Video surveillance equipment
Intersec 2020, a popular security, safety, and fire protection trade show, held under the patronage of HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, opened its doors to the latest security safety solutions and three days of agenda-setting discussion, as global industry sources tip the Middle East security sector for 10% annual growth over the next two years. With more than 1,100 exhibitors from 56 countries, Intersec was officially inaugurated by Major General Expert Rashid Thani Al Mat...
Ambarella, Inc., an AI vision silicon company, announced the CV22FS and CV2FS automotive camera system on chips (SoCs) with CVflow AI processing and ASIL B compliance to enable safety-critical applications. Both chips target forward-facing monocular and stereovision ADAS cameras, as well as computer vision ECUs for L2+ and higher levels of autonomy. Featuring extremely low power consumption, the CV22FS and CV2FS make it possible for tier-1s and OEMs to surpass New Car Assessment Program (NCAP)...
Some of the largest machinery in the world depends on the smooth operation of tiny ball and roller bearings. In order to detect abnormalities in bearings that can hamper machine performance, 100% inspection is required by state-of-the-art machine vision systems. Ideally, this inspection would be fast, automatic, and contactless to avoid any damage to the bearings. 3DPIXA 3D stereo line scan camera Active Inspection has developed a system based on the Chromasens 3DPIXA 3D stereo line scan camer...
Paxton has announced the integration of its networked access control system, Net2, with Hanwha Techwin’s newest video management system, Wisenet WAVE. The integration means Net2 users are able to instantly view event-driven video captured by high-definition IP network cameras connected to Wisenet WAVE. Available via a free Net2 plug-in, the integration also allows users to visually verify anyone attempting to gain access to a site, as well as provide video verification of alarm incidents...
The Horwitz-Wasserman Holocaust Memorial Plaza, located in the heart of Philadelphia, is a living testament and tribute to the victims of the atrocities of the Holocaust. The goal of the Memorial Plaza is to educate visitors on this shameful time in history and compel them to work towards a world of tolerance and enlightenment wherein nothing like this could ever occur again. The Delaware Valley Intelligence Center (DVIC), weighed in on the needed security measures. Under the institutional umbr...
In large-scene applications, it is difficult for a panoramic surveillance equipment to acquire real-time round-the-clock data due to a lot of factors such as blind spots, aperture limitation, fixed monitoring scene, etc. Aiming to solve these common problems that most general panoramic equipment are facing, Dahua Technology, a video-centric smart IoT solution and service provider, launches its new Hunter SDT5X Series Camera to bring more benefits to its users. Featuring smart tracking, per...
BCD International, Inc. is pleased to announce the receipt of its commercial license from the Dubai Development Authority. In January 2020, the company will open its Middle East branch in Dubai Internet City, Dubai. The office will serve as the regional headquarters for Video Storage Solutions (VSS), one of the company’s major divisions. VSS will expand its global presence in the METAI region to supply authorized security distributors with video recording and storage appliances that are pre-engineered for video surveillance. Pre-Engineered video recording appliances “We are excited about the fantastic opportunity that our new Dubai Internet City office brings. As our client base and partner relations continue to grow in the Middle East, the decision to expand our physical presence in order to be able to work more closely with them was a logical step,” said Rohit Khubchandani, Regional Sales Director METAI. “Along with the importance of proximity to our customers, this move also demonstrates a major commitment to the marketplace and ongoing growth of our company. Located in the heart of Dubai, the new location will serve as a regional hub enabling the company to service current clients more quickly and address the growing demand for our pre-engineered video recording appliances with guaranteed performance”. VSS’ portfolio of video appliances come pre-engineered with Milestone XProtect®, Seagate SkyHawk surveillance-grade drives and its state-of-the-art storage accelerator, which significantly increases storage scalability, performance and reliability for Milestone Systems projects.
Code Blue Corporation is pleased to announce a number of upgrades and additions to its catalog of industry pioneering emergency communication solutions to provide even more options to customers looking to improve safety and security at their location. CB 2-e Help Point solution upgrade As first exhibited at the Global Security Expo 2019 (GSX) in September in Chicago, USA, the CB 2-e has been redesigned to make it easier to install and more economical. One of Code Blue’s most popular wall-mounted Help Points, the CB 2-e will feature a lightweight, two-piece design that makes installation and maintenance easy for a single person. Additionally, CB 2-e delivers a 4-inch depth that is slim enough to be ADA compliant on any wall, making it an ideal match for high-traffic areas like parking garages and building entrances. Code Blue also is announcing the release of the CB RT, a durable, freestanding pedestal CB 4-s hooded call box The CB 4-s, Code Blue’s hooded call box, and the former CB 6-s, which will now be known as the Surface Mount Enclosure, have been updated as well to be lighter and more economical without sacrificing any of the durability that is synonymous with all Code Blue products. Code Blue also is announcing the release of the CB RT, a durable, freestanding pedestal that can reliably house either the IP5000 VoIP or IA4100 analog hands-free speakerphones. For more than 30 years, the trademarked cylindrical design of Code Blue’s signature pedestal Help Points has served as an easily identifiable means to reliably request assistance at the touch of a button. S-1000 LED Beacon/Strobe light The addition of the CB RT and its rectangular design offers another simple and cost-effective option to effectively install communication devices. Available in either wet- or power-coated paint, the CB RT is 9 feet tall and features Code Blue’s powerful S-1000 LED Beacon/Strobe light that is easily visible in open areas and large campus settings. “These improvements are a direct response to feedback from customers, who need economical choices that are easy to install, but also are durable, visible and reliable,” Director of Distribution, Code Blue Corp., Katie Petre said. “Code Blue prides itself on being the industry leader in quality and customer service, and these upgrades make reliable safety even more obtainable and attractive for both new and existing customers.” Code Blue’s new features and products will be available to order starting January 1, 2020.
Micron Technology, Inc., unveiled the world’s highest-capacity industrial microSD card — Micron® i300 1TB3 microSDXC UHS-I — to address the edge storage needs of the video surveillance market and other industrial applications. The new Micron® i300 1TB microSD card is based on Micron’s advanced 96-layer 3D quad-level cell (QLC) NAND technology, now making it cheaper for small- to medium-sized deployments to have primary storage in the camera compared to a centralized storage architecture. The i300 microSD card enables users of video surveillance systems to capture and store more than three months of high-quality video footage on-device and at the edge. Cloud-based service models “Micron’s i300 industrial-grade microSD cards for edge storage open the possibility for a broad range of video surveillance as a service deployments that no longer require local network video recorders,” said Amit Gattani, senior director of Segment Marketing in Micron’s Embedded Business Unit. “Micron’s 96-layer 3D QLC NAND is instrumental in helping us deliver 1TB of storage in a microSD form factor and at a breakthrough price point to accelerate edge storage and cloud-based service models.” Users of video surveillance systems can now store large amounts of video footage on-device VSaaS systems are increasingly integrating artificial intelligence-based and higher-resolution cameras that require more storage at the edge. The Micron i300 1TB microSDXC card allows 24/7 continuous capture and storage of up to 1TBof high-quality video in the camera. Users of video surveillance systems can now store large amounts of video footage on-device, opening a broader set of uses for cloud-managed solutions. Intelligence at the Edge “Demand for commercial surveillance cameras continues to grow at a rapid pace,” said Jeff Janukowicz, research vice president at International Data Corporation (IDC). “Smart cameras, artificial intelligence, machine learning and threat detection are being driven to the edge for real-time responsiveness, making Micron’s 1TB microSD card an invaluable solution for differentiation and innovation.” The VSaaS market is projected to reach $6 billion in 2022, corresponding to a growth of 22% compound annual growth rate between 2017 and 2022.4 The rising adoption of VSaaS by small to medium businesses and enterprises is attributed to lower overhead costs achieved through ease of installation and elimination of the need for on-site NVRs and DVRs. The ability to store large video footage files in the camera and at the edge reduces the demand for network bandwidth and expenditure associated with continuous cloud storage. Cloud-based implementation models These savings contribute to lowering the overall cost of ownership for businesses while bringing flexibility and scalability associated with cloud-based implementation models. Micron’s microSD portfolio is designed to endure harsh environments in which surveillance systems are deployed "The video surveillance market is quickly shifting toward hybrid cloud architectures that store video footage on-camera, allowing secure access via cloud-based software,” said Raj Misra, director of Hardware Engineering at Verkada. "Enterprise customers are choosing hybrid cloud offerings to reduce operational costs, simplify installation and management, and gain from powerful video analytics. Micron extending its range of reliable industrial-grade microSD cards to 1TB enables us to provide our customers with industry-leading data retention, security and video resolution options at very cost-effective price points." Micron’s industrial-grade microSD portfolio is designed to endure the harsh environments in which surveillance systems are deployed. flexibility, scalability and maintenance efficiency The Micron i300 1TB microSDXC card minimizes frame drops in a 24/7, 30 frames per second (FPS) recording environment, offering twice the reliability of hard disk drives at 2 million hours mean time to failure. The card features a smart tool for monitoring the health of devices. “VIVOTEK has launched a series of edge-computing network cameras and successfully deployed Micron’s high-quality industrial-grade microSD cards,” said Shengfu Cheng, director of Marketing and Product Development Division, VIVOTEK Inc. "Micron’s portfolio of industrial microSD cards up to 1TB equips us to deliver greater flexibility, scalability and maintenance efficiency to our customers, all of which contribute to a better return on investment.” The Micron i300 microSDXC UHS-I card is offered in 128GB to 1TB capacities, which are available for ordering. The entire industrial-grade portfolio includes capacities ranging from 32GB to 1TB.
Scheduled to be held from 19 - 21 January, 2020, INTERSEC 2020 in Dubai will showcase the latest products in security, safety and fire protection. Bosch Building Technologies will display its innovative security, safety and communications products on booth SA-C26 in Saeed Arena. IP 3000i cameras with smart video Bosch introduces another industry first with the all-new range of IP 3000i cameras. The latest portfolio includes a range of four form factors that offer high quality, 24/7 performance with reliable surveillance features for standalone installations or general surveillance. Micro dome, mini dome, bullet and turret cameras are the available options with resolutions of up to 5 MP for indoor and outdoor use. Furthermore, they also offer something never seen before in such competitively-priced cameras, which is built-in Essential Video Analytics as standard. This new range of IP cameras offers smart solutions that were until now not available in a cost-effective video surveillance solution. MIC 7100i IP camera Bosch MIC IP cameras are supremely rugged, constructed from anti-corrosive metal, and can function at -40ºC to +65ºC No matter how tough conditions get, a video security operation must always go on. That is why Bosch has taken extreme measures to develop its MIC IP family of extremely rugged moving cameras even further. MIC IP cameras are built to perform in practically any environment. The housing of the new 7100i has been enhanced with a ruggedized, corrosion-resistant design that makes it perfectly suited for challenging applications where cameras are exposed to extreme conditions. Bosch MIC IP cameras are supremely rugged, constructed from anti-corrosive metal, and can function at -40ºC to +65ºC. Even the built-in Intelligent Video Analytics technology is tough enough to provide maximum situational awareness, even in the most demanding environments. With Camera Trainer, a machine learning functionality, MIC IP cameras can recognize user-specific target objects, such as moving and non-moving object, to alert operators of unusual scene activity. The 4K UHD versions also provide extreme high-resolution for mission critical applications such as city surveillance and congested highways. This makes them ideal for monitoring highways, bridges, tunnels, ports, airport perimeters and more. Intelligent Video Analytics with Camera Trainer technology The new Camera Trainer technology brings machine learning to Bosch IP cameras, enabling integrators to tailor them to detect the objects and situations that matter most. The ability to identify user-defined objects and situations can be combined with the existing alarm rules and object filters of Intelligent Video Analytics for even more flexibility and accuracy. It substantially improves the level of security for people and property and opens up new customized applications and uses. For example, it could be used to separate vehicles clustered in front of traffic lights or to determine how long a vehicle has been parked in a bay. With Camera Trainer, video cameras can be taught to recognize and detect stationary objects or certain situations instead of being triggered by motion. AVENAR fire alarm panel Bosch’s new fire alarm panels AVENAR 2000 and 8000 are a competitive solution for small to large sized applications ranging from campus solutions to affiliate networked projects. It is a future-proof solution to support future market requirements and at the same time, it is compatible with the installed base. AVENAR panel is a Safety Management System providing fire detection and smart evacuation. It integrates also into 3rd party building management systems. AVENAR all-in-one 4000 combine visual and acoustic alarm complying with EN54-3 + EN54-23 standards. More than 125 devices per loop offer high project flexibility. The new wireless system has a radio range with up to 120m in buildings with many walls and up to 180m in buildings without obstacles. It offers high connection reliability thanks to meshed topology and dual-band frequency reducing potential maintenance costs. PRAESENSA IP public address and voice alarm system All components of PRAESENSA are networked, thereby ensuring the highest flexibility and scalability All components of PRAESENSA are networked, thereby ensuring the highest flexibility and scalability from small centralized to large decentralized systems. The Bosch OMNEO IP architecture supports Dante audio networking, AES67 and AES70 protocol. The innovative multi-channel amplifier architecture with intelligent power allocation across the amplifier outputs and integrated spare channel significantly improves the effective utilization of available power, regardless of the loudspeaker load in each zone. As a result, fewer amplifiers are needed, saving up to 50 percent on space, energy and backup battery power and leading to a very competitive cost of ownership. PRAESENSA offers special features for the highest level of data security and full network link redundancy with smart integration of functions and backup facilities. LB20 commercial loudspeakers The LB20 series compact loudspeakers have been designed from the ground up to ensure efficient installation for the contractor and excellent results for the end-user. The series includes 4-inch, 5.25-inch, and 8-inch 2-way models with a matching dual-10-inch subwoofer, making it easy to select a suitable model a specific space. All LB20 models offer Bosch-engineered components for superior sound quality, low-profile looks and robust reliability for a wide range of indoor and outdoor applications. These include retail environments, hospitality settings, such as bars, lounges, patios, pool areas and restaurants, conference and meeting rooms, fitness clubs, performing arts and sports venues and houses of worship. The series offers true weatherproof construction for outdoor spaces, confirmed by extensive and rigorous testing above and beyond industry norms. IP-based DICENTIS conference system Bosch has expanded the DICENTIS family with the DICENTIS Interpreter desk. Speaking the language of the interpreter is what the DICENTIS Interpreter desk is designed to do. By observing and interviewing expert interpreters and technicians worldwide, the desk has been optimized for the real-life needs of interpreters. The result: An interpreter desk that complies with the latest as well as future market requirements and provides the interpreter with maximum freedom to focus on the job through intuitive operation and best-in-class user experience. The installation and configuration of the system is quick and easy. The state-of-the-art IP technology provides the highest flexibility and enables smooth third-party integration into a future-proof solution.
Aventura Technologies, Commack, N.Y., and seven current and former employees have been charged with fraudulently selling Chinese-made video surveillance equipment while falsely representing that the equipment was made in the United States. Jack Cabasso, Aventura’s Managing Director and de facto owner and operator, is among the individuals charged. Unlawful importation and bank fraud The criminal complaint, unsealed Nov. 7 in federal court in Brooklyn, N.Y., charges unlawful importation and conspiracy to commit wire and bank fraud. According to the complaint, Aventura has generated more than $88 million in sales revenue since November 2010, and the charged scheme has been ongoing since 2006. “Mr. Cabasso and his co-conspirators secured products from outside the U.S. while purporting that these products were made in America,” says Treasury Inspector General for Tax Administration Russell George. Chinese products branded 'Made in the USA' “In today’s global economy, ‘Made in the USA’ is too sacred of a mark to fraudulently use for one’s self interest,” states Internal Revenue Criminal Investigation Special Agent-in-Charge Jonathan D. Larsen. In today’s global economy, ‘Made in the USA’ is too sacred of a mark to fraudulently use for one’s self interest"The complaint alleges that Aventura imported networked security products from manufacturers based in the People’s Republic of China, which have known cybersecurity vulnerabilities, and resold them to the U.S. military, other government installations and private customers while claiming they were American-made. In the course of an investigation, the U.S. government intercepted and covertly marked numerous shipments from Chinese sources to Aventura’s Commack headquarters. In some cases, cameras shipped from China were pre-marked with Aventura’s logo and the phrase “Made in USA” accompanied by an American flag. Money laundering and false contracts Four of the individual defendants, including Jack Cabasso and his wife, Frances Cabasso, are also charged with falsely seeking to obtain government contracts reserved for women-owned businesses, even though the company is actually controlled by Jack Cabasso. The couple is also charged with laundering the monetary proceeds of the fraudulent schemes. The defendants are presumed innocent unless and until proven guilty. If convicted, the defendants each face up to 20 years’ imprisonment on each charge in the complaint. Statement from SIA The Security Industry Association (SIA) released the following statement: SIA strongly encourages its members to operate ethically"“The Security Industry Association finds [the] charges issued by the U.S. District Court, Eastern District of New York, against Aventura Technologies and members of its management team to be very serious, and if true, would represent business practices that SIA does not condone. SIA strongly encourages its members to operate ethically and comply with all U.S. laws and regulations. SIA also continues to fully support federal government efforts to strengthen the integrity of our nation’s supply chain. The SIA Board of Directors has begun to review these charges and the status of Aventura’s membership in SIA.”
Geutebrück is well positioned for the industry 4.0. The family-owned company has expanded its portfolio within a short time, from being a pure CCTV supplier of products for distributors and installers to a provider of software-based all-round solutions for safety and process optimization, including for end customers. Part of this were not only comprehensive technical developments or a significantly higher range of services, but also organizational reorganization, such as the Business and Development division that was newly created in April. It includes the Key Account, Key Market Development, Pre-Sales and Marketing departments. Burkhard Henzgen is the General Manager Business Development. He directly reports to the two CEOs Katharina Geutebrück and Christoph Hoffmann. Henzgen is supported by Georg Goffin, Director Sales, who is responsible for the DACH region with his team, and Dr. Christian Gutzen, who also heads the newly created "Pre-Sales" division. User-friendly video security software Museums, KRITIS, banks or public authorities from over 70 countries use Geutebrück's solutions Isabel Kluth, who only joined Geutebrück in October, is in charge of national and international marketing. The Finance, HR and Controlling departments, for which Andreas Degen is responsible as Commercial Director, have also been restructured. Katharina Geutebrück, CEO: "The new management team will ensure that we continue to be experts in a field that only a few providers worldwide are able to master.” Geutebrück is an international provider of highly available, user-friendly video security software and the corresponding hardware. The Geutebrück experts provide consulting and services to customers throughout the planning phase, during implementation and after completing the order. Well-known museums, KRITIS (critical infrastructures), companies from industry and logistics, banks or public authorities from over 70 countries use Geutebrück's solutions. The family-owned company is managed in the second generation by Katharina Geutebrück and her husband Christoph Hoffmann and celebrates its 50th anniversary in 2020.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorized parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorized personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilizers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyze a security event, machine learning can analyze the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the center of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level,” Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centers, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organization has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centers, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions. Mergers and acquisitions have been commonplace in the integrator spaceBeyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognized brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy.” He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted.” Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning "We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customization during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a cellphone credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cybersecurity, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasizing “cybersecurity by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cybersecure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analog with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cybersecurity requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available”“We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organizations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organizations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our healthcare mini series here and here.
As one of the most important provinces of Argentina, Buenos Aires Province has been seeking to improve work efficiency and emergency response speed of its police force. However, the local police was always lacking of evidence when performing legal actions towards violence, traffic accidents, and other social incidents. This created temporary loopholes in law enforcement that criminals and erring people took advantage of in order to escape legal sanctions. For this reason, the Ministry of Security of Buenos Aires Province required powerful security tools to assist the local police in patrolling and enhancing the overall level of safety throughout the province. Strong and modern security equipment The Ministry of Security of Buenos Aires authorized the Dahua team to conduct research The Buenos Aires police sought strong and modern security equipment that could monitor the roads during police patrol, while keeping records as evidence. Additionally, they required a management terminal on the dashboard of each patrol car to allow the user to view videos in real time and manage all the surveillance equipment via the system. The technical equipment must be installed in a suitable position to avoid damage in case of car accident or airbag activation, and to ensure passenger safety under adverse conditions, such as weather changes, vehicle temperature shift, etc. After presenting Dahua Mobile Solution that could fulfill the aforementioned requirements, the Ministry of Security of Buenos Aires authorized the Dahua team to conduct research and implementation of this project. Monitoring road conditions The Dahua Mobile Solution covered 400 patrol cars of the Buenos Aires police, each of which was equipped with six HD cameras, including two different models of 2MP Mobile HDCVI IR Dome Camera – HDBW1200F-M and HDBW2241F-M-A, 3MP Network IR Mini-Bullet Camera IPC-HFW1320SP, and 2MP Mobile HDCVI IR Cube Camera HAC-HMW3200. Five cameras were also installed outside each patrol car to monitor road conditions from every angle In addition, five cameras were also installed outside each patrol car to monitor road conditions from every angle: HDBW2241F-M-A on both sides; HDBW2241F-M-A and IPC-HFW1320SP on the front top; and HAC-HMW3200 at the back. All of the products support IP67& IP6K9K, shock-proof, and resistant to vibration and severe weather conditions. HDBW1200F-M was installed inside each car to monitor its situation and regulate police behavior. As part of the requirement, the management terminal was installed at the center of the dashboard and linked to the central server through a 10/100 wired Ethernet connection via an RJ45 connector. Automatic recognition technology In addition to the cameras, Dahua Mobile Video Recorder MXVR4104-GFW was also deployed for efficient video storage. Its embedded GPS positioning allows the user to track the vehicle in real time. In case of emergency, it will trigger the alarm and automatically upload the data on time. It also supports image capturing of suspected vehicles and uploads them to the management platform It also supports image capturing of suspected vehicles and uploads them to the management platform. Indeed, Dahua Technology has launched a smart police car solution to aid the police in identifying suspected vehicles and people. Featuring automatic recognition technology, the new device can compare suspected vehicles and people with the information in its database, achieving efficient mobile control and identification. Mobile video surveillance solution With the implementation of Dahua Mobile Solution, the Buenos Aires police can now manage social security better through a comprehensive monitoring system. The mobile surveillance system with high-definition image quality and other advanced functions enabled the police to obtain first-hand evidence, achieve timely intervention and control dangerous and detrimental activities during their patrolling. This significantly improved their work efficiency, stabilized social order, and helped build a safe and harmonious community. “We are very satisfied with Dahua products. The mobile video surveillance solution used in police cars enables our police to work more efficiently and safely because the surveillance center is available 24 hours a day, providing appropriate assistance in solving various issues or incidents that the police may encounter. ” Said Dr. Ignacio Greco, Deputy Secretary of the Provincial Ministry of Security, Buenos Aires.
With the opening of the new Thomson Nature Park, Singapore, the National Parks Board (NParks) recently unveiled a new system to help detect wildlife crossing the roads between forests and provide real-time warning messages for approaching vehicles, so that the vehicles can slow down and let the animals safely walk onto the other side (The Strait Times). IronYun AI NVR Animal Detection solution IronYun AI NVR Animal Detection is the solution that NParks has selected to realize the system IronYun AI NVR Animal Detection is the solution that NParks has selected to realize the system. On one hand, AI NVR uses deep learning AI models to accurately recognize animals versus vehicles and people via camera feeds on the roadside. On the other hand, AI NVR integrates with signage systems to trigger the appropriate alerts when such animals are detected. Wildlife protection program: “Thomson Nature Park (TNP) is a 50-hectar (124-acre) green space to buffer between the eastern forests of the Central Catchment Nature Reserve and the new infrastructure developments. TNP is separated from the Nature Reserve by a 3-km-long Old Upper Thomson Road, on which visitor cars frequently travel. Animals, however, do not recognize manmade geographical boundaries”, said NParks Director for Conservation, Sharon Chan, and thus often walk across the road from the forest into TNP and vice versa to forage for foods and find mates. Animal-vehicle collisions have occurred because the cars and motorcycles cannot see the animals and stop in time. Meanwhile, biodiversity surveys have indicated that many native animals, including critically endangered species such as the Raffles' banded langur and the Sunda pangolin often cross this road. Several measures have been implemented to protect the animals, including: Aerial crossing: a rope ladder and a single rope crossing along the Old Upper Thomson Road to help canopy-dwelling animals crossing overhead Culverts: five culverts to help ground-dwelling mammals crossing underground Reducing traffic: turning Old Upper Thomson Road from a dual-lane road to a single-lane road in June 2018; plans to close the road to vehicles between 7:30 pm – 6 am daily in the future Roadway animal detection system: a combination of IronYun AI NVR, cameras, and signage to alert vehicles to slow down from afar when an animal crosses the road In particular, the roadway animal detection system is co-funded by NParks and the Land Transport Authority (LTA) to reduce animal-vehicle accidents. At the heart of the system is IronYun AI NVR. AI technology for wildlife protection The system is guaranteed to recognize a human versus an animal versus a vehicle AI NVR is a deep learning video analytics solution, which can distinguish several types of objects, including vehicles (car, bus, motorcycle, etc.), people, manmade objects (backpack, suitcase, etc.), and animals. IronYun engineering teams train the AI models using thousands of hours of video data to ensure high accuracy, so the benefits are two-fold: No false alarms: the system is guaranteed to recognize a human versus an animal versus a vehicle. As an improvement compared to legacy sensor-based systems, motions caused by tree branches swaying, people walking/biking, cars driving by, etc. do not trigger any alarm. In this case, only an animal crossing the road would trigger an alarm. Easy to use: no calibration to the environment is required. The model is pre-trained and ready to use from day 1. AI Network Video Recorders (NVRs) The LTA and NParks users set the alert rule so that when an animal appears, AI NVR recognizes, records the metadata and triggers lights to flash under a sign that reads ‘Animals Ahead’, all within 3 seconds. The car sees the flashing light and slows down, allowing the animals to reach safety. The unintrusive monitoring and alert system AI NVR has proven useful The current system supports 5 cameras along Old Upper Thomson Road. The system was announced on October 11, 2019, and is a year-long pilot project in the joint effort of LTA and NParks to protect wildlife in Singapore national parks. Unobtrusive and alert video system While the rope crossing and culverts help providing the animals safe alternative travel routes, Dr. Andie Ang, a primate scientist and chair of the Raffles’ Banded Langur Working Group, has commented that it would take time for animals like the Langurs to get used to artificial structures, so long-term monitoring is necessary. Therefore, the unintrusive monitoring and alert system AI NVR has proven useful. According to LTA Chief Executive, Ngien Hoon Ping, “Joint efforts, such as the one on the roadway animal detection system, help us understand how technology could be deployed to achieve our aims.”
Ciudad Ros Casares has become one of the most important business parks in Valencia, Spain. It is a unique commercial and residential construction, which responds to the new business and networking requirements. The intercommunication system chosen by the project managers is the MEET IP System from FERMAX, because of its high performance and integration features as well as the security offered by MEET. The system includes integrated access control in the standard panel: facial recognition (up to 6,000 users can be registered), numeric keypad and MIFARE proximity reader. The system includes integrated access control in the standard panel: facial recognition (up to 6,000 users can be registered), numeric keypad and MIFARE proximity reader Residential management software The project has a total of 245 apartments in 2 buildings, with two outdoor panels per building plus a concierge service managed with MEET's residential management software. The chosen outdoor entry panel is the MILO Digital Touch Panel and the 245 apartments are equipped with the MIO 7'' Monitor. The project is equipped with high technological features and qualities of different types, large leisure and green areas, general and specialized services and an excellent geo-strategic location. This commercial condominium includes offices, stores, a business center, spaces built to organizing events and apartments for rent. The installation of Fermax MEET system started in January 2019. Learn more about MEET by Fermax in this video:
Bluebird House is a specialist UK inpatient facility, providing treatment and care for young people with complex mental health problems which mean they pose a risk to themselves or others. Run by Southern Health NHS Foundation Trust, the center also houses adolescents detained under the Mental Health Act, so the highest standards of care, protection and security are required. As part of a wider review of security and safety across the trust, Bluebird House was earmarked for a comprehensive video surveillance upgrade and IDIS technology was chosen as the best-fit for this major project. Providing comprehensive coverage All IDIS equipment uses true plug-and-play set up, which minimizes disruption and disturbance to patients Galeco engineers installed 110 IDIS 12MP Super Fisheye cameras in communal and therapeutic areas inside the facility and over 40 bullets and 13 PTZ cameras cover the exterior. All the cameras are connected to six 32-channel NVRs and managed via IDIS Center video management software (VMS). All IDIS equipment uses true plug-and-play set up, which minimizes disruption and disturbance to patients, while protection against gaps in footage is provided by IDIS Smart Failover ensuring 24/7 continued recording even during network instability or drop-out. Implemented across three secure wards and two high care units, the 12MP IR Super Fisheyes provide comprehensive coverage much more affordably than two or more fixed lens cameras. Advanced IDIS video capture technology delivers complete high-definition scene coverage in all lighting conditions and allows staff to de-warp in live view as well as playback. Automatic object detection The 5MP bullet cameras, deployed around the building exteriors provide coverage of gardens, courtyards and car parks. IR LED that allows night-time image capture at distances up to 30m and includes intelligent functions such as active tampering alarms and trip zones and will notify the security team to any breach. Each camera is set to perform virtual guard tours at specific times throughout the day and night IDIS 31x Zoom IR PTZ cameras are installed along the perimeter to provide clear night-time image capture at distances up to 200m. Each camera is set to perform virtual guard tours at specific times throughout the day and night. Featuring automatic object detection, the cameras recognize and automatically track objects, people or cars capturing useful footage and alert operators of any suspicious activity. To meet patient privacy requirements, access to live and recorded footage, is limited to staff according to their ward and role. Access to advanced features and functionality Staff can only view and review footage from their area of responsibility at designated monitoring stations using specialist IDIS monitors designed for high-performance surveillance operations. To meet future requirements, the new IDIS solution can be linked to the trust’s local area networks (LANs) without increasing cyber- security concerns, thanks to IDIS’s use of proprietary software which is inherently resilient. The totally cost-free IDIS Center video management software (VMS) gives security managers and senior staff a complete overview of the entire site from a 24/7 manned and centralized control room. Using the intuitive IDIS Center interface, operators have complete command and control of each camera and access to advanced features and functionality to ensure the secure and smooth day-to-day running of the site. Authorized monitoring and access of footage IDIS technology made this easy, and it was also the quickest and least disruptive to install Video surveillance is a key resource for clinicians, Sr. managers and security staff at Bluebird House as they need to work closely together to deal with incidents and reduce risks of harm. Improved video coverage was needed as it would allow ongoing review of care standards and full investigation of any alleged incidents. Patient privacy is also of paramount importance, so specialist integrator Galeco Communications was selected to implement a solution that would allow authorized monitoring and access of footage for specific rooms and wards. IDIS technology made this easy, and it was also the quickest and least disruptive to install, the most secure against cyber-attacks - in compliance with NHS requirements – and yet would deliver the lowest total cost of ownership (TCO). Ensuring better safety and security Replacing the centre’s aging camera system, the IDIS solution would give complete coverage of corridors, wards and other high-risk areas in all lighting conditions. The IDIS solution has improved security, safety and care at Bluebird House by providing a complete video record of events. Exterior cameras ensure better safety and security in outdoor communal areas Footage from the 12MP Super Fisheye cameras give a full 360 view without any blind spots with a choice of 6 view modes and crucially provides staff with the ability to de-warp footage retrospectively. Now, if incidents need to be investigated it’s a simple task to retrieve video and provide any high-definition evidence required. Exterior cameras ensure better safety and security in outdoor communal areas, while security operators can quickly detect and respond to any suspicious activity on the perimeter. Access and review recordings "A key benefit for us is that this new system is so easy to use, and particularly for our clinical staff who can now access and review recordings to help them improve patient care. This video technology gives us extra confidence that our patients and staff are safe and protected” said Tracey Edwards, Head of Security at Southern Health NHS Trust. With minimal disruption, and working in this sensitive location, Galeco engineers were able to replace an outdated system with an affordable, high-performance, cybersecure solution that is easy to maintain and operate without any ongoing license fees.
Body Worn Cameras (BWCs) are transforming policing and security around the globe, helping to create new connected officers who can stream video, access information and collaborate in real-time enabling them to operate safely and more efficiently in the field. Richie McBride, Managing Director of BWC experts Edesix, says "BWCs are now built for a connected world and are being used by officers on the front line to help prevent both criminal and anti-social behavior when out on patrol.” Importance of body worn cameras in policing Innovative solutions driving creation of connected officers who can stream and access information in real-time He adds, "Technology has transformed policing and security in recent years. New innovative solutions have driven the creation of new connected officers who can stream, access information and collaborate in real-time. BWC captured footage not only provides greater transparency of interactions with the public, but also significantly increases early guilty pleas and saves officers valuable time as they often do not need to attend court”. Richie further said, "Police officers have always been connected, either to the public and communities they serve, or with their colleagues on the street and in the control room. They have shared information and generated insights to help address common problems and protect those with common vulnerabilities. However, digital technology has now enhanced these connections, enabling officers to feel more empowered, supported and secure." VideoBadges enhance police personnel VideoBadges have been utilized by police forces across the UK for some time now. Police forces, such as the Police Service of Northern Ireland (PSNI), have utilized our BWCs since 2016 to enhance the security of both officers and the general public, and to improve training and best practice. There are now 2,500 cameras being used by over 7,000 officers covering approximately 173,000 incidents each year in Northern Ireland. The BWCs are being utilized by Local Policing Teams, Neighborhood Policing Teams, Tactical Support Groups, Roads Policing Units, Dog Section, District Support Teams and Armed Response Units. Importance of good video evidence Body Worn Video has the potential to improve the quality of evidence provided by police officers" PSNI Superintendent David Moore adds, "Video evidence puts the victims of crime first. The pilot of this technology in Foyle district demonstrated how Body Worn Video has the potential to improve the quality of evidence provided by police officers and thereby increase the number of offenders brought to justice. Video evidence provides a compelling account of events and enables the raw emotion and action from a scene to be replayed in the courts in a manner that could never be captured in a witness statement.” He adds, "It also supports accountability and transparency, both of which are key elements in increasing public confidence in policing. The introduction of this new technology is the latest example of our commitment to these principles as we continue to work together with the community to keep people safe." Head-mounted cameras Armed response and firearms teams are also being equipped with head-mounted cameras due to the fact that chest-mounted cameras could potentially obstruct an officer's view during firearms use. The Metropolitan Police recently began rolling-out 1000 head-mounted cameras, with West Yorkshire Police and North Wales Police following suit.
The city of Bologna has chosen Wisenet video surveillance cameras to help it create a smart traffic management system. Bologna is the seventh most populous city in Italy. It is at the center of a metropolitan area of approximately one million people with a diverse range of traveling requirements within a very large area. The City has always invested in traffic control and monitoring systems with the aim to make travel easier and faster for its citizens. An example of this is a centralized traffic light management system which has been in operation since 2013 and has helped reduce travel times within the urban area. Video surveillance solution The purpose was to provide a tool to allow authorities to take strategic planning measures The City wanted to invest in a video surveillance solution which would allow the monitoring of 12 vehicle access gates to the city in order to provide authorities with reliable real-time information about urban mobility. The purpose was to provide a tool to allow authorities to take strategic planning measures and optimally redistribute the traffic load on the road network. After extensive research, which included the evaluation of a wide range of possible solutions, a decision was made to procure a total of 89 Wisenet cameras manufactured by Hanwha Techwin. The implemented solution consists of cameras dedicated to vehicle counting and classification, and ANPR cameras which have been installed on strategic gates. The cameras monitor both directions of travel to allow local authorities to study the most important and strategic vehicle access flows to the city. Detecting illegally parked vehicles This is made possible thanks to the latest generation of Wisenet cameras. By integrating high image quality and advanced video algorithms, Wisenet ‘intelligent’ cameras are able to enhance the value of video surveillance by supporting mobility and security in Smart Cities. 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data, an edge based application developed in cooperation with Sprinx Technologies which facilitates the collection of statistical data about vehicle flow. By tracking the vehicles moving in a camera field of view, the application is able to provide information on vehicle counts, classification and average speed. 24 of the other cameras installed are Wisenet XNO-6120R/FNPs. These feature Roadway Licence Plate Recognition application which is able to help the local authority’s control room operators detect illegally parked vehicles and other traffic infringements. Built-In IR illumination Effective with all European number plate formats, the application has more than a 95% recognition accuracy whatever the environmental conditions, even when vehicles are moving at speeds of up to 150 km/h. The Wisenet XNO-6120R is a 2 megapixel bullet camera which is able to capture high definition images with the help of a 12x optical zoom, digital image stabilization with built-in Gyro sensor, a Defog feature and built-in IR illumination. Part of the Wisenet X camera series, the XNO-6120R features the World’s best Wide Dynamic Range (WDR), which performs at up to 150dB to produce clear images from scenes that contain a challenging mix of bright and dark areas and normally result in overexposed or underexposed images. Real time automatic incident detection The Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins The processing power of the Wisenet 5 chipset incorporated into the Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins for different applications, such as number plate recognition, vehicle counting/classification and real time automatic incident detection. Completing the camera line-up are 41 Wisenet SNP-L6233RH 2 megapixel 23x IR PTZ dome cameras which have been carefully located at major road junctions throughout the city, in order to allow control room operators to zoom in to see close up detail of any incidents. Traffic management solution “We are delighted with how easy it has been to successfully integrate the Wisenet cameras with our existing video management platform and our other supervision monitoring systems,” said Alberto Nuzzo, Head of Office 'Digital Infrastructure and Telecommunications', at Comune di Bologna, when commenting on the success of the traffic management solution. “The data captured by the Traffic Data and ANPR applications running onboard the cameras, is allowing us to far better manage the existing levels of traffic, whilst also helping us capture and store valuable data which we will be able to analyze to assist us to plan for the future. Our control room operators have been particularly impressed with the exceptional clarity of the images captured by the cameras and the data analytics capabilities of the system, which are enabling them to accurately visually verify what may be occurring and quickly take appropriate action.”
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
Video surveillance equipment: Manufacturers & Suppliers
- Bosch Video surveillance equipment
- ComNet Video surveillance equipment
- NVT Video surveillance equipment
- Dahua Technology Video surveillance equipment
- LILIN Video surveillance equipment
- Teleste Video surveillance equipment
- FLIR Systems Video surveillance equipment
- Video Storage Solutions Video surveillance equipment
- Tamron Video surveillance equipment