Video surveillance equipment
Quantum Corporation announces it has completed its acquisition of the ActiveScale™ object storage business from Western Digital Technologies, Inc., a subsidiary of Western Digital Corp. The acquisition expands Quantum’s leadership role in storing and managing video and other unstructured data using a software-defined approach. Jamie Lerner, President and CEO, Quantum commented, “The strategic acquisition of ActiveScale bolsters our existing product portfolio and expands our ad...
Arecont Vision Costar (AV Costar), a globally renowned IP-based megapixel camera technology and video surveillance solutions provider, has unveiled multiple high performance cameras for the ConteraIP megapixel (MP) series. The four new models build upon the high performance, superior image quality, outstanding reliability, ease of installation, and competitive pricing that are the hallmarks of ConteraIP. “We’ve taken the most in-demand form factors from our proven MegaIP single, dua...
Intinor, global developer of products and solutions for high quality video over the internet, will attend NAB 2020 Show (Las Vegas Convention Center, date to be rearranged) to showcase its uniquely powerful solutions to both combine as many as eight individual video feeds, and stream them synchronously across multiple internet paths. A strong supporter of NDI, Intinor will be co-exhibiting with NewTek on booth SL4711. Coherent video path over internet The Intinor solution creates a coherent vi...
IP Communications enabler Softil announces that its BEEHD technology has been selected by Fujitsu Spain to build the ARCONTE Trial Recording System. The multilingual, secure, modular and adaptable digital recording system will allow courts to work more quickly, transparently, and cost-efficiently. The system also ensures compliance with strict mandatory data requirements across Europe, Middle East, India and African (EMEIA) jurisdictions where courts are legally required to record and store lega...
Percepto, the global company for autonomous industrial drone solutions, has announced the appointment of Amit Musli to the role of Vice President of Sales. Amit Musli will build on the success Percepto has achieved in the past 12 months, during which time the company has grown its customer-base across four continents and 10 countries – providing aerial insights for organizations (including Fortune 500 and the top ASX) in mining, oil & gas, solar and thermoelectric power industries. I...
The new open and modular video system platform MOBOTIX 7 changes the way video surveillance and video analytics are used. With an ever increasing portfolio of hardware, software and intelligent solutions, MOBOTIX applications are not only solutions for current requirements but also scalable for the future needs of various industries. MOBOTIX 7 video system platform The main areas of focus are the utilities, energy and mining industries. MOBOTIX 7 is the latest addition to the MOBOTIX family an...
Eagle Eye Networks, an international provider of cloud video surveillance, announced the release of its cloud-client fisheye camera dewarping solution. Eagle Eye Cloud VMS customers can now securely access their fisheye cameras and dewarp the video in real-time from their desktop browser or cellphone device. Eagle Eye Cloud VMS supports a broad array of fisheye cameras from multiple manufacturers, models include: Axis M3058 Hanwha 9010R Avigilon 12.0-H4F-DO1-IR Hikvision DS-2CD63C5G0-I(V)(S) Dahua NK8BR4 12MP Eagle Eye Networks CDUF-003a Standard fisheye cameras Eagle Eye Networks expects to quickly expand the support for additional fisheye cameras from additional manufacturers. Eagle Eye Cloud VMS currently supports over 3,500 IP, analog and HD Over Coax cameras. “Fisheye cameras have numerous efficiencies and cost savings associated with them,” said Dean Drako, CEO of Eagle Eye Networks. “Eagle Eye’s fisheye dewarping solution transforms standard fisheye cameras into powerful intuitive tools while decreasing the cost and maintenance needed to cover a wide area.” Included with the new fisheye dewarping is a virtual PTZ function that provides benefits over traditional PTZ cameras. Traditional PTZ cameras can only capture the area they are aimed at when they are aimed at it. The virtual PTZ function in Eagle Eye Networks’ fisheye dewarping captures footage of an entire area regardless of any pan, tilt or zoom. Camera-based dewarping The user can, therefore, pan, tilt and zoom after the fact and see the image when viewing historic video. Previously, the Eagle Eye Cloud VMS supported fisheye cameras through camera-based dewarping. The new cloud-client dewarping no longer requires the camera to do the dewarping function. Dewarping is done in real-time or when viewing historic video. Customers can apply preset dewarps to their video in Single, Dual 180, Quad and 360 views. These views can be converted to layouts as if they were separate cameras. The Eagle Eye Cloud VMS cloud-client fisheye camera dewarping is available immediately and globally to all partners and customers. There is no additional charge for these features.
The DoorBird D1101V, the next-gen IP video intercom from Berlin-based manufacturer Bird Home Automation is now available worldwide for purchase. The D1101V with one call button combines a compact, elegant design with DoorBird's IP technology and comes in a surface-mounted and flush-mounted version. The smart intercom sends push notifications when the call button is pressed, and allows you to talk to visitors, and see them live via smartphone, tablet or indoor station. "The DoorBird D1101V is compact, WiFi-enabled and ideal for single-family homes", says Sascha Keller, CEO Bird Home Automation. "This IP video door station combines new components such as the 1080p camera and the Bluetooth module for access control as well as excellent audio quality from the integrated speaker in a small housing with a stainless-steel front panel". Seamlessly internet connectivity via WiFi and Bluetooth The D1101V can be connected to the Internet via WiFi or network cable. This allows access to all functions of the smart door intercom from home and remotely. Settings and user permissions can be configured in the free DoorBird app via smartphone, tablet or IP indoor station. The integrated Bluetooth module allows residents convenient and keyless entry. Full HD camera with 1080p resolution For the first time in the DoorBird product family, the D1101V has an integrated camera with a full HD 1080p resolution For the first time in the DoorBird product family, the D1101V has an integrated camera with a full HD 1080p resolution. The built-in Sony image sensor ensures the best possible image and video quality during the day and at night. Additionally, the camera angle has been optimized compared to previous models through a better lens. Visitor images are stored with date and time stamp in the free cloud history. Integrated motion sensor for enhanced security The new IP intercom features a configurable motion sensor with 4D technology for accurate detection. It can detect movements within a six-meter radius. In addition, the sensor detects if someone is approaching the door, leaving the house or both. Users can decide which direction of motion sends a push notification or triggers a relay. Existing smart home systems can be easily combined with DoorBird. Due to the Open API interface, the D1101V can be integrated into any building and home automation systems such as KNX, Loxone and Control4, as well as video surveillance and access control systems. Thus, the smart home becomes manufacturer independent. Surface-mounted and flush-mounted version The D1101V is available as a surface-mounted and flush-mounted version. The face plate is made of stainless steel and the weatherproof housing complies with the industry standard IP65. Due to its slim design, the compact door intercom can also be mounted on door frames. With the help of additional adaptors, mounting is also possible at vertical and horizontal angles.
At ISC West 2020 Arteco is launching Arteco VCA, the video analytics set that involves the digitalization of video footage and the employment of sophisticated algorithms to classify object types and identify behavior in real time, providing alerts and events to its users. Video analytics allows cameras to be used in a wide range of markets providing a great return on investment, with applications such as: perimeter detection, vehicle classification, crowd control, abandoned object and parking management to name just a few. Accurate false alarm minimization Arteco VCA has a whole set of algorithms that make it an incredible solution The Arteco Video Content Analytics solution was designed to be easily set up and immediately employed by companies and users. Following Arteco’s motto ‘Security at First Sight’, security professionals can rely on a more effective detection procedure due to a made-to-measure approach that gives them the chance to apply multiple logical rules to create unique scenario for a single camera view and video streaming. As a consequence, the user can count on an accurate false alarm minimization and a feeling of extreme control over the scene. Arteco VCA has a whole set of algorithms that make it an incredible solution for an extremely wide range of applications. This is the list of the applicable filters, and much more is about to come: Intrusion detection Loitering Counting Object Classification Deep Learning Filter Speed Filter Appear & Disappear Filter Stopping Object Filter Dwell Filter Enter & Exit Filter Direction Wrong direction Tail Gating Abandoned Object Tamper Detection Simplifying the forensic research Arteco VCA allows the classification of static and moving objects on the basis of size and speed. In addition to the distinction between cars and larger vehicles, individuals and moving groups can be distinguished. The detection of moving subjects generates metadata that appears in real time in the video streaming and allows user to simplify the forensic research: Data and time Channel Type and name of the event Bounding box Classification, speed and size of the object Classification and reliability of Deep Learning Object color Providing specific and powerful algorithms Arteco’s mission is making the companies’ life easy when it comes to security" “Arteco’s mission is making the companies’ life easy when it comes to security. We developed Arteco VCA to be applicable to a wide range of markets, since it provides specific and powerful algorithms that make the security job the most accurate possible.” Said Giampaolo Sabbatani, CEO of Arteco. “And that is not all: we keep on working for interoperability, focusing on integrations, because we know the importance of approaching the customers with customized offers that meet their specific needs of security”. There are several methods to design a security system using Arteco. In the past they had to have a server on each site that linked back to the control room or client PC’s. With the drive of Asian manufactures to reduce the price of surveillance equipment, the company found that clients, convinced by such offering, had to find out that they do not have the full flexibility of being hardware agnostic. Unlimited freedom and flexibility As a consequence, they have been requesting that Arteco developed a solution to integrate with the existing equipment. The company is pleased to say that they have such solution! Now a client can use the lower cost hardware, but still have the ability to use a solution such as Arteco NEXT which now gives them almost unlimited freedom and flexibility. The events can be generated either by the NVR/DVR itself or may be generated on the edge by the camera itself This is the most common scenario: The HikVision and/or Dahua DVR/NVR can be deployed on the remote site and communicate with a local and/or remote control-room. The events can be generated either by the NVR/DVR itself or may be generated on the edge by the camera itself. The control room may be on the local LAN or situated remotely. Events and/or live video will be received in the control room by the operators. Normal IP camera channels Employing the RTSP steam, two paths can be taken: In the state of good internet connection speed, Arteco Next interface can centralize and receive 24/7 video and provide a redundant storage as if the video stream was provided by normal IP camera In state of low internet connection speed, Arteco Next interface can centralize and receive only events in the form of a snapshot from NVR/DVR devices on the field, and finally access to recorded video on the NVR/DVR.
With the addition of the AMIGUARD® 9000 Series Vehicle Barriers, AMICO Security is now offering manufacturing, integration, design, and installation of crash rated anti-vehicular equipment solutions and expert technical support for the government, industrial, commercial, and residential applications. Security fence product lines The AMIGUARD® 9000 Series Vehicle Barriers are fully integrated with their security fence product lines. AMICO’s products have a long track record of reliability in the marketplace from active bollards and wedge barriers to passive systems like cable barriers and fixed bollards. Once can see AMICO’s products at Fencetech Booth #2042 or ISC West Booth #7042.
Technology company Ocucon has developed a lighter version of their VSaaS product, Cloud by Ocucon, allowing retailers to now benefit from innovative cloud technology for a select number of cameras. Cirrus Cloud by Ocucon is a lightweight, highly flexible version of Cloud by Ocucon. It will have all the features of its bigger brother but, in response to retailer demand, it has been optimized to work in a modular fashion for up to eight cameras per store. In-store surveillance and storage Research conducted by the company found that 99% of incidents were caught by just a third of all cameras in a typical retail outlet. This means that on average just eight cameras caught the ‘sweet spot’ of incidents. Cirrus Cloud by Ocucon provides an in-store surveillance and storage service in HD, captured continuously over a 24/7 period, in the cloud for up to eight cameras per store. We see this as an opportunity to introduce our ground-breaking technology to an increased variety of clients" The service will also provide an incident and case management reporting tool that will enable easy access, analysis and retrieval of incidents. Gary Trotter, Co-Founder of Ocucon said: “We are always listening to feedback from our clients and we realized that by re-investing in new technology, we could offer this exciting new product to suit a wider range of retailers and their needs." Easy access surveillance storage "Cirrus Cloud works in a modular fashion, so that we can ensure that the footage from those ‘sweet spot’ cameras can be easily stored, analyzed and retrieved. We see this as an opportunity to introduce our ground-breaking technology to an increased variety of clients both on a national and international scale.” Ocucon developed Cloud by Ocucon, their unlimited VSaaS system to address the need for easy access surveillance storage, to avoid fraudulent cases of slips, trips and falls – currently estimated to cost retailers £800m a year. The technology removes physical limitations on the amount of surveillance footage an organization can save. Delivering a powerful, cloud-based storage and retrieval platform, Ocucon provides the facility to store, analyze and retrieve unlimited amounts of video surveillance footage from within the Ocucon portal.
At LogiMAT 2020 (Stuttgart Trade Fair Center) from 10 to 12 March 2020, Dallmeier will showcase a broad portfolio of image-based process optimization solutions aimed specifically at customers from the intralogistics sector. One example is camera-based "on-the-fly" volume calculation. One of the great challenges of intralogistics faced by many logistics companies is how to measure a large number of freight goods accurately and efficiently. The purpose is not only to identify incorrect or false information, but most importantly it is also essential to organize the processes so that they are as time-efficient as possible and do not disrupt other important workflows. This is precisely the aspect the automated volume calculation solution developed by Dallmeier is designed to deal with. Automated volume calculation Special 3D video systems measure the volumes of the freight goods practically instantaneously; the logistics company simply has to define an existing travel path as a measurement section. Exact specifications for the "Dallmeier measuring terminal" ensure maximum precision. Besides the enormous amount of time saved, other advantages of automated volume calculation include optimal utilization of loading capacities, plausibility checks against reference data, or even coordinated goods inward and outward strategies. The innovative "Panomera " camera solutions from Dallmeier also offer considerably better control of an enormous range of different processes: From monitoring of production lines to rapid response in the event of failures up to and including much more efficient control of the flow of goods and information or improved claims management. In this regard, the high-performance "Panomera W" camera series with viewing angles of 180° and 360° offers users the ability to capture even very widely separated spatial contexts right from the control center with a minimal number of cameras. Image-supported process management Dallmeier camera systems also offer an efficient capability for determining the condition of the freight goods At the same time, the technology ensures that a resolution sufficient for the required applications is always provided, for documentation that is usable in court or in liability cases, for example, or AI-based video analysis as well. Both the 180° camera view and a panoramic 360° perspective help logistics managers to simplify a large number of processes, such as monitoring logistical release systems. The misplacement of consignments is another known challenge which intralogistics must deal with. The tracking system developed by Dallmeier enables automatic search and locating operations for freight goods to be launched by the automated linking of video images with package item numbers. In this process, the various scan events are synchronized with single-frame accuracy using time servers. This guarantees the prevention of loss claims and increases safety at work. Dallmeier camera systems also offer an efficient capability for determining the condition of the freight goods by means of image documentation at the time of transfer of risk. Real-time control of freight goods The patented Panomera multifocal sensor technology does more than just reduce the number of cameras needed, with the associated infrastructure (masts, cables, network, etc.), it saves cost many times over. In conjunction with various analysis applications – such as AI-based object classification for reducing the incidence of false alarms – it also provides logistics companies with extremely powerful solutions for warehouses, loading and shipping areas as well as perimeter protection. As a German manufacturer, Dallmeier maintains the highest standards, whether they relate to quality, data protection or data security/cybersecurity. Dallmeier’s innovative 3D planning approach also guarantees that the systems will deliver exactly the detection quality required for video recordings to be usable in court. Accordingly, fulfilling TAPA (FSR) requirements presents no difficulty at all.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorized parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorized personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilizers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyze a security event, machine learning can analyze the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the center of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level,” Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centers, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organization has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centers, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions. Mergers and acquisitions have been commonplace in the integrator spaceBeyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognized brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy.” He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted.” Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning "We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customization during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a cellphone credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cybersecurity, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasizing “cybersecurity by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cybersecure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analog with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cybersecurity requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available”“We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organizations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organizations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our healthcare mini series here and here.
While HENSOLDT is a global pioneer of technologies that are designed for protecting armed forces, civilians, assets and borders, the company is also actively making a difference as a protector of endangered species. South Africa is known for its iconic wildlife and is also home to one of HENSOLDT’s largest industrial sites. As a result, it came as a natural progression to protect the country’s wildlife using state-of-the-art defense and security technologies. Rise in rhino poaching In recent years, animals such as rhinos have been under increased pressure due to rising poaching levels, threatening the future of these animals. South Africa holds nearly 80% of the world’s rhinos and has been hit the hardest by poaching, with more than 1 000 rhinos killed each year between 2013 and 2017. HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy HENSOLDT responded to this threat, and is now combining advanced intelligence, radar and optical surveillance systems with physical security for high-end wildlife protection. This week, HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy, where HENSOLDT’s technologies have been keeping a large number of rhino safe. HENSOLDT South Africa designed and installed a surveillance and security system on the farm and since then, not one animal has been lost to poaching. “Before that, we had poaching every month, sometimes every week,” says John Hume, owner of Buffalo Dream Ranch. Situational awareness In 2017, Buffalo Dream Ranch, the world’s largest rhino farm, started a partnership with HENSOLDT to secure 8000 hectares of land, where some 1800 rhinos now live peacefully, protected by state-of-the-art HENSOLDT technology. The specially developed system combines a number of advanced sensors, including optical and radar sensors, to monitor the rhinos, farm and surrounding area. Data from these sensors are fused using advanced analytics at a command and control center to provide complete situational awareness and early-warning of potential poachers approaching the area. In combination with existing physical barriers and a team of security personnel, the system augments the total security approach to create a surveillance solution, with technology that is always on guard, never fatigues and which cannot be compromised. “We are for the first time in years feeling confident, with HENSOLDT, of perfecting the protection of our rhino,” says Hume. Wildlife protection The know-how acquired through these projects can be applied for protecting other wildlife “We are honored to be part of important initiatives such as the conservation of our wildlife and we aim to expand our efforts,” says Hennie Venter, Chief Executive of the HENSOLDT South Africa GEW business unit. The know-how acquired through these projects can be applied for protecting other wildlife and national parks to safe-keep endangered species such as lions, elephants and even abalone. HENSOLDT prides itself on its relationship with its clients. “For us it’s not putting down the equipment and getting the business, for us it’s rather a journey,” says Werner Muller, GEW’s Chief Executive of Spectrum Monitoring and Security. Needs-based solutions Because of this philosophy, and because each wildlife scenario is different, with its own unique set of challenges, HENSOLDT’s experts collaborate with each client to develop a solution that addresses their specific needs. Through its business units, GEW and Optronics, HENSOLDT South Africa delivers solutions to clients across the world, and significantly contributes to South Africa’s export industry, while it is firmly grounded in its roots as a proudly South African company, operating in South Africa for South Africa. HENSOLDT is committed to continue innovating to protect the wildlife.
AI technology solutions firm, Athena Security is rolling out a line of artificial intelligent thermal cameras, which will be critical in the coming weeks. Containing Covid-19 spread With voters congregating at the primary polls in three US states, exponential spread of the Coronavirus (Covid-19) is inevitable. The infected voters, many of whom will be ignorant that they have the contracted the virus, will spread it to countless others. In the coming weeks, those infected with the virus will need full awareness of their state of health to prevent further spread of the infection. High-tech AI thermal cameras AI thermal cameras can be life-saving by giving instant warning to the person that they could have the virus Taking into consideration that high temperature is one of the first symptoms of Coronavirus (Covid-19) infection, these high-tech AI thermal cameras can be life-saving by giving instant warning to the person that they could have the virus and encouraging that person to take serious steps to self-quarantine immediately. Although many voters are bound to contract Coronavirus (Covid-19) when casting votes, steps taken in the coming weeks could prevent those infected from spreading it to loved ones and strangers alike. Some details surrounding the AI thermal cameras include: The cameras capture video accurately within 1/2 a degree They detect 12 different points on the body These cameras are perfect for mass congregation locations, such as airports, grocery stores, hospitals and voting locations The AI thermal cameras are ‘Ethical’ and feature no facial recognition or personal tracking Athena Security is the first A.I. technology company to accurately detect guns to mitigate mass shootings back in 2018 The first deployment of the AI thermal cameras is in Austin, Texas, USA
With a history of over 20 years, the Cedr factory is one of the leading manufacturers of wooden doors, kitchen cabinets and other wood products in Russia. Today, it has a few of its own modern and automated plants with a wide range of products and innovative production approaches. For such a modern wood factory, safety is of paramount concern. Advanced video surveillance systems need to be introduced in the internal and external areas of the factory. Due to the extremely high risk of fire in a wood factory, the customer has high demands for a smart system to keep sufficient video backup as evidence. Specifically, the system needs to be capable of storing up to 30 days of videos, with copies stored on a separate network at the same time so that the videos can be safely saved under different network conditions. Mini-Bullet Network Camera With IR illumination, detailed images can be captured under low light conditions or total darkness A total of 400 IP cameras from Dahua Technology were installed inside of the factory for general monitoring, including DH-IPC-HFW1230SP, DH-IPC-HDPW1231FP-AS and DH-IPC-HFW2231TP-ZS. In this chain factory, DH-IPC-HFW1230SP was used to monitor machine operation, and DH-IPC-HDPW1231FP-AS was used to monitor corridors. These two types of cost-effective Mini-Bullet Network Camera feature 2MP resolution with a motorized 2.8mm/3.6mm fixed lens. With IR illumination, detailed images can be captured under low light conditions or total darkness. The cameras’ Smart IR technology adjusts the intensity of camera's infrared LEDs to compensate the distance of an object. Smart IR technology prevents IR LEDs from whitening out images as they come closer to the camera. excellent light sensitivity In order to ensure the safety of staff and vehicles in the factory vicinity, DH-IPC-HFW2231TP-ZS was installed outside the factory to monitor large and open scenes. This IR Megapixel Vari-focal Camera features 2MP resolution with a 2.7mm ~ 13.5mm vari-focal lens, meeting monitoring needs of different distances. For challenging ultra-low light environments, IPC-HFW2231TP-ZS powered by Dahua’s Starlight Technology offers excellent light sensitivity, capturing color details in low light conditions down to 0.006lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. ±25% input voltage tolerance These cameras are ideal choices for installation even in the most unforgiving environments In addition, these cameras allow ±25% input voltage tolerance, suitable for the most unstable conditions in outdoor applications. Its 2KV lightning rating provides effective protection against lightning for both the camera and its structure. Certified and subjected to rigorous dust and immersion tests (IP67), these cameras are ideal choices for installation even in the most unforgiving environments. In order to help the customer improve the security of video storage, three types of Dahua 4K H.265 Network Video Recorders – adopting powerful processors with up to 4K resolution for preview and playback – are used in the factory to store 10-day videos, which can provide critical details for identification. Real time monitoring On the other hand, a 48-HDD Enterprise Video Storage is used to separately store 30-day videos at the headquarters in case the factory area videos are damaged. It supports 512 channels of IP camera inputs and 1024Mbps incoming/recording bandwidth, offering an unparalleled storage performance. Moreover, DHI-DSS4004 was selected as the central server, through which all videos are integrated in one system for a unified operation and management in the headquarters’ control room. The vast factory vicinity is now equipped with Dahua video surveillance system, enabling all security checkpoints to monitor the factory in real time. At the same time, the massive video storage and backup allows the administrator to review emergency situations if necessary. The advanced solution from Dahua Technology has created a safe and smart factory for the customer, assisting them in improving their security level during production.
The new Courtyard by Marriott hotel at London’s Luton Airport is being protected with the latest, cybersecure video surveillance technology from IDIS. The complete end-to-end solution, from Korea’s video equipment manufacturer, is enabling trouble-free remote 24/7 monitoring, ensuring improved service efficiency, safety and security for guests. IDIS DirectIP® technology was chosen for its ease of installation and use together with the reassurance of multi-layered protection against cybersecurity risks. Although the installation team from DGS Systems had never previously worked with IDIS technology before, they found that it lived up to its true plug-and-play promise. Providing impressive recording capability IDIS DirectIP® made it easy to set up the three IDIS NVRs to provide impressive recording capability Despite having almost 100 cameras to set up - including 74 full-HD IR domes and 17 vandal resistant full-HD IR domes – one-click network configuration allowed the engineers to work rapidly, connecting devices easily and not needing to manually enter passwords for each one. This not only reduced installation time but ensured greater protection against network infiltration by minimizing the likelihood of human error, which can occur when passwords need to be written down and entered manually. Encryption technologies and NVR firewalls together with proprietary protocols and file structures make IDIS surveillance solutions less vulnerable to attacks than many common open architecture components. IDIS DirectIP® made it easy to set up the three IDIS NVRs (32-channel DR-6332PS-S) to provide impressive recording capability and meet the customer’s requirement for three months’ storage of all footage. Protecting building exteriors The NVRs’ 370Mbps throughput ensures no latency on live footage and high-quality image capture in full HD. Most of the cameras are used for incident investigation, although with the hotel’s service areas now covered, operational efficiency has been improved too. The hotel’s owner also wanted to protect the car parks and building exteriors to reduce the risk of crime For example, routine checks on the rooftop plant room can now be handled remotely, rather than in person, which is particularly useful during adverse weather conditions. The hotel’s owner also wanted to protect the car parks and building exteriors to reduce the risk of crime, and shortly after the system was completed, a gang of opportunist scrap-metal thieves was recorded stealing cables from the site. Handling rapid variations in brightness The IDIS full-HD IR domes provided video evidence that was key to a successful police investigation, delivering pin-sharp images in all lighting conditions and easily handling rapid variations in brightness and shade thanks to their true wide dynamic range (WDR). “The IDIS solution was very installer-friendly and easy to configure,” says Dariusz Surowy of DGS Systems UK, confirming that the same technology is now being used on more sites. Grzegorz Surowy, MD of DGS Poland, agrees: “It has rapidly proved how well it works with successful incident investigations.” Meanwhile, James Min, Managing Director, IDIS Europe comments that IDIS solutions are designed to be easy to install, simple to use, and to give the lowest total cost of ownership (TCO). “For busy hotels such as the Courtyard by Marriott at Luton, they provide the perfect tool for safety, security and more efficient management.”
A grocery chain was experiencing a shoplifting problem at several of its locations. The shrinkage loss was significant and was impacting store profitability. Having worked with Alvarado in the past, the chain reached out to Garda Construction and Dale Staton at Alvarado to help craft a solution. The store had an open layout, and while visually appealing, shoppers could easily walk out without passing through a checkstand. EAS equipment would periodically alarm when a patron or thief walked out the door, but because alarms were common, they were generally ignored. Monitored checkstand area Dale explained that the optimum solution would be a barrier that allows patrons to easily enter the shopping floor For purposes of theft control, Dale explained that the optimum solution would be a barrier that allows patrons to easily enter the shopping floor, while providing a physical deterrent from exiting the store without first passing through a monitored checkstand area. Acting on Dale’s suggestion, the store installed Alvarado’s SW500 motorized gate with camera-based detection and presence technology, along with Alvarado’s modular post and railing. After patrons pass through the exterior bi-parting doors, they approach the gate to enter the merchandise area. The gate opens automatically, allowing access. When the gate is closed, if a patron (or thief) walks up to the gate to exit, a pulsing alarm sound warns the patron and alerts store personnel. If the patron backs out of the detection area, the alarm stops. If the patron continues and attempts to push or pull the gate open, a sustained alarm provides additional notification. Fewer false openings and unwanted alarms The use of camera-based detection provides significant benefits. Traditional detection technologies, such as microwave or PIR, make it very difficult (and sometimes impossible) to accurately define motion and presence sensing detection areas, resulting in unwanted openings and false alarms caused simply by normal store traffic patterns. After installation of Alvarado’s products, the traffic pattern into and out of the stores changed dramatically Alvarado’s camera-based detection technology, which is installed in the top cap of the gate, allows both the entry and exit sensing areas of the SW500 to be accurately defined using an included software application. An accurate detection pattern results in substantially greater application flexibility and far fewer false openings and unwanted alarms. After installation of Alvarado’s products, the traffic pattern into and out of the stores changed dramatically. Camera-Based motion detection Store personnel also commented that numerous patrons suspected of being shoplifters stopped coming to the stores. The overall result was a significant decrease in theft and improved profitability that more than justified the equipment purchase and installation expense. From traditional retail turnstiles and gates, to the innovative SW500 motorized pedestrian gate with camera-based motion detection, Alvarado provides an array of entry control solutions to retail customers – as it has done since 1956. Our full product portfolio offers inexpensive and effective methods of controlling pedestrian traffic and shopping cart flow patterns and reducing shoplifting and shrinkage in retail and grocery stores.
La Cité, Ontario’s largest French-language college, recently upgraded parking lot security on its main Ottawa campus with the installation of 15 IX Series 2 video intercom assistance (or emergency) towers from Aiphone, the international manufacturer of intercom and security communication products. With the press of a button, the towers enable students, staff, and visitors to directly communicate with the campus security staff. The towers’ embedded megapixel cameras provide security officers with live video to more accurately assess and respond to a situation. The Aiphone towers are topped with bright blue lights making them easy to spot at night. They are always on and officers immediately know the location of any calls for assistance. The IX Series 2 intercoms and towers replaced units that could no longer be repaired, and that downtime could potentially endanger students or staff, said Rock Levesque, Project Manager for Ottawa-based project integrator, ComNet Networks and Security Inc. Outdoor mass notification system ComNet created an outdoor mass notification system by adding amplified horns to each Aiphone tower" “Pressing the old units’ call buttons initiated a siren that made it virtually impossible for students to hear instructions from the security staff,” he said. “Campus administrators place a very high priority on the safety of their students and staff, so the decision was made to upgrade the entire system.” To replace the sirens, ComNet created an outdoor mass notification system by adding amplified horns to each Aiphone tower. The IX Series 2 towers include embedded megapixel cameras providing sharp closeup video. Levesque said the towers’ optional CCTV arms will enable the campus to add cameras for wider parking lot views. Emergency assistance system The three-module towers feature built-in mounting hardware for power supplies or accessories and rear access panels to easily pull wire from top to bottom. The towers also feature built-in UL-Listed electrical boxes to satisfy local electrical codes. Upgrades to the emergency assistance system on the La Cite Ottawa campus will set minds at ease and help protect the thousands of students and staff who call this campus home. La Cité, opened in 1995, offers its 5,200 students 140 postsecondary programs with degrees ranging from architecture to security management. The college has its main Ottawa campus, a satellite campus in Hawkesbury, a site dedicated to constructions trades in Orleans, and a business office with classrooms in Toronto.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
Video surveillance equipment: Manufacturers & Suppliers
- Bosch Video surveillance equipment
- ComNet Video surveillance equipment
- NVT Video surveillance equipment
- Dahua Technology Video surveillance equipment
- LILIN Video surveillance equipment
- Teleste Video surveillance equipment
- FLIR Systems Video surveillance equipment
- Video Storage Solutions Video surveillance equipment
- Tamron Video surveillance equipment
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals