Video surveillance equipment
Security integrators are often tasked with a multitude of responsibilities which could include a variety of installation, integration or design tasks made up of sprinkler systems, fire alarms, access control, HVAC, video surveillance systems and networks; and then pile on maintenance, training and analytics. Traditionally, most security integrators have installation backgrounds but are now expected to be IT savvy, too. Even the most proficient IT professionals may not fully grasp the complexity...
Video surveillance equipment vendors report their 2018 revenue data to IHS Markit in the first quarter of 2019, which is when we calculate the rate the professional video surveillance market grew in 2018. However, we expect this rate will have been around 10 percent globally -- slightly higher than the 9.3 percent growth in 2017 and much higher than the 3.9 percent growth in 2016. Changing Market Trends Despite this healthy rate of growth, 2018 was not without its challenges and surprises. Cha...
Security 101, a national security systems integrator, announced 13 winning non-profit organizations in the 7th Annual Gift of Security. More than 32,825 online voters selected the winners, each of which will receive $10,000 worth of integrated security services and equipment from 13 participating Security 101 offices and product partners, Axis Communications and WESCO. Each office enlisted local public officials and civic leaders to nominate three non-profit organizations that were submitted to...
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for...
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 article...
Milestone Systems, globally-renowned open platform company in networked VMS, released its Device Pack 10.0a in October this year and now supports the MOBOTIX MOVE camera series. MOBOTIX MOVE is an independent product line providing customers everything from a single source. “MOVE” stands for the use of mechanically moving parts in the cameras, meaning that MOBOTIX have parted with their previous product policy of only offering decentralized video systems on the market. The MOBOTIX M...
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's prisons, particularly as a means of smuggling. SPYNEL 360° Thermal Imaging Sensors To protect prisons, borders and critical infrastructures from smuggling and terrorism, Electro Optical Industries upgraded their most powerful 360° thermal imaging sensors SPYNEL-X and SPYNEL-S, integrating a visible channel and a laser rangefinder to the thermal cameras. The new V-LRF option aims to facilitate the tracking and the identification of a detected threat, thanks to the full HD visible cameras’ optical zoom (x30). The exact distance of the threat is provided by the laser rangefinder in real time, an option particularly adapted to the detection, tracking and recognition of the smallest targets, like UAVs. SPYNEL & its V-LRF option ensure no blind sector for a real 360° coverage in all surveillance phases: detection & identification An innovation it is, as all other systems on the market must use separate sensors to get similar functions: one sensor for detection, a radar for instance, and another sensor for identification, such as a PanTiltZoom (PTZ) camera. Xavier Elbaz, Sales Manager at Electro Optical Industries explains: "With separate systems, it is hardly possible to ensure a real 360° coverage for detection and identification because of blind sectors created by the mechanical supports. Moreover, separate sensors must be integrated and calibrated to properly operate together. SPYNEL & its V-LRF option ensure no blind sector for a real 360° coverage in all surveillance phases: detection & identification." SPYNEL V-LRF With CYCLOPE Detection Software In addition, most of the time, UAVs' small size and low electromagnetic signature go unregistered by traditional detection measures. With SPYNEL's thermal imaging technology, it is impossible for a drone to go unnoticed: any object, hot or cold will be detected by the 360° thermal sensor, day and night. SPYNEL V-LRF and its automatic detection & tracking software CYCLOPE are easy to deploy and to use, and the system is easily interfaceable for multi-sensor protection of critical infrastructure like prisons. Data is smoothly merged with other sensors’ data like radars, AIS, fence vibration sensors, etc., and displayed on the same interface, whereas separate sensors must be integrated and calibrated to operate properly together.
Matrix Comsec, a pioneer of technologically advanced security and communications solutions, is preparing to spread its footprints in the Canadian market. Security And Communication Solutions Matrix is renowned enterprise and each of their solutions are designed and manufactured in the company’s exclusive DSIR (Department of Scientific and Industrial Research) certified Research and Development Center. More than 40% of the company’s manpower is dedicated to the development of cutting-edge enterprise solutions. They also bear customer and market requirements in mind while designing our Security and Communication solutions to ensure that they turn out to be the perfect solution for modern enterprises. Additionally, we offer solutions that cater enterprises across various verticals such as Healthcare, Hospitality, Retail, Banking & Finance, and so on. Our solutions are carefully designed to meet individual requirements of each of these verticals’ market. IP Video Surveillance And Access Control Our range of solutions includes IP Video Surveillance, People Mobility Management and Access Control, Unified Communications and IP Endpoints Our range of solutions includes IP Video Surveillance, People Mobility Management - Time-Attendance and Access Control, Unified Communications and IP Endpoints. Matrix Comsec has successfully assisted leading brands to overcome their security and communication challenges with our proven and innovative solutions across diverse industries in the USA. We are aiming at having similar brand wins and earn customer loyalty in Canada as well. As part of our marketing strategy, we are going to penetrate the Canadian market and reach small & large enterprises of Canada with BTL marketing activities such as upcoming security and telecom exhibitions along with social and print media, etc. We see Canada as one of the potential countries to penetrate with our advanced solutions and make a mark among system integrators and end customers. We aim at becoming a name that believes in delivering substantial Security and Telecom products and solutions. Security Canada Central To further understand the Canadian market, we will also be participating in the Security Canada Central to be held on 24th - 25th Oct 2018. This event will serve as one of the greatest platforms for us to interact with the like-minded system integrators and project consultants of Canada sharing a similar vision like Matrix Comsec; i.e. to deliver world-class and advanced Surveillance, Access Control and Unified Communication solutions to modern enterprises. Interacting with the system integrators will give us greater insight into the enterprise demographics and challenges of the security and communications market in Canada, which will further assist us in understanding the niche requirements of enterprises in Canada and engineer solutions meeting their exact requirements. In our Managing Director, Ganesh Jivani’s words, “Matrix has a rich innovation lineage. The company has acquired a formidable reputation for quality and engineering of its products. Our solutions, with their value-added functionalities, will surely strengthen the communication and security requirements of enterprises. These solutions have already gained interest of system integrators and consultants offering technology solutions for small to large enterprises and projects. We look forward to a welcoming environment in Canada.”
Cobalt Robotics, a manufacturer of intelligent security robots used to autonomously patrol indoor facilities, will unveil its new leak and spill detection sensing capabilities as part of the Global Security Exchange, one of the largest tradeshows and conferences to showcase the latest security technologies. At last year’s event, previously called the ASIS Annual Seminar and Exhibits, Cobalt Robotics was the recipient of the 2017 Judges Choice Award, the highest honor available as part of the ASIS Accolades Award program. The Judges Choice Award recognises the most innovative product of the year. Leak and Spill Detection Sensing Technology With its new leak and spill detection sensing technology, Cobalt robots can be programmed to detect a leak or spill within a predefined area With its new leak and spill detection sensing technology, Cobalt robots can be programmed to detect a leak or spill within a predefined area. Once detected, the security robot can then send the appropriate notification to a robot Specialist. Cobalt robots are equipped with powerful sensors, including day-night cameras, thermal sensors, motion sensors and badge readers, which helps it to detect anomalies and other risks that might not be detected by the human eye. “Security robots provide corporate security directors with a powerful tool that amplifies their resources and allows real-time alerts to the right security personnel about an event, such as an open door, a spill, or an unauthorized individual in the building after hours,” said Dr. Travis Deyle, CEO and co-founder of Cobalt Robotics. “Security professionals are finding that security robots are a valuable addition to their security toolbox, enabling them to integrate technologies and leverage the benefits of machine learning technology.” Security Robots Cobalt Robotics was founded in 2016. Since then robots designed and developed by the technology start-up have been deployed by several well-known companies, including Yelp, Credit Karma and Slack. The company has also raised $16.5 million in venture capital funding through partners such as Sequoia Capital, Bloomberg Beta, Storm Ventures and Founders Fund. GSX will be held at the Las Vegas Convention Center from Sept. 24-27th in Las Vegas. More than 20,000 security professionals, which includes corporate security directors from Fortune 500 companies, universities, healthcare facilities, and financial institutions from around the globe, are expected to attend the event. Cobalt Robotics will be exhibiting at GSX at booth 353 and be featured in the D3 Xperience – Drones, Droids, Defense located at Booth 5602.
Honeywell has expanded its line of Performance Series video product line with upgraded HQA (high quality analog) and IP cameras – including the line’s first IP PTZ camera – and Embedded NVRs. The enhanced products further expand Honeywell’s integrated turnkey video solution, which ensures more efficient, effective safety and security, reduces total cost of ownership, and reduces compliance and liability costs. Honeywell HQA And IP PTZ Cameras The updates to the Performance Series portfolio can help lower storage costs by nearly 50 percent through more efficient storage options. The Embedded NVRs are equipped to hold up to 16TB of build-in-storage, and feature H.265/H.264 smart codec support, which save bandwidth resources while decreasing storage capacity. Additional features include 4K camera support with face detection for higher quality video and surveillance at minimal bandwidth. New HQA cameras in dome, bullet and fisheye formats with highest quality 4K imaging for improving security system efficiency, and high-performance algorithms for reducing downtime risks and false alarms. The upgrade also features the Performance Series’ first IP PTZ camera that provides optimal coverage in higher resolution and detail, even in the most challenging environments. The combination of increased functionality and compatibility allows businesses to mix-and-match affordable solutions and gives them the flexibility to combine products that truly suit their security needs. The Performance Series Embedded NVRs and HQA and IP Cameras integrate with I-View Now for video alarm verification Performance Series Embedded NVRs In addition, the Performance Series Embedded NVRs and HQA and IP Cameras integrate with I-View Now for video alarm verification and MAXPRO Cloud access control software for access control and multi-site management, expanding Honeywell’s connected security as a service portfolio. Featured Products – Performance Series Embedded NVRs – 4-/8-/16 Channel Performance Series HQA – 4K WDR IR Dome (CVI/SD) Performance Series HQA – 4K WDR IR Bullet (CVI/SD) Performance Series HQA – 4K WDR Fisheye Camera (CVI/SD) Performance Series HQA – 1080P PIR Camera (CVI/SD) Performance Series IP Camera – 4MP WDR IR PTZ
Paige DataCom Solutions, the developer of GameChanger, a new cable designed to significantly exceed the reach of traditional category cable, announced the results of an independent performance evaluation completed by UL LLC as part of its Marketing Claim Verification program. The UL assessment evaluated the performance of the award-winning GameChanger cable technology and verifies the claim that it delivers 1 Gbps performance and PoE+ over 200 meters. "We are thrilled that the leading independent testing facility verifies that GameChanger delivers this type of performance at over twice the standard cable length," said David Coleman, VP of business development for Paige Electric Co., LP. “These results independently document that Paige’s GameChanger Cable really lives up to its name. With a reach that far exceeds traditional cable, it can save integrators and end-users an enormous amount of time, money and hassle across many different applications." Paige’s GameChanger Cable Paige’s GameChanger cable extends the reach for any Ethernet application including high definition video and PoE+ to 850’ without a repeater making it ideal for replacing a CCTV and for use in applications that are beyond the 100m reach of a traditional category cable. This cable eliminates intermediate IDF requirements and the need to install repeaters or transceivers, which are costly and introduce additional points of failure. In April 2018, GameChanger was recognized by the Security Industry Association (SIA) as the best in Video Surveillance Hardware and Accessories in the New Product Showcase at the ISC West trade show. Previously, GameChanger was presented with the Platinum Award in the Cabling Installation & Maintenance 2017 Innovators Awards Program at the BICSI trade show.
Eagle Eye Networks has announced that it has completed an eighteen-month globalization project to meet the needs of key global customers. The initiative included: Adding data centers globally to provide wider regional coverage Multi-lingual translations of the Eagle Eye user interface, Eagle Eye Reseller Dashboard, and the marketing website Eagle Eye University expansion to Europe and additional language expansion Enhanced customer support resources including localization and increased hours of operation Eagle Eye’s multi-national customers need a standardized video surveillance solution to streamline operations across their global locations. They also need localized languages and local data centers for their employees and to comply with video surveillance regulations. The Eagle Eye Cloud Security Camera VMS now provides a localized user experience in a global environment. Eagle Eye’s Globalization Project included: Eagle Eye added data centers in London and Dubai for anticipated growth from Eagle Eye’s channel expansion in Europe and the Middle East Data Centers: Eagle Eye added data centers in London and Dubai for anticipated growth from Eagle Eye’s channel expansion in Europe and the Middle East. Eagle Eye also dramatically expanded its Montreal and Amsterdam facilities due to increased customer demand. Customers have the flexibility of choosing to store video in any of our data centers worldwide. With the expansion of the Eagle Eye Data Centers across the globe, it is easy for companies to adhere to country-specific video storage requirements. Eagle Eye has plans to further expand its data centers throughout 2018. Eagle Eye User Experience: The Eagle Eye user interface has been localized into seven different languages. Language may be set per user and can be changed under a user’s profile. All notifications, mails, and alerts are sent in the user’s language preference. Global staff can now fully utilize video in their native language thereby improving operational efficiencies. Eagle Eye Reseller Dashboard: The Eagle Eye Reseller Dashboard is localized into seven different languages, including Spanish, Japanese, German, Dutch, French, and French Canadian. Using this dashboard, resellers can control, configure, monitor, and receive alerts for their customers in the Eagle Eye Security Camera VMS in the language(s) of their choice. Channel partners across the world will benefit from the operational improvements this new functionality provides. Marketing Website: The Eagle Eye Networks website is available in seven languages, including Spanish, Japanese, German, Dutch, and French. Providing localized content allows website visitors from around the world to effectively interact with the Eagle Eye website. Eagle Eye University: Eagle Eye Networks expanded Eagle Eye University to Europe. Eagle Eye University includes both in-person training and online courses. Eagle Eye University is now available in English, Dutch, and Spanish due to channel partner demand. Authorized Eagle Eye Networks Partners can sign up for in-person or online training on the Eagle Eye website. Customer Support: Eagle Eye Networks increased its hours of operation and expanded support into several new languages. Eagle Eye customer support is available twenty-four hours a day, five days a week, in English, Dutch, Spanish and Japanese. Increased hours of operation and localized support provides Eagle Eye customers quicker resolution, and an enhanced customer experience. “I founded Eagle Eye Networks as a cloud company because I foresaw a shift from on-site to cloud video surveillance,” said Dean Drako, the Founder and CEO of Eagle Eye Networks. “We invest heavily in our platform and will continue enhancing and expanding our global infrastructure to support our worldwide growth.” This push toward globalization is a key part of Eagle Eye’s mission to meet customer needs and delivering added value to its resellers and customers.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
It's no secret that one of the next market segments to see exceptional growth nationwide is somewhat non-traditional: cannabis. The global cannabis market is projected to reach $60 billion by 2024, according to Ameri Research, fueled by the increasing legalisation and decriminalisation across much of the United States. It is estimated that 22 million pounds of marijuana are grown each year in the United States, with 80 percent coming from California, Tennessee, Kentucky, Hawaii and Washington, according to Mother Jones. Unlike other products, this commodity is valuable from the moment the seeds go in the ground to the exchanging of money for end-user products - and at every point in between.Within large greenhouses, 360-degree cameras that show a wide field of view are essential for cannabis protection From seedlings to selling, securing every point within the supply chain is vital to the assets being distributed, and companies are now realising how lucrative this endeavor can be. Critical to the success of the industry is keeping the merchandise secure and the workers safe. In this article, we explore each part of the supply chain within the cannabis market and address ways of implementing robust security measures. Plants, Fields And Greenhouses This is one industry where money actually grows on trees! When cannabis crops are planted either in greenhouses or in fields, security becomes critical, since the plants themselves are worth a significant amount of money. A single truckload can be worth hundreds of thousands of dollars, so securing the load is crucial to the process Producers don't want plants stolen – especially high-end varieties that garner a bigger profit when harvested and sold – and the size of the plants make theft a greater possibility. Video surveillance becomes vital at this point and can be used in a variety of ways. Within large greenhouses, single cameras that can cover a wide expanse of space, such as cameras that offer 360-degree views, are essential and can provide more coverage with less investment overall than traditional narrow field-of-view cameras.Advanced technology, such as unmanned aerial vehicles (or drones), are also being used in open fields in an effort to protect these plants. Comprehensive video surveillance becomes the main tool for thwarting cannabis theft and addressing incidents as they arise Transportation And Protection Once the plants are mature enough to be harvested, they must be transported to a production facility where they are either dried or cured based on the needs of the grower, as well as processed and transformed into edible products to be sold at retail locations. There are already a range of companies that specialize in keeping these crop yields safe while they are transported: think Brinks armored transportation used for cash, but for cannabis. A single truckload can be worth hundreds of thousands of dollars – if not more – so securing the load is crucial to the process. Losing one of these loads can lead to large-scale losses for a producer. Surveillance equipment that can withstand sanitation standards and power-washing is paramount for effective protection After being transported, cannabis must be processed. In these environments, where strict handling processes are in place, surveillance equipment that can withstand sanitation standards and power-washing is paramount. This requires camera enclosures that are rated for resistance to high-pressure water jets, dust and vandalism/tampering. Since edible processing requires stringent regulations be followed, it becomes more critical for security managers to identify solutions that carry the NSF Mark, making them compliant with standards set forth for commercial food equipment in North America, or the HCV EU, the equivalent in Europe. Many of these locations handle and store large amounts of cash since customers have to pay with cash Retail Protection As the final products come out of processing and go into storefronts to be sold by retailers in States that have recreational or medical facilities, there's another level of security that must be in place to protect these transactions. But careful considerations must be made. Traditional security tags cannot generally be used because of the small size of many of the end products, making it more difficult to track with tracking devices. Traditional security tags cannot generally be used because of the small size of many of the end products In this instance, comprehensive video surveillance becomes the main tool for thwarting theft and addressing incidents as they arise. In these locations, a loss prevention or security officer has to be an integral part of the team. Another consideration is the careful screening of the potential employees. Since the federal government doesn't recognize cannabis producers and retailers, banks that are federally insured through the FDIC don't accept money from these establishments, meaning that many of these locations handle and store large amounts of cash since customers have to pay with cash. There must be security measures in place for these kinds of transactions, including the ability for video surveillance to be played back instantaneously in the event of an incident at a cash register. The cannabis market comes with a variety of challenges at each and every step of the operation, from growing to transport to production and sales. Video surveillance and business intelligence solutions are ideal for these applications, and as the market grows, more and more security companies will look to cater to the market.
Security teams at casinos and gaming facilities are challenged daily to balance a welcoming and guest-focused attitude with a firm and capable presence to prevent and handle security issues, manage surveillance and security systems, and protect employees, guests, and assets. And all of this needs to be accomplished while complying with strict gaming regulations. An experienced security systems integrator can assist you with many of those challenges, including the very important job of ensuring that the correct security technologies are integrated and installed correctly to avoid downtime and maintain regulatory compliance. On the flip side, partnering with the wrong security integrator can be an expensive lesson with disastrous financial consequences due to system interruptions that can shut down gaming operations. However, selecting the right security systems integrator is not always an easy task. To get the answers you need, you need to ask the right questions. Here’s a list of criteria to help get the search process started. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry 1. Relevant And Proven Industry Experience This may be one of the most important factors for you to research. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry. You wouldn’t hire a plumber to fix your roof or a chef to repair your car, so why consider hiring an integrator without relevant work experience in your specific industry? Does the integrator have experience working with security solutions for casinos and gaming facilities similar to your facility? Have they worked with gaming commissions in your state? Do they have the gaming certifications necessary to ensure your new system is in compliance? And what specific projects have they done – with references you can contact? Even more, look for a systems integrator who has strong relationships with contractors, suppliers, unions and equipment suppliers, as they may need to call on them for assistance during the course of your installation. 2. Security Systems Knowledge Security technologies are evolving at an unprecedented pace which presents obvious advantages and some hidden dangers. It’s important that you select a systems integrator who not only installs products well – but also works very closely with equipment and software manufacturers to develop new and innovative solutions for the most challenging installations.It’s also important to ask about their procedures and processes for after-hours emergency situations Look for systems integrators that utilize integration and testing facilities to evaluate which system configuration and specific components meet your functionality needs, lighting challenges, resolution and frame rate requirements, and recording accuracy demands to ensure your system provides you with the highest levels of identification while maintaining regulatory compliance. Since no two systems are ever alike, it’s also important to look for custom integration capabilities employing solutions from different manufacturers to ensure you are getting the best possible solution on an application by application basis. 3. Brand Loyalty Versus Conflicts Of Interest There’s no doubt that security professionals have their preferred brands. This can be based on prior experience, proven reliability, superior customer support, or even personal relationships. But it’s also no secret that price and sometimes spiffs can play a deciding role on which products a reseller recommends. Be specific to ask questions about the systems integrator’s line card – which manufacturers’ products do they actually represent and why? And how do they select specific products for specific applications? If the answers to these simple questions seem vague, there may be more at play than meets the eye. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation. 4. Accelerating Resolutions How is the integrator’s firm structured? How long have they been in business? Who will be your daily contact? How long have members of the integrator’s team been with the firm? What experience do they have? It’s also important to ask about their procedures and processes for after-hours emergency situations, as you will likely need service after normal business hours. Find out if they offer on-demand remote system support to address problems immediately, and to accelerate resolutions if and when there is a failure. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation Most importantly, verify that they have technicians who can get to your physical location quickly in the event problems need to be addressed physically in order to keep your property in compliance. Even though it can be overlooked, it’s important to assure the system integrator’s organizational structure meshes well with your general requirements before starting a relationship. 5. Pricing Structure Of course, price is important, but while an integrator’s pricing should be competitive, it should be viewed as one of many selection criteria.An experienced systems integrator with casinos and gaming facilities will understand local, state, federal, and tribal regulations A security systems integrator with a proven track record of successfully configuring, installing, and servicing projects like yours, on time and on budget, is worth more than the small amount of money you might save by going with a low-cost integrator. 6. Knowledge Of Gaming Regulations A systems integrator who has experience working with casinos and gaming facilities will understand local, state, federal, and tribal regulations, and will provide you with a gaming surveillance and security solution that minimizes disruptions to your operations during its installation and after your new system has been implemented. Along with the requirement standards of performance, quality and reliability, compliance is critical to ensure fluid gaming operations. 7. Adding Value With Industry References Industry references are invaluable in determining your ideal choice. First, ask them to provide client contacts from their reference list, and contact those individuals. Questions to ask include: Did the integrator clearly understand the reference’s requirements? How did they contribute to the solution? What challenges did they need to overcome? Did the company deliver on time and on budget? How has the system(s) been operating since implemented? How has their support been? Why would you recommend them? A good security systems integrator will take extra steps to ensure your security solution is always working 8. Asking The Right Questions There are very few security systems integrators who can address all of a casino’s or gaming facility’s needs, but they do exist, and you’ll find them if you do your homework. Look for an integrator that can add value and not just take direction. A good security systems integrator will volunteer ideas to reduce maintenance costs, take extra steps to ensure your security solution is always working, and help save your casino money. Their success will be determined by their initial ability to understand your challenges and deliver the best possible solution to resolve them. And it all starts with choosing the right partner by asking the right questions.
The U.S. Congress has voted on, and the President has signed, a ban on government uses of video surveillance equipment produced by two of the world’s top manufacturers – Hikvision and Dahua. The provision is buried in the National Defense Authorization Act (NDAA) for fiscal year 2019, which passed the U.S. House of Representatives on July 26 and the Senate on August 1. The President signed the NDAA into law on August 13. The provision was originally introduced as an amendment to the House version of the bill but was not included in the Senate version. However, the provision survived in the final version, negotiated by a conference committee and passed by both houses. The President had previously voiced support for the bill, which authorizes U.S. military spending, and signed it into law two weeks later. Scope Of The Ban The President has previously voiced support for the bill, which authorizes U.S. military spending, and signed it into law two weeks later The ban covers “public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes.” It bans “video surveillance and telecommunications equipment produced by Hytera Communications Corporation, Hangzhou Hikvision Digital technology Company, [and] Dahua Technology Company (or any subsidiary or affiliate of such entities)..” Hytera Communications is a Chinese digital mobile radio manufacturer. The final bill eliminates specific mention of “white label” technology, which refers to cameras manufactured by Hikvision and/or Dahua but rebranded and labeled by other companies such as Honeywell, Stanley or UTC. However, interpretation of the word “affiliate” could include OEM partners. The ban, which takes effect “not later than one year after … enactment,” applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a "phase-out plan" to eliminate the equipment from government uses. The requirement suggests an opportunity of additional government business for non-Chinese manufacturers and integrators involved in switching out the equipment. Mention of the words “critical infrastructure” in the final bill points to inclusion of another whole category of installations in the ban; that is, facilities operated by non-government entities that are judged to be essential to the functioning of society and the economy. The Security Industry Association (SIA) declined to comment on the bill, citing its complexity and the need to research the potential impact. Both Hikvision and Dahua have issued corporate statements in reaction to the ban. The bill can be viewed in the context of a broader U.S. political backlash against China in general Broader Context Of The Bill The bill’s passage is a setback to the growing profile of Chinese companies in the video surveillance market. It can also be viewed in the context of a broader U.S. political backlash against China in general, as evidenced by the recent acceleration of import tariffs and simmering trade war. The NDAA also targets China in another way: it strengthens the Committee on Foreign Investment in the United States, which reviews the impact of proposed foreign investments on national security.The NDAA is an annual act passed by Congress that authorises U.S. military spending Another view is that Chinese companies invest heavily in research and development, can operate at greater scale and with lower costs, and therefore provide good overall value. For these reasons, many had expected Chinese camera products to increase their presence in the US market. The government ban, at the very least, slows down that transition. The potential is there for it to totally change the face of the industry. The NDAA is an annual act passed by Congress that authorises U.S. military spending and is used as a vehicle for a variety of policy matters. It has been passed annually for more than 50 years. The August 1 Senate vote marks the earliest Congress has passed the defense spending bill since 1978. Ironically, the final bill softened restrictions on China’s ZTE Corp. and Huawei Technologies, two telecommunications companies, because of national security concerns. These restrictions are weaker than in earlier versions of the bill. This article was updated on the 14th August 2018.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The Role Of The IT Department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment” They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The Role Of Consultants And Specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The Need For Standards On Cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organizations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analyzed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardized format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardized industry you will ever see, and security is the least standardized. But they’re merging. And that will drive standardization. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management.IT is the most standardised industry you will ever see, and security is the least standardised" The Role Of Training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organization. That would be a good starting point. The Role Of Integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organization, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organization - so training is very important The Impact of Pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
The amount of data generated by today’s video systems – whether resulting from increasing camera counts and/or higher resolutions such as 4K – is presenting new challenges when it comes to storing the data and making it instantly accessible to end users. The surge in data is opening the way in our market for new, more sophisticated IT systems to manage and store the data. In fact, the sheer volume of video data and increasing application demands make some legacy approaches obsolete. Managing And Storing Video Data The surge in “big video” has attracted several players to the market from the IT side. The latest is Hitachi Insight Group, which has introduced new Video Management Platform (VMP) converged appliances for big video applications. The appliances integrate the rack server, network storage, flash modules and virtualization software. There are three models that support from 150 to 10,000 cameras and scale up to 16 petabytes of storage. Each “pre-validated, converged turnkey appliance” is scalable and provides a high-availability foundation for video security, monitoring and analytics, according to Hitachi. The appliances support third party video management system (VMS) software (such as Genetec, Milestone, Verint, et. al.) as well as video analytics and infrastructure monitoring software. Their design emphasises high availability and fault tolerance. Vertical Markets “Our appliance super-charges VMS systems to enable them to operate as they were designed,” says Justin Bean, Hitachi’s Director of Smart Cities Solutions. Hitachi’s systems have been used in the smart cities/public safety sector, and are now being marketed more broadly to corporate and enterprise security applications. "We are bridging the gap between security integrators and ITmanagers with solutions that areeasy to install and support" “We are experts on storage, and we are bridging the gap between security integrators and IT managers with solutions that are easy to install and support,” says Kirill Sokolinsky, Director, Hardware Solutions, Smart Cities and Public Safety, Hitachi Insight Group. Hitachi’s integrated solution replaces the need to combine disparate systems to achieve the needed functionality. "Five years ago it was hard to get end users to talk about storage," says Mark Jules, VP of Public Safety and Smart City Solutions, Hitachi Data Systems. "Now with issues such as compliance and body-worn cameras, store-and-compute is mentioned in every meeting." Some legacy storage systems can lose data, which can degrade video quality by as much as 20 percent and undermine the effectiveness of video analytics systems. Problems include network resiliency, blurred video, delays in pulling up footage, and lapses in footage. Hitachi seeks to solve the problems and offer the technology to more vertical markets, including gaming, transportation, and corporate campuses. Physical Security & ‘Big Data’ Another common term today is “big data,” which highlights the ability to capture large amounts of data and then to analyze it to yield greater knowledge and insights. The physical security market generates a large amount of its own big data nowadays, whether from access control or intruder systems or video. In addition to the “big video” aspect – all those images – surveillance systems also yield more “structured data,” the results of applications such as crowd counting and license plate recognition. Longer storage times (some driven by regulatory compliance requirements) and greater use of analytics are two additional factors driving the need to store more video data. As evidence of the growth in data, Hitachi points to IHS estimates that 337 additional petabytes of data are generated every day from new surveillance cameras this year compared to last. Given the proliferation of data in ours and related markets, it’s no surprise that Hitachi has been drawn to the opportunity. Considering the massive amounts of data involved, it’s likely even more vendors will join in.
PureTech Systems recently announces a delivery milestone for the next phase of the Border Patrol’s Mobile Video Surveillance Systems (MVSS) program. The latest deliveries, consisting of ruggedised Ford F-150 trucks outfitted with telescoping surveillance payloads, are being deployed in San Diego, CA and will support mobile video surveillance up to 6 miles away. Remote Surveillance Scenarios The event was followed by Fox 5 News and ABC 10 News in San Diego and highlighted the value to Border Patrol agents in the field, including rapid deployment and ease of use. The MVSS platform utilizes PureTech Systems’ PureActiv software as its central command and control, providing video intelligence, user interface display and sensor collaboration logic for the surveillance suite which consists of visible and thermal cameras mounted on a telescoping mast which extends over 35 feet in the air. Mobile Surveillance Solution In the interview with ABC 10 News, Michael Scappechio, a supervisor with the Border Patrol, said, it’s their increased rate of arrests that landed the trucks here, “nearly a 90 percent increase is significant, that’s going to get attention, that’s going to get resources, that’s going to get man power, infrastructure and technology.” Border Patrol also furthered that these trucks won’t replace the border wall but instead, will go hand in hand with it. PureTech Systems is teamed with Benchmark Electronics to deliver the complete mobile surveillance with the mission to track and identify Items of Interest (IOI) along the U.S. southwest border and other remote surveillance scenarios where rapid mobile deployment is needed. The most recent delivery of the mobile video surveillance solution is not the first, with several systems already being deployed along the border in Texas.
More and more police forces in the EU are getting equipped with bodycams. Recently the State Police of Niedersachsen in Germany, the Police of Mechelen in Belgium and the Police in the Czech Republic have signed contracts for the supply of bodycams by Dutch company Zepcam. Body Worn Video (BWV) And Body Worn Cameras (BWC) Body worn video (BWV) and body worn camera’s (BWC) improve the safety of law enforcement officers Body worn video (BWV) and body worn camera’s (BWC) improve the safety of law enforcement officers, increase transparency and supply video evidence for criminal investigation purposes. Surveys in the US, where bodycams are used for years now, show that they de-escalate aggression or have a civilizing effect on police-citizen encounters, thus reducing complaints. Also, police forces want to use bodycams as a countermeasure against the public shooting more and more videos of incidents on their smartphones. Unlike public videos, footages captured by law enforcement can be admissible in court. Zepcam, Bodycams Supplier For Police Forces Globally Zepcam already supplies bodycams to police forces in 15 countries like Switzerland, Germany, Hong Kong and The Netherlands. The Dutch company is global supplier in Europe, with clients in over 40 countries. It both manufactures and supplies the camera systems and the IT structure which automatically stores and processes the captured footages. Zepcam has seen and enormous increase in the use of bodycams by law enforcement in the past five years The State Police of German State Niedersachsen has ordered 500 bodycams in a 4-year contract. Zepcam has won this tender because its cameras and software platform made the best match with requirements of field users and the central IT department. The region of Mechelen is the first police zone in Belgium to deploy bodycams on a large scale. Zepcam was selected after a test period with 7 different bodycam suppliers. Video Management Software (VMS) Integration The Czech Police in the Central Bohemian Region purchased Zepcam bodycams for law enforcement purposes. Also, the company will assist the police force to expand and integrate the new video management software in the management software that is used in over 80 locations in the Czech Republic. Zepcam has seen and enormous increase in the use of bodycams by law enforcement in the past five years. According to the company the cameras help reduce aggression and allow for better transparency. For instance, because situations tend to de-escalate when people know they are being recorded.
Hikvision, global provider of innovative security products and solutions, is partnering with Green River, a China-based NGO that promotes and organizes environmental protection activities, in particular towards protecting the bar-headed goose, one of the highest-flying birds in the world. The Yangtze River source and Bender Lake in Western China is a natural high-altitude habitat for the wild bar-headed goose. Although this area is a “no-man’s land” at 4,700 meters above sea level, it serves as a haven for rare animal species. Threatened by poachers and theft of their eggs, the number of bar-headed geese in this area once plummeted to about 1,000. In 2012, Green River launched its program to monitor and protect the bar-headed goose, with non-stop monitoring and protection of the birds and the local environment. Hikivison Security Cameras For Wildlife Monitoring Earlier this year, Green River began using Hikvision security cameras to monitor and protect bar-headed geese. Dozens of bird observation spots have been set up to implement an all-weather, 24/7 monitoring solution in the high-altitude wilderness. Hikvision has provided video technology that reduces the need for conventional manual patrol as well as the associated negative impact of human activities on bird habitats. Green River uses Hikvision equipment to stream high-definition live video to online audiences, raising awareness about the need to protect all kinds of wildlife, including the bar-headed goose. On December 6, 2018, Green River and Hikvision signed a memorandum of understanding (MoU) to continue their collaboration in 2019. Hikvision will develop customized video cameras to be used in high-altitude habitats of the bar-headed goose. The company will continue to support Green River using advanced image processing, data storage and transmission technology, to ensure the organization can effectively collect and process wildlife data. All of this serves to secure the biodiversity and sustainability in the Yangtze River source region. Advanced Video TechnologyPublic welfare and environmental protection are benefiting from high-tech applications around the globe" “Public welfare and environmental protection are benefiting from high-tech applications around the globe. In particular, video technology helps wildlife protection efforts immensely. And Hikvision has the tools as well as the willingness to help,” said Yang Xin, founder and president of Green River. He further added, “Signing this MoU is only a start. In the future, we will collaborate to promote research and conservation, and use new technologies to unveil the beauty of biodiversity.” Environmental Protection Hikvision is best known as a provider of security equipment that is used to secure businesses, communities, and families. However, as evidenced by its collaboration with Green River, Hikvision’s security equipment can also be used to protect our natural world. Noting that Hikvision video technology has been used in a number of environmental protection projects, Hikvision senior vice president Cai Changyang said that the company is pleased to promote environmental protection and conservation. “In the past few years, Hikvision has accumulated valuable experience and technical know-how in environmental protection with video technology. We have engaged in the protection programs for pandas, Siberian tigers, and now bar-headed geese. But there is still a long way to go,” said Cai Changyang. “And, we will continue to explore new technologies in the future to make our own contribution to the sustainable development of the world.”
On his 2018 two-day visit to Ireland for the World Meeting of Families, Pope Francis’s scheduled activity was protected by high-performance Predator and Invictus cameras from UK CCTV design and manufacturing company, 360 Vision Technology. Specialists in a wide range of leading-edge CCTV, Access Control, PA, AV and radio communications, County Kildare-based Mongey Communications was chosen to provide the additional security surveillance protection measures necessary to secure the Pope’s visit to Dublin. With the massive crowds expected to see the pontiff, the temporary surveillance installation needed to be minimally disruptive and use mobile radio to provide the multi-scene coverage required during the two-day visit. Multi-Site CCTV Surveillance The camera images were to be used for co-ordination and management by multiple agencies To support an existing small-scale CCTV installation at the Pope’s final venue of Phoenix Park (the largest enclosed city park in Europe), there was a need for further camera coverage along the park’s approach routes, entrance/exit gates, search areas and general areas of crowd movement and congregation. A similar solution was also required for the Pope’s visit to the Knock Shrine pilgrimage site and the Capuchin Day Center, where public space CCTV was again already in place but of limited overall coverage. Full integration with the existing CCTV system at the 82,300 capacity Croke Park stadium for a papal address to the Festival of Families extravaganza was also required, with communications and CCTV feeds from all locations required to be transmitted back to local on-site control rooms at each location, and additionally to a central Command and Control room at Dublin Castle. At the main Command and Control Center, the camera images were to be used for co-ordination and management by multiple agencies, including the Office of Public works (OPW), Garda Síochána, Defense Forces Ireland, Dublin Fire Brigade, HSE / Ambulance Services and Civil Defense. High-Definition Video Security To Secure Phoenix Park “With 300,000 people expected to attend a papal mass at Phoenix Park to close the World Meeting of Families, we were briefed to provide the very best possible reliability and imaging performance from the additional cameras we employed,” explains Kevin McGrath of Mongey Communications. We needed to be confident of camera reliability straight out of the box, along with simple and fast set-up" He further added, “With this in mind, we needed to be confident of camera reliability straight out of the box, along with simple and fast set-up, and quality high-definition video for forward transmission to the various control rooms. Our very positive experience of employing 360 Vision Technology cameras on many high-security installations in the past led us to be confident about the image and build quality of the manufacturer’s cameras, and product support.” “So, to fulfill the challenges we faced for this high-profile project, we specified the latest version of 360 Vision’s Predator camera, and also their new cost-effective and ruggedized Invictus Hybrid HD PTZ camera.” 360 Vision Invictus Hybrid HD PTZ Camera The new 360 Vision Invictus cameras specified for the project employ the latest compact camera modules with a choice of 20:1 or 30:1 zoom and are available with 1/2.8” Sony StarVis or 1/1.9” Sony Exmor (Ultra) sensor packages. Bridging the divide between analog and IP technology, all Invictus cameras are equipped with Hybrid functionality enabling installation in existing analog systems and also in full 1080P HD IP video streaming networks. Alongside ONVIF 2.4 Profile S compatibility, this means the Invictus range is not only economical, but simple to install, providing Mongey Communications engineers with a reliable, flexible and high- performance solution with which to enhance the existing electronic surveillance measures for the Pope’s 2018 visit. HD IP Video Streaming Networks An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view Further enhancing camera reliability for this important event, the new Invictus camera range design draws cost-effectively on features usually associated with very high-end cameras, including construction from high grade, hardened aluminum and stainless steel, to ensure a rugged, durable and compact camera. An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view, plus the ability to tilt above the horizon – enabling operators to view targets above camera installation height (i.e. up hills) – an invaluable asset where cameras were being installed in the difficult installation and operational conditions of Phoenix Park. Technical Relationship With 360 Vision Technology “Our decision to once again entrust the provision of the best technology available for the project to 360 Vision Technology was proven correct, and we had no issues of consequence with the installation, commissioning and performance of all the cameras - straight out of the box,” explains Kevin. “Because of the condensed set-up period available and challenging terrain of some of the installation areas, we had to act fast to ensure the successful inclusion and full control of the cameras for the multi-agency command and control room,” adds Kevin. “Here our technical relationship with 360 Vision Technology really paid dividends throughout this time-critical project, affording easy integration of all the additional cameras into the control room’s Cathexis VMS. Cathexis VMS Images from the cameras were relayed back to the various event control centres In all, over 60 additional 360 Vision Technology cameras were employed over the various sites throughout the Pope’s visit. With extensive digging and cabling not a practical option, images from the cameras were relayed back to the various event control centers via a network of reliable and secure microwave transmission links, powered by temporary generators and back-up batteries. “The new Invictus cameras were perfect for the role thanks to their low power consumption compared to other similar specification PTZ cameras,” explains Kevin. “Low power consumption really helps when adding multiple cameras to a network with a temporary power system - and meant we could add more cameras for the benefit of maximum scene coverage.” High-Speed Fiber-Optic Connectivity High-speed fiber-optic connectivity between the various remote sites and Dublin Castle was installed, together with video walls at the various control rooms. “The Pope’s visit was a great success with no security issues reported,” says Kevin. “Images relayed to the control room from the additional 360 Vision Technology cameras were vital in the smooth running of the visit and allowed all of the state agencies involved to keep a constant update on the movements of the vast crowds drawn over the pontiff’s two-day visit.” “Our long-term technical partnership with 360 Vision Technology and our direct input in to the development of their new products really pays off with high-profile projects like this,” concludes Kevin. “We have many new and exciting installation challenges on the horizon and I’m confident that 360 Vision Technology camera products will continue to be an integral part of those future projects.”
Asnet Technologies and AVT recently installed an AMX by HARMAN SVSI Networked AV Solution to provide Maritime NZ’s new Risk Coordination Center with a scalable, flexible AV system capable of carrying out military-grade operations. AMX By HARMAN SVSI Networked AV Solution Maritime NZ has a vital role in national security Maritime NZ has a vital role in national security. Their purpose is to ensure that all maritime activities are carried out safely, with minimal impact on the environment and the nation's security. The Risk Coordination Center in New Zealand (RCCNZ) provides search and rescue services to the 3rd largest area in the world, 24 hours a day, seven days a week, 365 days a year. While planning the construction of a new Risk Coordination Center, Maritime NZ reached out to Asnet Technologies for help relocating their existing AV system to the new facility. However, after evaluating the risks involved with moving an aged system, they quickly decided to upgrade to a more modern, flexible technology solution that could adapt to their unique needs. Asnet Technologies selected an AMX SVSI Networked AV solution—one of the first of its type to be deployed in New Zealand. AMX SVSI Solution "Looking at the current Risk Coordination Center, we realized that we needed a new system that could adapt to the future developments of Maritime NZ, and the AMX SVSI system was the best possible solution for our needs,” said Paul Thompson, Account Manager, Asnet Technologies. “We needed the ability to switch any input to any output across their environment. The AMX SVSI solution was able to provide us with the flexibility, functionality, and scalability we needed to get the job done." Maritime NZ is responsible for land, air and sea rescue coordination—which meant the installation of the new AV system needed to be completed quickly to prevent disruption in operations. Leveraging SVSI's simple installation the Asnet team took only three days to deploy the solution. This worked within the tight timeframe, ensuring that the risk coordination center was never offline. AMX N1000 Video Over IP Encoder/Decoders With the new AMX SVSI solution, we can now work faster, smarter and safer" “Our 10-year old video solution was obsolete—and an AV solution is critical for us,” said Aaron Mikoz, CIO Maritime NZ. “With the new AMX SVSI solution, we can now work faster, smarter and safer. During search-and-rescue operations, we can see key information displayed on the screen, providing us with a better understanding of the situation without having to depend on complicated briefings." Asnet Technologies installed AMX touch panels with integrated controllers to integrate the audio system with other AV devices and the AMX N1000 Video Over IP Encoder/Decoders as part of a full AV solution. To be able to address larger groups of people, JBL surface mount and pendant speakers were positioned to reduce audio spill into other areas. The system allows the new and improved RCCNZ to distribute media leveraging common network switches in any size and configuration. "To be associated with Maritime NZ and to provide effective technologies in AV and control products is a privilege for HARMAN Professional Solutions," said Ramesh Jayaraman, VP & GM HARMAN Professional Solutions, APAC. "We would like to thank our country partner, AVT and Asnet Technologies for successfully completing this project within a tight schedule of three days, ensuring zero downtime. To be able to implement mission-critical AV applications for a defense agency is an absolute honor."
The North East Ambulance Service (NEAS) is the first Ambulance Service to trial body worn video cameras in a scheme that launches this week. Approximately 40 of the Trust’s frontline staff will be trying out the use of body cameras in a bid to offer them greater support against the rise of incidents of violence and aggression. Alan Gallagher, Head of Risk, said: “The health, safety and welfare of our staff are of utmost importance. We want to take every precaution possible to ensure that our employees are safe whilst at work.” NEAS staff Adorn Body Worn Cameras “Our staff are reporting more incidents of this nature and we are working closely with the police and other partners to respond to those perpetrators with warning letters and, where necessary, criminal action. From previous reports, we know that most of these circumstances happen away from CCTV covered areas so using body worn video cameras will mean that our staff can record evidence of abuse or assaults when they happen, such as when they are in a residential property attending to a patient." We will continue to work on measures to reduce assaults and liaise with police colleagues" "This move is designed to help us bring more prosecutions against people who put our staff at risk and reduce the assaults and abuse they are currently facing in the line of their work. There really is nothing more disheartening than being hurt by someone that you’ve gone to help, particularly when they already work in such challenging circumstances.” Fighting Crime “We will continue to work on measures to reduce assaults and liaise with police colleagues to ensure action is taken following any criminal acts against staff or the Trust. We encourage all valuable NHS colleagues not to tolerate such behaviour.” The number of reported physical assaults on NEAS staff has increased by 23% compared to last year. The numbers of addresses across the North East flagged for the potential caution or violence has also increased. This sits against a backdrop of more than 350 prosecutions that have been brought for attacks on ambulance staff over the last year nationally. The scale of the problem is believed to be much greater. Emergency Workers’ Safety This follows a new law that was recently introduced, the Assaults on Emergency Workers (Offences) Bill, in which individuals who assault, or attack emergency workers will face longer jail terms if found guilty. The Bill was designed to recognise the debt of gratitude the public feels towards emergency services, and for the courage, commitment and dedication they show every day in carrying out their duties. Footage will be admissible as evidence in the court of law utilizing Edesix VideoManager software platform Mr. Gallagher continued, “We welcome anything that will help to deter people from abusing or assaulting our staff and we hope that by reporting incidents and providing credible evidence where we can, courts might be able to be much tougher when sentencing those found guilty of assaulting and threatening our staff, prosecuting those people to the full extent of the law.” Edesix VideoManager Software Footage obtained in the event of an assault or abuse will be admissible as evidence in the court of law utilizing the features available in the Edesix VideoManager software platform. It will only be used for the purposes of providing evidence to the Police in any enquiry intended for the health, safety and protection of staff. The tamper proof cameras, software and support for the three-month trial have been provided free by Edesix. Richie McBride, Chief Executive Officer of Edesix commented, "We're pleased to provide the North East Ambulance Service with our cameras to enhance the protection of staff and to deter any aggressive behaviour towards NEAS workers."