Center platform with the purpose to unify data from the sensor and camera to present more meaningful information to the operators. Restricted Security Area Surveillance module The RSA module has been designed specifically with a view to providing wide area protection The RSA module has been designed specifically with a view to providing wide area protection and integrating with wide area surveillance technology, including radar, fiber optic and laser detection devices. The solution allows security staff to determine the level of threat for each area, map them, and utilize OPTEX technologies to identify and locate quickly and precisely the point of intrusion. For instance, with Fiber optic fence sensor, zones can be 100m-200m long and will identify people cutting through a fence, crawling under or climbing over. Newer fiber technologies provide point location. Another way to pin-point exact intruder location is with OPTEX LiDAR technologies or with Radar. ‘Fuse’ data into a single event A particularly intelligent feature of the system is its ability to ‘fuse’ data (known as ‘target fusion’) coming from multiple sources and confirm an event as a single (i.e. the same) activity rather than a multiple threat. For instance, using the X&Y coordinates provided by OPTEX REDSCAN sensors, RSA allows to map exactly the path of the intruders or moving vehicles, fuses the path from one camera to the other and considers it as one event, one target and tracks it precisely on the map. Intelligent Tracking and event categorization This gives a more meaningful picture to the operator and presents events in a unified and intelligent way. This helps support the security team in making the right decisions. The deeper integration of OPTEX’s technologies into Genetec’s RSA platform enables intelligent tracking and event categorization, making it a very precise security system for airports.
One of the largest public train operators in the United Kingdom, Southeastern Rail Network, now relies on a smart video security solution from Bosch Security Systems to secure twelve train depots, including five unmanned locations, against theft and intrusion. The fully digital video surveillance system presents a significant upgrade to the British train operating company, which provides train services between London, Kent and parts of East Sussex and transports 6, 40,000 passengers each weekday on its 392 trains. built-in Intelligent Video Analytics Powered by cameras featuring built-in Intelligent Video Analytics, the solution was installed and configured to the specific requirements at the train depots by Bosch integration partner, Taylor Technology Systems Ltd., over the course of six months. Video security system relies on machine learning algorithms to automatically sound alarms on security threats Fully operational at all twelve locations, the video security system relies on machine learning algorithms to automatically sound alarms on security threats, such as intruders and perimeter breaches. Beyond security applications, the system also tracks important metadata on the arrival times of trains, while also monitoring deliveries at the train depots, among other AI-assisted functions that it carries out. IP-based cameras with Starlight technology The cameras portfolio installed across the twelve depots replaces an analog legacy solution with IP-based security cameras from the Flexidome, Dinion, and Autodome product lines of Bosch Security Systems. These smart cameras include Bosch’s Intelligent Video Analytics capabilities as a built-in feature, ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Because night-time security and surveillance is critical, especially at the five unmanned train depots on the network, the Bosch cameras rely on Starlight technology to provide full intelligent analytics at night and in low light levels. The Starlight technology supports color filtering down to a light level of only 0.0077 lux, so as to deliver detailed monochrome images where other cameras show no image at all, and guard against intruders and unauthorized entry around the clock. Featuring digital ‘trip wire’ to counter false alarms Highly resilient against false alarms, the smart cameras can detect movement at the perimeters of the train depots using a digital ‘trip wire’. In case of a security breach, the system alerts Southeastern Rail Network’s watch personnel, who can view live camera footage, as well as recordings of incidents for heightened situational awareness and total perimeter security. Instead of relying on the pre-configured capabilities, such as vehicle tracking and more, security personnel can also use the built-in camera trainer function to ‘teach’ new functionality, such as detecting certain types of objects or situations. Remote video recordings storage with Divar recorders Recordings from the depots are safely stored and managed remotely with Divar recorders in encrypted format As an integral part of this end-to-end Bosch security solution, recordings from the depots are safely stored and managed remotely, using Divar all-in-one recorders in encrypted format. When looking at the bigger picture, the video security solution adopted by Southeastern Rail Network is part of an industry-wide evolution from cameras as mere video capturing devices to smart sensors capable of collecting rich metadata. Insights beyond security This metadata unlocks unique insights beyond security, including video analytics at the train depots that support applications such as monitoring deliveries to onsite buildings, providing access to personnel and logging the arrival and departure times of incoming trains. The system thereby not only ensures that all train depots remain fully guarded and protected 24/7 against criminal access, but also provides a data-based foundation to keep efficiency gains and cost savings on track in the long run.
Since its completion in 2017, the Gazprom Arena has served as the home ground stadium for the Russian football club Zenit St. Petersburg. And as one of the host stadiums for the 2018 FIFA World Cup and the 2021 Euro Football Championship, the Gazprom Arena must also satisfy the strict security regulations of FIFA, UEFA and ESSMA. When selecting the video security system, the managers responsible at Zenit therefore opted for a solution from the German manufacturer Dallmeier. With its patented Panomera multifocal-sensor system, Dallmeier guarantees the security of many stadiums all over the world. The objective was providing coverage with video security technology for the entire area surrounding the stadium, the entrance gate approaches, the rooms below grand stands, and the grand stands themselves in one of the largest video security projects ever undertaken in a football stadium. Video security system Under enormous time pressure, a high-performance system had to be implemented in the stadium with a capacity of 60,000 fans and yet had to remain adaptable and flexible in response to changing customer wishes as the project progressed. One requirement which from time to time presented the greatest challenge was capturing all areas of all the grand stands all of the time, so that unequivocal identification of offenders could be assured in all circumstances. In order to achieve this, the Russian Interior Ministry stipulated two key requirements for the video security system: Firstly, it must capture the entire grand stand area with a "minimum resolution density" of 250 pixels per meter (px/m). This also corresponds to the performance criterion defined in the globally valid standard DIN EN 62676-4 for video security systems for purposes of enabling identification of an unknown person. Minimum resolution density A Dallmeier video security system has already been operating in the Petrovsky Stadium since 2012 And secondly, the image frequency must not fall below a frame rate of 25 frames per second (fps). Because it is typically only the combination of the specified minimum resolution density and a fluid representation of events that can ensure incontestable evidence that is usable in a court of law. In order to meet these stringent requirements, the security managers invited a number of vendors to present their solutions in advance at Zenit's former home ground - the Petrovsky Stadium - to enable them to choose the right solution for the Gazprom Arena. A Dallmeier video security system has already been operating in the Petrovsky Stadium since 2012, and after a thorough evaluation of all the solutions, the operators decided to install a stadium solution from Dallmeier in the Gazprom Arena as well. Multifocal-sensor system Because compared with conventional camera technologies such as megapixel or PTZ cameras for example, the patented Panomera multifocal-sensor system from Dallmeier can guarantee coverage of even the largest expanses with the stipulated minimum resolution density and frame rate. And Panomera systems continuously capture everything that is happening in full resolution and allow high-resolution zooms - both live and in the recording and by several operators at the same time. This enables stadium operators to track and reconstruct relevant occurrences in detail both live and after the fact. Besides the technical superiority of the Panomera technology, another decisive advantage of the Dallmeier stadium solution was the innovative 3D planning approach, with which a digital reproduction of the Gazprom Arena was created. Conventional single-sensor cameras This makes it very easy to fulfill the requirement according to which at least 250 px/m must be assured literally "in every last corner": color coding in the 3D simulation makes it possible to see exactly where the value has been reached and where a correction should be made, perhaps by setting up in a another position or using a different camera model. An alternative solution would have required a substantial four-figure number of conventional single-sensor cameras A further major advantage of this planning approach is the extreme efficiency of the solution: For example, Zenit St. Petersburg is able to provide security on the terraces throughout the Gazprom Arena with way less than 100 Panomera camera systems, covering all areas with at least 250 px/m and 25 fps. An alternative solution would have required a substantial four-figure number of conventional single-sensor cameras. Minimizes uncertainty factors Apart from enormously high infrastructure costs (masts, cables, etc.) this would also have generated a practically unmanageable deluge of images for the video system operators. Another benefit of Dallmeier's 3D planning program is the automatic generation of "CamCards" - exact configuration documents for every single camera. Armed with this information, installers on site know exactly which camera must be mounted where, how high and at what angle. The big advantage besides the immense amount of time saved consists in the planning reliability: It can be predicted with great accuracy how much labor the installation of the total solution with entail, because this approach minimizes uncertainty factors. Total storage capacity Thanks to Dallmeier's unwavering assistance throughout the project, testing by the state technical personnel in Russia was also successful in the subsequent project phases, with the result that the stadium operators were able to begin operating the video security system after final project commissioning in good time for the 2018 FIFA World Cup. The total storage capacity for the video security system amounts to more than six petabytes Recently, over 1,000 single-sensor cameras have been installed in the Gazprom Arena in addition to the Panomera systems - these safeguard the remaining areas of the stadium. Due to the large number of cameras, the total storage capacity for the video security system amounts to more than six petabytes (equivalent to about 6,000 TB). High-performance recording appliances from Dallmeier are used to process this information. Largest stadium project Authorized personnel from various departments and stakeholders can access the system at 80 workstations. The video security system from Dallmeier has provided ample evidence of its performance capabilities and reliability in the running of the Gazprom Arena, not least during the seven matches of the 2018 FIFA World Cup. On this subject, Karlheinz Biersack, Director Sales Eastern Europe/RUS/GUS at Dallmeier explains: "Of course we were delighted that the security managers of Zenit St. Petersburg also decided to rely on Dallmeier again for their new home, the Gazprom Arena. This success in the largest stadium project we have ever undertaken shows once again that Dallmeier's holistic security and solution approach - above all the patented Panomera technology and our unrivalled project and consulting services represent an immense benefit for our customers."
ZeroEyes, the only AI-based platform focused solely on weapons detection, has been selected by the Kenosha Unified School District (KUSD) of Wisconsin to help improve security on its campuses. ZeroEyes proprietary solution ZeroEyes’ proprietary solution will identify visible guns if present and send alerts to school administrators and security personnel within three to five seconds, helping to stop violent threats before they occur. KUSD is the third-largest school district in Wisconsin, with over 21,000 students and 4,200 employees in 23 elementary schools, five middle schools, five high schools and five charter schools. Integration with IP security cameras ZeroEyes currently integrates with KUSD’s IP security cameras to help detect visible weapons and serve as a proactive measure to prevent any violent threats on campus. When ZeroEyes positively detects a weapon, the platform sends a notification to school administrators, school resource officers and local 911 dispatch, ensuring the school can enact security protocols and give first responders real-time information to help prevent active shooting tragedies and save lives. Enhancing staff and students’ security “It’s a grim reality that active shootings happen in schools across the country, and we’ve needed to understand and implement the solutions that can keep our students, staff and visitors safe,” said Kevin Christoun, Maintenance, Environmental and Safety Manager at KUSD. Kevin adds, “At KUSD, we have a multi-layered security approach that includes the most effective and innovative technologies and resources, and ZeroEyes’ platform clearly supports our strategy.” Weapons detection solution ZeroEyes proprietary and comprehensive datasets focus exclusively on weapons detection Founded by a group of former Navy SEALs and military veterans, ZeroEyes proprietary and comprehensive datasets focus exclusively on weapons detection, to actively monitor and detect for visible weapons. ZeroEyes also trains and collaborates with customers and local first responders to conduct extensive pilots before its solution is fully implemented. In the future, KUSD plans to roll out additional installations to remaining schools in the district. Effectively countering active shooting incidents “ZeroEyes was founded upon the realization that a proactive solution was needed to help keep people safe, with real-time information to adequately address violent threats and prevent mass shooting tragedies,” said Dustin Brooks, Vice President of Education at ZeroEyes. Dustin adds, “KUSD focuses on providing a safe and productive learning environment to its students and faculty, and we’re honored to provide a 24/7 solution that supports their goals.”
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defense system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor center. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, has announced that Olymbec, globally renowned privately owned industrial real estate holder on the US East Coast and Canada, has chosen Hanwha cameras to help secure its properties and improve rentability. Managing upwards of 300 properties in Quebec, Canada and 15 different states in the US, Olymbec owns more than 30 million square feet of property. Managing this much real estate means that Olymbec has to balance a variety of concerns, including providing positive tenant experiences, generating revenue, and protecting assets. Countering growing cases of theft and vandalism Olymbec’s existing analog-based camera systems were not meeting the company’s needs When it comes to security, the company is faced with everything from accidental damage and theft to vandalism and refuse dumping both inside and outside their buildings. However, Olymbec’s existing analog-based camera systems were not meeting the company’s needs. After looking at a number of different options, the company chose Hanwha Techwin because of the range of products, the modularity of the solutions the excellent training and customer support, and the cost, which allows Olymbec to add components easily. Hanwha Techwin cameras deployed Olymbec has deployed over 700 operational cameras and carries stock for both replacement purposes and new systems. The deployed cameras are connected to either a Wisenet WAVE VMS system in their larger installations or to NVRs in their smaller installations. Through their VPN, everyone at Olymbec, from the Chief Technology Officer (CTO) to security personnel and property managers, can access video footage from every security camera remotely from their smartphones and tablets. Remote video footage access This allows security administrators to view footage from anywhere, at any time and gives them the flexibility to react quickly and appropriately, when an incident occurs. Hanwha cameras have the capability to trigger alerts and alert security personnel, based on a variety of rules such as detecting motion after hours. Olymbec has spent approximately three-fourth of a million dollars on equipment from Hanwha Techwin to deploy its new security infrastructure. The result is a robust, homogenous environment that makes it easy to manage and add new camera systems to the company’s various properties. Multi-sensor, multi-directional cameras installed Hanwha Techwin cameras are used as deterrent or after-the-fact security devices for investigative purposes The Hanwha Techwin cameras are used as deterrent or after-the-fact security devices for investigative purposes. This means that Olymbec relies heavily on the quality of the video feed. To capture the best possible video, Olymbec decided to go with multi-sensor, multi-directional cameras, which are deployed across the company’s properties allowing them to cover a very wide area with just a single device. The multi-sensor cameras also work very well when the time comes to pull the video footage for investigation. This is especially helpful because Olymbec’s security department receives video requests from law enforcement at least 4-5 times a month. Reliable and flexible video security system “Using our new security system, we are able to ensure the integrity of our video evidence. This is important when local law enforcement asks us for footage to help with an investigation,” said Jack Ross, Chief Technology Officer (CTO) at Olymbec USA & Canada. The company, Olymbec has stated that they remain enthusiastic about their decision to install more number of Hanwha Techwin cameras across their various properties in the US and Canada. “It was important for us to choose a platform that is both complex enough to meet our needs and reliable enough to set up and simply let run. When it comes to reliability, as well as flexibility and ease-of-use, I think Hanwha Techwin really shines,” concludes Jack Ross.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
Video surveillance equipment: Manufacturers & Suppliers
- Seagate Video surveillance equipment
- Bosch Video surveillance equipment
- Messoa Video surveillance equipment
- ComNet Video surveillance equipment
- NVT Video surveillance equipment
- Dahua Technology Video surveillance equipment
- Hikvision Video surveillance equipment
- LILIN Video surveillance equipment
- Teleste Video surveillance equipment
- FLIR Systems Video surveillance equipment
- Video Storage Solutions Video surveillance equipment
- Tamron Video surveillance equipment