Visitor management systems
Paxton’s longstanding access control system, Net2, receives its latest software update. The highly anticipated new feature, Checkpoint Control, supports COVID-secure sites. This additional functionality helps Net2 users protect employees and visitors by monitoring and approving people as they enter buildings. Throughout the first half of 2020 the creation of Checkpoint Control was underway, along with the unforeseen global spread of the coronavirus COVID-19. During this time lockdown and...
Interface Security Systems, a managed service provider delivering business security, managed network, and business intelligence solutions to distributed enterprises, announced it is now offering interactive remote video monitoring service with automated voice-down options to help its retail and restaurant customers promote social distancing and mask-wearing guidelines on their premises. A growing number of retailers and restaurants are reporting increased incidents of agitated customers and in-...
Safetrust, a globally renowned virtual credential solutions provider, has announced bringing Touchless Mobile Access and WiFi options to the millions of HID iCLASS SE and multiCLASS SE readers deployed currently with their new SABRE MODULE. Touchless Mobile Access The 30-second plug-in makes the SABRE MODULE the fastest way to enable touchless mobile access at the door, turnstile or elevator, while using existing readers. SABRE MODULE enables hands-free access authentication from a configurab...
Johnson Controls is announcing exacqVision 20.09, which offers an integrated, cost-effective face mask detection solution that can quickly put information into the hands of facility decision makers to help maintain safe environments for employees and visitors. Based on Artificial Intelligence (AI) analytics versus pixel-based analytics, exacqVision 20.09 with Face Mask Detection offers improved accuracy and a scalable, efficient solution for organizations where public health and safety is a pri...
Panasonic announced its collaboration with the software company A.I.Tech. It brings together i-PRO’s security cameras with built-in AI capabilities and ground-breaking intelligent applications to provide a range of business solutions based on deep learning, many applicable to the current COVID-19 environment. The deep learning applications run directly on the cameras themselves, eliminating the need for additional servers for analytical calculations while maintaining the same high levels...
FelenaSoft announced the release of Xeoma software version capable of detecting people that are or are not wearing protective facial masks. With the start of the pandemic a facial mask has become an essential part of the everyday life and an integral element of the safety rules in many governments. Thanks to current technological advances, cutting-edge solutions like Xeoma can aid humanity in the struggle. Xeoma’s Mask Detector is a fully automated, artificial intelligence-powered feature...
2N, a global provider of IP access control systems, introduces its new 2N Indoor View answering unit for accepting video calls from 2N IP intercoms, making the whole intercom experience more stylish in the luxury apartments. The 2N Indoor View answering unit is equipped with a 7” color touchscreen display, providing a detailed view of incoming people from its scratch resistant 4-mm tempered glass panel. Users can easily and quickly display live video from the intercom and see who is at the front door in real-time, or they can replay missed or unanswered calls from unexpected visitors who have left a message. As the video call preview is enlarged, residents can read a courier’s name tag with ease. HD audio and noise cancellation also optimize the listening experience. Home automation systems All four products in the portfolio were developed with a focus on protecting customers from cyber security threats In addition, users will appreciate how easy it is to operate the unit on the large display and the home screen can even display the current weather forecast. There is also a new office stand so the unit can be used in the office interior as well. The 2N Indoor View completes 2N’s portfolio of answering units for 2N door intercoms, each of which meets the needs of a different target group and has its own 2N operating system and stylish design. The other products in the portfolio are the 2N Indoor Touch 2.0, which provides full integration with home automation systems and was the winner of the prestigious Red Dot Design Award, 2N Indoor Talk which won the iF Design Award, and the 2N Indoor Compact, both designed for normal residential complexes. All four products in the portfolio were developed with a focus on protecting customers from cyber security threats as well as on ensuring their physical safety. Great user experience Tomáš Vystavěl, 2N’s Chief Product Officer, said: “We have been inspired by our customers and we know that they take design just as seriously as innovation. The 2N Indoor View is a premium answering unit which is the result of our ongoing commitment to developing cutting-edge devices and setting the industry benchmarks." "Modern residential apartments deserve a great looking unit, and no one will be embarrassed to put the 2N Indoor View on the wall of their kitchen or living room. It will fit perfectly and provide a stylish look with a great user experience.” Highest quality audio components This is a premium product, so it was essential to come up with a design which added real aesthetic value" The 2N Indoor View comes in either a black or white design and the emphasis was placed on the selection of components of the very highest quality. The answering unit is protected by highly-resistant, carefully crafted glass and utilizes the highest quality audio components to achieve a clean sound without any echoe. The stylish new design was developed by a top Czech designer, Kryštof Nosál, who has won a number of prestigious international design awards including Red Dot, Good Design and the iF Design Award. Kryštof Nosál said: “This is a premium product, so it was essential to come up with a design which added real aesthetic value. It also needed to be flexible enough to fit seamlessly into all interiors." Custom operating system "The final design is an evolution from two earlier 2N products that we worked on - the Indoor Talk, which received an iF Design Award, and the Indoor Compact - with an emphasis on a sophisticated, classic look.” To install the device, all one needs is a UTP cable and an installation box. The 2N custom operating system is the guarantee of reliable operation and simple configuration. The device can also be configured remotely without the need to travel to the installation site. The product was developed and produced in Europe.
Dahua Technology, a globally renowned video-centric smart IoT solution and service provider, made new breakthroughs in the field of AI technology recently. Various indicators of its Gait Recognition Technology have once again broken the record of CASIA-B gait dataset: the average accuracy of Rank1 for NM (normal walking), BG (with a bag) and CL (in a coat) reached 97.4%, 94.0%, and 87.0% respectively, hitting another historical heights and maintaining its pioneering position. Gait recognition uses body shape and walking posture to identify a person, even if his/her face is occluded. It is one of the biometric recognition technologies with the greatest potential for long distance recognition scenarios. Gait recognition analysis Aiming to address the technical difficulties of gait recognition in clothing changing search, carrying changing search and cross-view search, Dahua Technology integrates innovation and application of multi-modal gait algorithms, local gait feature extraction, and spatio-temporal gait feature extraction technologies. Dahua Technology has been cultivating and innovating in the field of AI technology Combined with powerful model training and object recognition, it greatly improves the algorithm's robustness in special scene applications such as clothing changing, similar clothing, facial occlusion, and facial disguise, and thus making the gait recognition analysis more accurate and efficient. In recent years, Dahua Technology has been cultivating and innovating in the field of AI technology, and has continuously improved its core competencies that include algorithms and computing power. Fundamental AI capabilities So far, Dahua Technology has received numerous first-place recognitions in various global AI ranking categories including Scene Parsing, Binocular Stereo Matching, Remote Sensing Image Analysis, Person Re-identification and Visual Target Tracking Algorithms. It has accelerated the transformation of its AI technology achievements into real and actual production, maintaining its pioneering edge in the industry. Based on the construction of its fundamental AI capabilities and resources, Dahua Technology has released its new generation AI platform. It integrates computing centers, data centers and training centers in order to build its sustainable capabilities in the fully linked development of AI, including data management, algorithm training, cross-hardware platform optimization, integrated deployment, and automated testing. Intelligent business applications Dahua Technology combines industry development and diversified needs of users It provides guarantees for algorithm research and application, improves efficiency of AI research and development, and helps users build intelligent business applications and accelerate end-to-end AI industrialization. At the same time, Dahua Technology combines industry development and diversified needs of users, focusing on AI technology fields such as smart transportation, smart travel, behavior analysis, item analysis, navigation and positioning, multi-dimensional sensing, as well as smart coding and decoding. Digital and intelligent transformation It has accelerated the development and upgrade of its algorithms for application scenarios, quickly realizing the commercial coverage of smart products and solutions in the whole system, and empowering customers to innovate in a wide range of applications. These include public security, transportation, finance, communities, energy, education, manufacturing, construction sites and other industries, thus assisting users in achieving their digital and intelligent transformation. In the future, Dahua Technology will continuously adhere to the concept of "Empowering industries with AI" in promoting the in-depth integration of AI technology and various industry scenarios, fully utilizing the support and leading role of technological innovation in the sustainable development of hundreds of industries. The company will advocate popularization and application of AI and other new generation technologies in order to empower the digital transformation and upgrading of all industries.
Temperature monitoring expert, AMETEK Land, has partnered with sister company, Telguard, to offer the VIRALERT 3 non-contact human body temperature screening system as part of Telguard’s distribution channel to the security sector. The VIRALERT 3 provides a camera, thermal imager, and a temperature-controlled reference source on a single mounting platform. Using automatic face detection, the system ensures a valid reading, and provides a measurement that’s accurate to within 0.5oC/ 0.9oF, it then calculates core body temperatures through a rapid test procedure that lasts less than two seconds. Infrared thermal imaging Developed over 18 years by AMETEK Land experts, the VIRALERT 3 provides real-time infrared thermal imaging from a safe social distance. It is designed to screen visitors for elevated skin temperature at an entry point without slowing the flow of people or the need for person-to-person contact. The VIRALERT 3 is easy to use and can be left to operate automatically, with audible and visual alarms alerting when high temperatures are discovered. To ensure the highest levels of accuracy and reliability, it has a blackbody calibration source fitted on the same platform as the integrated thermal imager/visual camera. This makes for a compact system that won’t get in the way of queueing people and can be easily wall or desk-top mounted. Security sector Justin Smith, AMETEK Land Vice President said, “Partnering with Telguard is a perfect fit. Telguard is a leader in cellular communications devices for security systems, and VIRALERT 3 complements these products, providing the security sector with all the systems they need to open facilities safely, and just as importantly, to stay open.” The VIRALERT 3 builds on AMETEK Land’s proven expertise in temperature technology. The company has been developing high-accuracy infrared measurement instruments since 1947 and has been creating human body temperature screening systems since responding to the SARS outbreak of 2002.
SureCloud, the provider of cloud-based, Governance, Risk and Compliance (GRC) solutions, has been recognized by Gartner as a Challenger in the 2020 Gartner Magic Quadrant for IT Vendor Risk Management (VRM) Tools, for completeness of vision and ability to execute. SureCloud’s position on the ability to execute axis improved since the previous year’s Magic Quadrant for IT VRM Tools, where it was recognized for the first time as a Niche Player. The 2020 Gartner Magic Quadrant report evaluates IT Vendor Risk Management solution providers, recognized by Gartner as offering comprehensive solutions, and categorizes them into four categories: Niche Players, Visionaries, Challengers, and Leaders. Risk management processes The Quadrant provides a view on how well IT VRM providers are executing their stated visions and performing against Gartner's market view based on customer feedback and solution demonstrations. According to Gartner, “The IT Vendor Risk Management use case focuses on the process of ensuring that the use of third-party service providers and IT suppliers does not create an unacceptable potential for business disruption or a negative impact on business performance.” Vendor Risk Management solutions enable organizations to accurately ascertain the security and compliance risks associated with their IT third-parties, creating a centralized register of these parties, and integrating this with wider risk management processes. Vendor risk management I am proud to see that SureCloud’s vendor risk management product is a comprehensive solution" Richard Hibbert, CEO and Co-Founder of SureCloud, said: “We are delighted that SureCloud has been recognized as a Challenger. From our view, this underlines our strategy to continuously innovate and develop our GRC solutions. In particular, I am proud to see that SureCloud’s vendor risk management product is a comprehensive solution that offers a central view of an organization’s vendor assurance program." SureCloud has also been recognized this year as a Challenger in Gartner’s August 2020 Magic Quadrant for IT Risk Management, which they believe validates the platform’s ability to deliver a complete GRC program by encompassing IT Risk, Compliance and Vendor Risk processes. Highly sensitive data Vendor risk management is a crucial part of any organization’s cybersecurity and risk program, with the number of third parties having access to highly sensitive data and therefore offering a simple route new risks and threats to be introduced to the organization. Demonstrating that each third party’s approach to security and risk management meets your internal standards and regulatory obligations is vital to ensure you are managing vendor risk effectively. SureCloud’s Vendor Risk Management solution is designed to offer a simple out of the box framework for organizations to assess and review all their IT third party vendors for potential risks - in one scalable, flexible and highly configurable software-as-a-service (SaaS) solution. SureCloud’s Third-Party Risk Management software solution provides: A centralized register of all third-party IT vendors, giving a comprehensive view of risk. End user-configurable and dynamically generated risk-assessment for each third party, ensuring that the questions they are asked are ones that apply to them. Full integration with regulatory compliance data and wider IT risk management Automated third-party notifications and simple to use reporting.
As places of work start actively planning to safely open, Vanderbilt are providing customers with smart and reliable strategies to help create a safer environment for staff and visitors. Topics include: Creating social distancing solutions to allocate time slots and to ease people traffic flows Reducing transmission among employees by creating contact tracing reports on one’s access control system Maintaining healthy business operations by using one’s access control system to run a cleaning rota report Ensuring a healthy work culture by implementing temperature and facial mask detection By attending this webinar, one can also download the exclusive 'How your Access Control system can help you re-adjust your business to re-open, and STAY open' whitepaper.
Milestone Systems announced a webinar panel discussion of safety and security professionals, including representatives from Nemours Children’s Hospital Health System in Jacksonville, Florida, and The City of Calgary in Alberta, Canada. They will share insights and ideas on how to address change, support their core mission and assist other parts of their respective organizations. The webinar will focus on how these three different organizations are using their video management system to help ensure a safe environment for their employees, students, patients, and the general public. Integrators and developers The panel will be hosted and moderated by Tim Palmquist, Vice President of the Americas at Milestone Systems. “Our goal with this webinar is to bring together security professionals to help them share their thoughts, concerns, experiences and new best practices with their peers,” said Palmquist. “These are unprecedented times, and I’m sure their insights will be valuable to users of any industry, as well as integrators and developers within our industry.” Remote video monitoring Topics slated for discussion include remote video monitoring, social distancing, queue management, people counting, access control and other tools that may be beneficial. The 45-minute webinar will be streamed Tuesday, September 15, 2020 with a Q&A session immediately following.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video Analytics Software When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. The video intelligence software processes and analyses video to detect all the people and objects that appear Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining Public Safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video Surveillance Data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing Situational Awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large Education Campuses Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless Business Operations Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
When violence or a life-threatening incident occurs, hospitals and other healthcare institutions are often in the crosshairs. Hospitals increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. And even if violence happens outside a hospital – such as an active shooter at a public place – the local hospital must be prepared to respond to an influx of injured victims. When conflicts arise inside a hospital, there is an urgent need to lock the facility down quickly. Security professionals and their teams need access control options that allow lockdowns to occur at the touch of a button. Lockdown capabilities are an important aspect of safety and security for hospitals, doctor’s offices and medical facilities The need for mass notification is also growing in the healthcare environment Fire alarm public address system The need for mass notification – another aspect of responding in an emergency – is also growing in the healthcare environment. Various systems can communicate through the fire alarm public address (PA) system to notify people in an emergency, or, alternately, to use email notification, text messaging, pagers, smart phones and/or personal computers (PCs). In lockdown situations, access control systems provide an emergency button with various triggers in the system – a hospital can lockdown specific units or the entire facility. Data capture form to appear here! Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products, points out that the safety of hospital staff, particularly nurses, cannot be overlooked. In the emergency room, 55 percent of nurses are assaulted in some way each year, which is a high percentage. The safety of nurses and all hospital staff deserves more attention. Duress/emergency notification technology Stankevich says one solution is to use duress/emergency notification technology: staff can carry and wear a ‘panic button” or have a two-key combination on their computer as an alarm trigger. When the staff member hits the panic button, a direct message can be sent to security, alerting security staff about the event and requiring a response. There has been an increase in demand for the safety and security of patients, staff and visitors at healthcare institutions, as evidenced by the recent CMS (Centers for Medicare and Medicaid Services) Emergency Preparedness Rule. As of Nov. 17, 2017, healthcare institutions that participate in Medicare or Medicaid must demonstrate compliance with the rule. Emergency preparedness systems A major challenge in compliance to this rule is balancing patient safety with comfort At its core, the rule seeks to establish national emergency preparedness requirements to ensure adequate planning for both natural and man-made disasters, and coordination with federal, state, tribal, regional and local emergency preparedness systems. A major challenge in compliance to this rule is balancing patient safety with comfort. Institutions should consider two-way communication that enables leadership to disseminate targeted messages quickly and efficiently, while arming all employees with a tool that can alert the appropriate staff should an incident occur. Solutions like this enable swift communication of issues without disturbing patients and visitors unless necessary. Effective response to emergencies “Fortunately, hospitals and their security departments are generally well equipped to respond to most emergency situations”, said John M. White, president/CEO of Protection Management, a consultant who works with hospitals to address their security needs. During the Ebola scare in 2014, however, hospitals had to re-examine their plans to ensure they were prepared to meet the challenges specific to rare and deadly disease. “Hospitals are prepared for most things, but Ebola seemed to have caught the whole world off guard, so people responded in different ways,” says White, who previously was security director of two multi-campus medical facilities before becoming a consultant. Hospital security Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients" He adds, “Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients and to protect other patients and staff. It was a new threat that healthcare organizations had not specifically addressed.” A particular concern was the possibility of an infected person walking into an emergency room and infecting other people and/or requiring facility decontamination. One role the hospital security department plays in such an emergency is to control access to the facility and to control visitors’ movements once they are inside the facility, says White. If the Ebola scare had progressed to the point that a hospital would need to screen patients, security would be positioned at the front entrance to help with that screening and, if necessary, to direct patients to a specific area for quarantine. Protective equipment Security might also need to wear protective equipment to handle a patient who is resistant to treatment, for example. There are often interactions between security personnel and the general public, a scenario that becomes more complicated if Ebola or a similar infection is likely. In general, security would be tasked with maintaining order and keeping people where they need to be, freeing up the medical professionals to do their jobs more efficiently, says White. To prepare for the impact of the Ebola scare, hospitals addressed various training and equipment needs and adjusted their disaster/emergency response plans. Read parts two and three of our heathcare mini series here and here.
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
Dahua Technology – one of the pioneer video technology companies – has entered into a six-figure sponsorship deal with Celtic FC, supplying the club with state of the art video-based technology and equipment. Under the sponsorship deal, Dahua is supplying video walls for locations such as the Celtic Store and Media Center at Celtic Park, high-tech quad-rotor drones to help with player training and development, and electronic whiteboards to be used for staff training, as well as meetings and presentations for staff and visitors. Highly visible aspects As part of the new partnership, Dahua will be appearing across a range of Club assets, on LED pitch-side banners, and on the club’s website and match programs. The deal represents the first ever major sponsorship by Dahua Technology in the UK and Ireland. The deal represents the first ever major sponsorship by Dahua Technology in the UK and Ireland “We are thrilled about our sponsorship of Celtic FC,” said Michael Lawrence, Marketing Director at Dahua Technology UK & Ireland. “As well as the highly visible aspects of the sponsorship, this deal represents a real partnership between Celtic FC and Dahua, and is an example of our engagement with communities across the UK and Ireland.” High quality technology Commenting on the deal, Cheng Zeng, Business Development Manager for China and Asia at Celtic FC said: “We are delighted to launch this partnership today with Dahua Technology. Their expertise and high quality technology will enhance both fan experience in our stores and business operations as a whole. We hope to work with Dahua long into the future.” As well as the equipment supplied to Celtic FC, Dahua Technology manufactures a range of innovative and technically advanced video equipment. These include TiOC, a three-in-one camera that integrates 24/7 full-color monitoring, active deterrence and Artificial Intelligence into one smart unit; WizSense, a series of products and solutions that utilize Artificial Intelligence and deep learning algorithms; and its Starlight range of low-light video technology.
Lufthansa Technik operates in a special division of the aviation industry, and security is a top priority to safeguard its people, planes and facilities. Over the years, the need to control access to its premises - particularly when it comes to external visitors - has become increasingly more important. A key challenge, however, is that Lufthansa Technik wants to maintain an inviting environment that feels free from restrictions, while also ensuring the highest security standards. Although Lufthansa Technik wants to prevent unauthorized access, it doesn’t want to hinder employees as they go about their day. It’s really important to the business to find the right balance between security and convenience, so people can feel secure but also free as they move around. And employees have a dynamic work environment that supports them in performing to the best of their ability. Unified access control Another key objective for Lufthansa Technik’s new access control system was unification. It has more than 35 locations and 100,000 employees worldwide and, in the past, each site was responsible for its own security. This would sometimes involve hiring specialists to solve the same problems at different locations. Lufthansa Technik’s ultimate goal is for all its sites to share the same access control system Lufthansa Technik wanted to avoid this and ensure not just consistent security standards but a culture of great connection where people can easily network and collaborate wherever they’re based. As a result, Lufthansa Technik’s ultimate goal is for all its sites to share the same access control system and follow the same standardized security policy. Access control system It also wants all employees to be able to use one single Lufthansa Technik badge to access all the locations they’re authorized to access - both locally and internationally. It was a big challenge to begin tackling, particularly when considering the IT challenges of implementing a unified access control system in multiple locations around the world. Lufthansa Technik began its search to find the right access control system by thoroughly researching the market and issuing an in-depth tender to a variety of suppliers. After detailed comparison, it chose Nedap. Melf Westphal, Head of Security Solutions at Lufthansa Technik, explains: “We were really impressed with Nedap’s entrepreneurial culture, hands-on mentality and personal approach. They were really reaching out to us, determined to find out exactly what we need. So we decided to implement Nedap’s AEOS system, which has helped us tremendously in meeting our requirements and creating a single system.” Security with convenience People set free to perform at their best Lufthansa Technik’s goals for its access control also align with Nedap’s people-first approach to providing ‘Security for life’. Nedap believes that a security system should be designed around the people using it, rather than the technology driving it. This ‘Security for life’ concept underline’s Nedap’s desire to free people’s minds from security so they can make the most of each day. Initially, Lufthansa Technik began with a pilot project to implement AEOS in Hamburg Which, in turn, mirror’s Lufthansa Technik’s desire to balance security with convenience. Initially, Lufthansa Technik began with a pilot project to implement AEOS in Hamburg, where it has 10,000 employees, followed by four affiliate locations. Melf says: “We weren’t sure at first how to go about it. But we got a lot of help from Nedap and their excellent partners, who were a great help to us during the implementation phase." Create tailormade solutions "The pilot project enabled us to overcome two major challenges: how to implement AEOS access control in our IT infrastructure and how to involve our employees. In both areas, Nedap and their partners did a wonderful job,” he continues. “It wasn’t only the really good products they presented to us. With their support, and that of their dedicated partners, they helped us solve all the operational issues." "And through their partner network, they enabled us to create tailormade solutions by offering third party integrations that matched our security demands. It’s meant that instead of barricading ourselves in we have relative freedom of movement. I feel very secure but I can use my badge to go anywhere. We have fantastic solutions and, importantly, the same Lufthansa Technik ID badge connects all of us – no matter where we’re based.” Third-party integrations The AEOS access control system that Lufthansa Technik implemented goes beyond just securing doors; they installed additional components such as key cabinets and visitor management. Melf says: “AEOS was a great help in this respect - it enabled us to bring in third-party providers. As Nedap has an ethos of working closely with third-party technology partners, and AEOS integrates easily with other systems, it means we weren’t restricted to just one solution." "We had the flexibility to create exactly what we wanted. I have a slogan when it comes to our security: ‘We open doors rather than close them.’ That’s really important to me,” Melf Westphal, Head of Security Solutions at Lufthansa Technik. For Lufthansa Technik, a key aspect of the pilot project and subsequent rollout is getting employees on board with the new access control system. Significant investment in training Each Lufthansa Technik employee is now incited to feel a shared responsibility for creating a secure work environment It believes that even the best access control system loses its value if the people working with it don’t have the right mindset. For this reason, Lufthansa Technik made a significant investment in training, communication and awareness campaigns. These focused first on letting employees know how valuable they are, how important security is and why the security changes are being implemented. They’ve also made employees aware of the importance of anticipating security risks and of their own role in Lufthansa Technik’s security management system. Each Lufthansa Technik employee is now incited to feel a shared responsibility for creating a secure work environment. And they’re all trained in how to respond to a security alert and address someone if they see them in a place they’re not supposed to be. New security system Importantly, Lufthansa Technik employees understand that their AEOS access control system is as much about preserving their freedom as it is about locking down their safety. The next steps for Lufthansa Technik are to continue rolling AEOS out worldwide. Melf explains: “The success of our new security system hasn’t gone unnoticed. Other Lufthansa Technik facilities have seen that AEOS has proved itself in practice in Hamburg, in a facility with 10,000 employees." "And we’ve seen an increase in requests for similar systems from facilities all over the world. Our goal now is to implement AEOS in all our locations worldwide, so we can truly build a unified security system that connects the entire Lufthansa Technik family. A security system that allows us to open doors, not close them.”
ZeroEyes, a renowned provider of artificial intelligence weapons detection solution, announced that it will provide its technology to the South Side Area School District in Beaver County, Pennsylvania. ZeroEyes’ platform is purpose-built to detect visible weapons in real-time, identifying guns before any violent threats can occur. ZeroEyes’ software integrates with an organization’s existing camera systems and video analytics to detect weapons in real time. As soon as a visible weapon is detected, an alert with the image of the weapon goes to the ZeroEyes monitoring team. Once confirmed, an alert is sent to a local emergency dispatch, onsite security staff, police and school administrators via cellphone and desktop. South Side Area School District operates three schools: an elementary school, middle school, and high school, with approximately 980 students. Weapons detection solution The school has invested in a number of different technologies focused on keeping staff, students and visitors safe, taking a pioneering stance in prioritizing school safety. ZeroEyes is the first weapons detection solution installed on premises. ZeroEyes’ AI weapons detection platform allows security personnel to quickly enact security protocols “As a rural public school district, it’s absolutely crucial for us to take the steps needed to ensure the safety of everyone who sets foot on campus,” said Alan Fritz, Superintendent at South Side Area School District. “ZeroEyes has consistently demonstrated their steadfast focus and commitment to public safety, and we believe that their weapons detection solution will play a critical component in our overall security approach.” Active shooter threats ZeroEyes partners with its customers as well as local first responders to ensure that organizations - including schools, commercial and government buildings - have an additional layer of security to identify and stop threats. ZeroEyes’ AI weapons detection platform allows security personnel to quickly enact security protocols, or direct first responders to a threat. “ZeroEyes was founded with the core focus to help mitigate school shootings, and we’re excited to partner with a school district that is taking proactive measures against active shooter threats,” said Dustin Brooks, Vice President of K-12 Education at ZeroEyes. “We look forward to the partnership with the South Side Area School District and forging a strong relationship built upon deeply caring about protecting students and faculty.” Prevent mass shootings Founded by former Navy SEALs and military veterans with over 50 years of collective military experience, ZeroEyes’ mission is to detect weapons before shots are fired, enable faster response times for first responders and security personnel, and ultimately prevent mass shootings.
Protecting commercial properties is complicated and goes beyond safeguarding people and property. Security professionals respond to the needs of the business, staff, contractors, and visitors and deal with the realities of property damage, theft, and disgruntled employees. Ava helps the team react to anomalies and policy enforcement in real-time. Instead of merely investigating incidents, organizations can take the necessary steps to prevent them. Spotlight brings relevant feeds to the operator’s attention and triggers real-time alerts to address threats before they escalate. Leverage integrated video and audio analytics to give an enhanced understanding of the camera feeds. Respond to loitering challenges, access anomalies, theft incidents, fires, and more. Identifying suspicious people Smart Search allows operators to search by appearance, events, objects, similarity, or image. Recovering lost or stolen objects, identifying suspicious people like unescorted visitors, investigating health incidents or damage to the property, performing cleaning crew inspections now take minutes instead of hours. Combine with access control to identify tailgating or fire or active shooter scenarios To gain occupancy insights, operators can leverage Ava Aware’s unique Map view with Smart Presence. By adding floor plans and maps of premises, people and vehicles appear as dots in their precise on-site locations. Operators can see live footage as they move on the cameras’ fields of view. Combine with access control to identify tailgating or fire or active shooter scenarios. Connect Ava Aware to the cloud to achieve easy and simple deployment and access from anywhere in the world. Share links of recorded video with team members, claim investigators, and law enforcement, regardless of whether they have admin access to Aware or not. Get a secure download of video files in a standard mp4 format with digital watermarking for authenticity. Key benefits delivered are as follows: Integrate with existing cameras Hundreds of hours saved in forensic searches Add access control to extend capabilities Video & metadata storage remain on-premises Full site survivability and local access Increase operational productivity and reduce facility costs Distribute heat and cooling efficiently, optimize cleaning and workplace productivity through hot-desking insights Use people flow insights to manage people and vehicle queues efficiently Automatically decrease storage demands from all the recordings Reduce bandwidth consumption on critical links with AI-based optimization Pay for what is needed, when it is needed, without the hassle of complicated licensing Up to 200 cameras per Ava appliance— small footprint support for larger facilities One-click Ava Dome and Ava 360 camera configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons With a simple licensing model, Vaion always includes services and software upgrades. They no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Today’s medical institutions have a large number of patients who require constant supervision, risk malpractice and patient negligence claims, need to ensure hygiene compliance, and find solutions for the high security and video storage costs. When faced with limited high administrative costs, government funding, or recession, intelligent video security solutions can help hospitals relieve the pressure. Choose Ava Unified Security (formerly Vaion) to reduce liability claims, detect threats proactively, improve operational efficiency, and provide surgery documentation for educational purposes. Why Ava? Anomaly detection and analysis in real-time Ava’s pervasive, integrated video analytics use self-learning to give an enhanced understanding of all of the user’s cameras’ feeds. The staff can use the dynamic Video view with Spotlight that brings only the relevant feeds to their attention. In unusual activity cases, the operators can immediately respond when a high-risk patient leaves his room unattended or visitors are wandering in prohibited areas. Increased situational awareness Add maps of the user’s facilities and rooms to keep track of high-risk patients, visitors, and staff and their exact location. Maps include Smart Presence, a capability that lets the users track them as they move through their facilities. Combine with access control to locate patients and staff in critical moments. Administrators can also have a clear picture across their locations to improve patient care and daily operations. Quick search within minutes for insurance claims Operators can find visual evidence to prove or disprove liability claims fast and accurately or if hygiene protocol compliance is followed correctly. Smart Search allows personnel to search by appearance, events, objects, similarity, or image. The vcore VMS integrates with access control systems through the generic access control API. It is possible to get a clear picture of historical entries and exits of patients and staff and the video associated with it. Sharp images and integrated audio analytics Equipped with directional acoustic sensors, Ava vcam Dome and Pano notify security and healthcare professionals instantly when loud noises, screaming, glass breaking, and gunshots occur. The cameras also deliver unmatched video quality required to provide recordings for scientific presentations, research, and education. vcam is suitable for different settings, from parking lots and storerooms to patient wards and operating rooms. Key benefits, delivered: Build from existing investment while retaining privacy Integrates with existing cameras Hundreds of hours saved in forensic searches Add access control to extend capabilities Video and metadata storage remain securely on-premises Full site survivability and local access Safe and reliable environment Capture every detail at all times with discreet security cameras Monitor high-risk patients at all time with remote monitoring Enable preventative action through immediate response time Improve operations and services Save storage and money Automatically decrease storage demands from all of the user’s recordings Reduce bandwidth consumption on critical links with AI-based optimization Support both on-premises and cloud within a single deployment Up to 200 cameras per Ava vserver appliance - small footprint support for larger facilities Simplicity and compliance One-click Ava vcam configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons Simple and flexible licensing With a simple licensing model, Ava always includes services and software upgrades. The users no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Marassi harbors, known as upcoming gateway to Egypt, is a community with a picturesque surrounding overlooking the turquoise Mediterranean Sea along the Alamein coastline. At this community one will find lavish residences that includes chalets, apartments, townhouses, villas, large marinas and signature hotels creating a lifestyle of sheer pleasure and luxury vacation destination. Secured access points to such an extravagant, lavish community is fundamental as the community is occupied by highly influential people, including high-ranking Egypt government officials. Streamlined access Until recently, manual security checks of vehicles and people were carried out at the community access to comply with the security requirements. As manual security checks were not only time consuming, but also resulted in queuing, the need for a secure and convenient access experience arose. Deluxe communities, like Marassi, strive for an automated frictionless, streamlined vehicle and people access process. Identifying tenant vehicles To automate vehicle access at the gates, Nedap’s UHF RFID uPass Reach readers, with a read range up to 5 meters, are implemented. Combined with Nedap’s UHF windshield-mounted tags, these readers are used for automatic vehicle access. The UHF tags are issued to registered tenant vehicles and when the vehicle comes within the read-range, the tag is identified and granted access. The UHF windshield tag is battery-free and maintenance-free, making it the most effective solution provide secure and seamless vehicle access. E-gate entry to residents Marassi residents manage their digital access card through the community app developed by EMAAR. Digital access cards are used as identifiers and are stored in user’s smartphones. Nedap’s multi-technology reader makes use of smartphones to identify people utilizing Bluetooth Low Energy (BLE) and NearField Communication (NFC) technologies. The solution has provided Marassi tenants with easy and secure access to the community and beach. Residents manage visitor access Visitor access to the community and beach is further simplified by enabling the residents to generate guest requests through the app. Besides supporting BLE and NFC technology, Nedap’s multi-technology reader includes a QR reader that enables scanning QR-codes displayed on a smartphone. Residents can share the QR code with guests. The guest presents the QR-code to the reader and access to the property is granted frictionless. Implementation of such an integrated solution has provided a high level of convenience to all users at Marassi. The reliable solution has also reduced the congestion at the entry gate, securing the flow of vehicles and reducing the waiting period for guests.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?