Warning Devices
Brigade Electronics has been honored with a King’s Award for Enterprise for international trade. Brigade is one of 252 organizations nationally to be recognized with a prestigious King’s Award for Enterprise. Announced on Monday, 6th May, 2024, Brigade Electronics has been chosen for its excellence in international trade. A total of 257 awards were made with five companies being recognized for two awards. Brigade Electronics Employing 154 people in the UK, Brigade Electronics...
The PSA Network, the world’s largest consortium of professional systems integrators announced the lineup of sponsors for PSA TEC 2024 (TEC) in Dallas, Texas, May 13-17. PSA TEC 2024 "PSA TEC 2024 will again be the most powerful event for security integrators, and we have an incredible group of technology partner sponsors that enable PSA to exceed expectations in delivering high-quality educational offerings, networking, and exclusive engagement with prominent industry pioneers...
The National Cyber Security Centre (NCSC) has issued a warning of heightened cyber threat to UK critical national infrastructure due to the risk posed by Russia state-aligned actors. Pro-Russia ‘hacktivists’ have been targeting vulnerable small-scale industrial control systems in the UK, Europe, and North America with more attacks expected over the coming months to target critical national infrastructure. AI-enabled cyber threats The NCSC outlined that the threats have l...
Honeywell security, fire, and life safety technologies will be on interactive display at The Security Event on April 30 – May 2 in Birmingham at Stand 5/F20. The showcased Honeywell technologies help building (or facility) decision-makers and operators manage threats while improving uptimes and driving operational efficiencies all delivered within an optimal occupant experience. Security technologies In line with Honeywell’s focus on delivering robust, digitalized auto...
HID, a worldwide pioneer in trusted identity solutions, announces the availability of its new HID Seos Essential Bundle, providing small to mid-size businesses (SMBs) in Europe with the benefits of advanced access control in an all-in-one packaged solution that simplifies installation and deployment. With HID's legacy of security excellence spanning over 30 years, the new bundle combines the latest access control technology to provide premium security and enhanced user experience at a competiti...
Enhancing physical security, especially perimeter intrusion detection (PID) at critical infrastructure sites like airports, data centers, warehouses, and utilities, is increasingly crucial due to growing threats such as theft, protests, sabotage, terrorism, and war. Quanergy 3D LiDAR Solutions In its latest whitepaper, Quanergy 3D LiDAR Solutions Redefining the Physical Security of Critical Infrastructure, global technology intelligence firm ABI Research forecasts the worldwide physica...
News
Securitas UK has announced a new solution to mitigate one of the biggest risk factors for spontaneous combustion across laundry businesses. Often taking place overnight, when there is no one at the premises, spontaneous combustion is a major cause of launderette fires, which results in large amounts of damage to businesses at a high cost. Securitas UK, in partnership with Axis Communications, has provided a solution to the issue, in the form of a combination of thermal temperature cameras, optical cameras, IoT sensors, offsite monitoring and remote support services. The end-user or business is then alerted to any unexpected temperature hotspots and the potential risk of fire. Real-time visual verification Operators have a separate optical camera installed at the laundry premises to allow for real-time The camera is pre-programmed with a series of analytics to measure a ‘maximum’ room temperature over a pre-defined timeframe. Should the analytics pick up a higher than ‘normal’ temperature, then an alert will automatically be sent to the Securitas UK Alarm Response Center (ARC). Operators have a separate optical camera installed at the laundry premises to allow for real-time visual verification of spontaneous combustion or fire and subsequently, the capability to dispatch the appropriate response. Securitas operator’s response The camera for visual verification can be set up in a business’s premises with a direct view of the storage containers where laundry is transferred to cool after its heat cycle – which is typically the location where most fires start. The Securitas operator’s response is set out and agreed with a client in their SLAs, which will either include alerting the emergency services upon confirmation of a fire or require a response from the Securitas mobile guarding team to attend the site directly to assist. IoT temperature sensors Businesses within the laundry industry face huge risks to their operations from random blast Businesses within the laundry industry face huge risks to their operations from spontaneous combustion which can lead to significant difficulties in obtaining adequate insurance coverage, in the event of a fire. This solution not only mitigates the initial fire risk but also provides scope for additional services that could further lessen risk factors for a business. These include providing fire risk assessments, fire training, fire extinguishing equipment, and the installation and set-up of IoT temperature sensors across all laundry premises. Fire hazard risks Nadine Matthews, Country President, Securitas UK, said: “We are proud to bring to market a solution that solves a very real and fundamental problem for the laundry industry, which sufficiently protects businesses when staff are off-duty and premises are empty." Nadine Matthews adds, “As adequate services to mitigate fire hazard risks in launderettes remain a valid concern, the solution we have developed and the additional services we can offer, have the potential to save UK laundry businesses huge costs in damages.”
Astute Financial Consulting, LLC, a major provider of accounting and business management solutions for security companies using SedonaOffice and FieldHub enterprise software, has named Amy Becker as President. Amy Becker Amy Becker’s promotion was announced by Jim Lee, Founder of Astute, who will remain with the company in the role of CEO. Ms. Becker joined Astute in April 2023, as Senior Vice President after working for over 25 years within the alarm industry in CFO and Controller positions, and as COO at Alarm Detection Systems. Amy Becker holds both CPA and CMA certifications. Expertise and leadership “With an impressive career spanning three decades in finance and accounting, including pivotal roles at renowned security companies, Amy brings invaluable expertise and leadership to our organization,” said Jim Lee, adding “As President, Amy will undoubtedly inspire and guide our team to new heights.” “It is such a blessing to serve in a role that fits my passions, skills, and abilities like a glove,” said Amy Becker. Advanced financial reporting capabilities Astute uses business intelligence software from Vivid Reports to provide advanced financial reporting capabilities Amy Becker adds, “I'm thankful for all the people I have learned from in my career. Jim and the team are amazing to work with. They are smart, helpful, and professional. And I love working with our fantastic clients. It never gets old hearing how much we help individuals, teams, and companies work smarter.” Astute uses business intelligence software from Vivid Reports to provide advanced financial reporting capabilities, consulting services, and back-office support to security integrators and alarm companies throughout North America. Automation, forecasting, and business insights Its clients rely on Astute to run their businesses more effectively, increase efficiencies, and grow profitability. Its financial reporting, analysis, budgeting, and compliance software tools provide capabilities beyond the SedonaOffice and FieldHub platforms, providing automation, forecasting, and business insights not otherwise available. In addition to industry veterans Becker and Lee, the company is supported by a team of financial and operational professionals with an average tenure of 15+ years in the security industry.
The Monitoring Association (TMA) is pleased to announce that ADT – Knoxville, Tennesse has received the prestigious 'TMA Five Diamond Monitoring Center' designation. This designation is granted annually to monitoring centers that satisfy all of the requirements of the 'five points of excellence': Commitment to ongoing job-related education and testing by having 100% of its monitoring center operators certified using the TMA online training series on industry best practices. Commitment to random inspections and quality criteria standards by a nationally recognized testing laboratory, such as FM Approvals, Intertek/ETL, and UL. Commitment to raising the industry standards through TMA membership and participation in its activities. Commitment to reducing false dispatches. Commitment to the highest levels of customer service. Five Diamond designation TMA’s Five Diamond designation means, in particular, that a monitoring company has demonstrated an exceptionally high degree of responsibility to their local community and their customers through the investment of time, money, and commitment to quality operator training. Operators serve as the life-saving link between residential or business properties and the police, fire, and emergency services in local areas. The TMA Monitoring Center Operator course covers virtually all phases of monitoring center communications with customers, police, fire, and emergency services communications centers. Criteria for designation To achieve the Five Diamond designation, every operator must not only pass the course and recertify every three years, but demonstrate: Proficiency in alarm confirmation process, which helps reduce false alarms. Proficiency in communications with Public Service Answering Points, such as the Emergency 911 centers. Knowledge of electronic communications equipment, including, cellular, radio, and internet communication systems. An understanding of the codes and standards of such organizations as Underwriters Laboratories, Factory Mutual, the National Fire Protection Association, and others. Proficiency in the area of emergency preparedness under a wide scenario of possibilities. UL827 registered TMA In 2022, Five Diamond has expanded to include TMA Member video monitoring companies that are hosted by a UL827 registered TMA member data center and fulfill all other program requirements. There are approximately 2,700 monitoring centers in the United States that communicate and interact with police, fire, and emergency services agencies. Of this group, fewer than 130 monitoring centers have achieved the Five Diamond designation, setting these companies apart.
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, is proud to announce the company has been named winner of the TMA Monitoring Technology Marvel Award. Established by The Monitoring Association in 2018, the Marvel Award recognizes professional monitoring centers and solutions providers for the innovation and/or implementation of cutting-edge technology. Vying for the honor against two very prominent finalists, Elite Marketing Director Scott Goldfine accepted the award during a virtual presentation on April 18. Latest in AI and analytics Elite represents a paradigm shift in the provision of security, generating revolutionary levels of preventing crimes and losses. Elite’s Security Operations Command Center leverages video surveillance monitoring incorporating a sophisticated, fully integrated technology stack featuring custom-calibrated analytics and artificial intelligence along with forensically engineered site system designs to eliminate the “noise” and never miss an event. Elite represents a paradigm shift in the provision of security, generating revolutionary levels "Achieving true crime prevention has been my ambition for decades, but it has only truly become possible the past few years as the technology finally caught up to fully enable my vision,” says Elite CEO & Founder Aria Kozak, who on April 10 was inducted into the Security Industry Hall of Fame. “By strategically implementing and custom calibrating the latest in AI and analytics, the remote video guarding results Elite and its monitoring command center- in terms of direct daily crime preventions and police assistance in arrests and detainments-have been extraordinary and previously unattainable.” Elite’s remote-guarding By fully leveraging technology and expertise, Elite is the first monitoring provider to eliminate false alarms reported to police. Through Elite, police experience zero false alarm-driven dispatches. Furthermore, Elite’s remote guarding acts as a live eyewitness to the scene as police respond to help them be prepared and proceed much more safely. During 2023, 102 million hours of video and audio data streamed into Elite’s monitoring center. Due to its pioneering-edge technologies, monitoring agents only had to review 55,200 of those hours. From that, they handled 73,000 incidents without police dispatch. The approximately 1,700 times police were dispatched led to more than 1,000 arrests/detainments. All that was accomplished with no false alarms to the police. Monitoring Technology Marvel program Monitoring Technology Marvel program offers were secretly reviewed and assessed by a panel “While it’s true the technology has come of age, it’s important to remember it is merely a tool that is only as effective as the methodologies, personnel, and partnerships in place to deliver the total, interconnected solution. Often, less is more,” adds Kozak. “With how Elite has proven what is now possible for our great industry, I could not be more excited about its future and our ability to continue to innovate even more. Given that, having Elite additionally validated in being named the 2024 TMA Monitoring Technology Marvel Award winner could not be more gratifying. Our team is thoroughly honored!" Monitoring Technology Marvel program submissions were confidentially reviewed and evaluated by a panel of independent, tech-centric judges. Entrants’ materials were weighed and graded using the following criteria: innovation and originality (25%); effectiveness and efficiency (25%); client impact and market response (20%); evidence-based results (15%); and scalability and adaptability (15%). Crime and catastrophe prevention Elite CTO Jonathan Kozak adds, “This recognition lines up with our core directives for efficiency and effectiveness, so it hits right at our pride point. At Elite Interactive, we are passionate about achieving real solutions in crime and catastrophe prevention. The technologies are tools in the hands of users, and the real efficiency and effectiveness matures when those users have the right methods and the right mission.” According to TMA, “To be competitive today, professional monitoring centers are enhancing processes and expanding services in new, unique ways. The Marvel Award is one way to gain recognition for your company, your brand, and for your amazing, talented team.”
In a world where worship places serve as the beating heart of communities, their significance cannot be overstated. Regardless of the religion, sacred spaces are the basics of spiritual worship and practice. The sacred spaces create unity, offer comfort, and also assert the customs of followers. Security in sacred spaces From mosques to churches, temples to synagogues, the security of these sources becomes the top priority; it is the fundamental necessity of religious freedoms for fostering communal tranquility. Hence, this makes it necessary to manage the complexities of those places of worship so that people could be able to worship or just express their spirituality freely without any fear or trepidation. Need for facial recognition The proper functioning of a complex setting is a potential answer to the problems of worship security From cases of vandalism, robbery, and religious hate crimes to terrorist attacks, religious institutions worldwide have seen a wide variety of security threats. Such hostilities not only introduce physical danger to the spiritual seekers but they also disrupt and render prayerful spaces devoid of the peace and harmony they are designed to maintain. Therefore, the proper functioning of a complex setting which is a potential answer to the problems of worship security, and solutions find their way through ‘Facial Recognition Technology’. Augmenting security measures By adopting the power of sophisticated algorithms and biometric analysis, the technology of facial recognition systems brings the possibility of augmenting security measures in a way that would not lead to interferences that might violate the sanctity of the worshiping environments. It has to be appreciated how technology can help to create a more peaceful environment within these holy places when it is applied skillfully and responsibly. Security landscape of places of worship Every religious institution of any denomination, ranging in size and followers, is being traumatized In the past few years, faith communities have been at the intersection of issues that pose a myriad of silting factors that undermine the security and sanctity of these holy places. From metropolises to the quaint countryside, every religious institution of any denomination, ranging in size and followers, is being traumatized by the simultaneous occurrence of security incidents that supersede geographical boundaries and, instead, transcend religious affiliations. Occurrences such as the destruction of symbols of religion, and property, and the desecration of sacred places, thus, leave worshippers feeling victimized and offended. Likewise, thefts, which target precious religious symbols, artistic pieces, or money that has been donated for charity, offer criminals not only material gains but also, importantly, they do affect the trust and goodwill within society. Trespassing is the main issue Globally, trespassing is the main issue that affects temples and gurudwaras. Hinduism also faces issues with burglary, theft, and robbery while Sikhism encounters a significant number of verbal attacks or harassment. However, burglary, theft, and robbery collectively account for crimes in churches, slightly higher than vandalism. In contrast, Islamic institutions face a higher incidence of burglary, theft, and robbery, constituting all incidents in mosques. Religious, racial, or ideological factors The attacks are purported by different religious, racial, or ideological factors regardless of the place of worship Besides these biased crimes that have been happening within or against religious institutions, the most horrifying are those with an anti-religion aim. These wicked incidents, the product of prejudice, exclusion, and radicalism, have cost lives and brought about widespread anxiety and a tangible feeling of uncertainty among the worshippers. These attacks are purported by different religious, racial, or ideological factors regardless of the place of worship. They are a great threat to religious tolerance and eventually strike at the peace and tranquility that worshippers seek within their sacred places. Need to protect religious freedoms In the Asia-Pacific region, 27 of 50 countries (54%) saw religion-related property attacks, while in the Americas, 15 of 35 countries (43%) experienced property damage incidents. In the Middle East and North Africa, properties were targeted in 12 of 20 countries (60%). These sobering statistics emphasize the urgent need for concerted efforts to uphold and protect religious freedoms worldwide. Overcrowding Overcrowding is the cause of the majority of accidents, such as stampedes or falling during pushing During times like religious holidays or special events that are periods of overcrowding, handling a considerable number of people within a limited space of the worship structure could be difficult. Overcrowding is the cause of the majority of accidents, such as stampedes or falling during pushing and shoving between the worshippers. Emotions may become heated, disagreements happen, people may argue over who is sitting where or who is standing where, and these arguments sometimes end up being hard feelings and disputes that tend to disturb the peaceful atmosphere of a place of worship. Political instability and conflicts Political instability and conflicts have both an added dimension of complexity which reflects even more so in regions where religious tensions intersect with political turmoil. Places of worship situated at such locations are more vulnerable to security constraints like targeted violence, forced shutdowns, and various restrictions from the government. In addition, the violence associated with civil disorder increases another dimension of the insecurity of places of worship. While protests and riots are somewhat expected, in most cases, their occurrence is unpredictable and can lead to a disturbance or, worse, chaotic situations. Enhancing worship place security The video management system becomes an indispensable tool in preserving the sanctity Where a sense of safety is lacking, there is a need for greater security to protect places of worship and worshippers, who overwhelmingly would like to see a range of physical solutions. This includes a strategic deployment of an advanced video management system, which serves a dual purpose. Firstly, it provides extensive surveillance of access points, enhancing situational awareness and threat detection. Secondly, with its capability to capture incidents discreetly, including physical attacks and verbal abuse, the video management system becomes an indispensable tool in preserving the sanctity of these sacred spaces while addressing security concerns. Inventive surveillance Nevertheless, the use of facial recognition systems ushers in inventive surveillance and, to some extent, invasiveness of privacy. The utilization of such advanced technologies not only enables existing video management systems to know what has been happening but also puts the identification of persons of interest in a place of prominence, developing the capacity to preempt and deal with any law and order issues. Consequently, the responsiveness of the authorities in this matter is very important in the matter of keeping and guaranteeing the sacredness of these sanctuaries and in improving the general emotional condition of the believers. Integrating facial recognition systems By integrating facial recognition systems, institutions can ensure that only authorized personnel have access In addition to numerous religious institutions, facial recognition technology is used to ensure the security and safety of worshippers. The reasons for implementing the technology may be different but generally involve the worries about increasing insecurity which could manifest as vandalism, theft, or even a terror act targeting sacred places. In Singapore, the alarming surge of 11 police reports regarding thefts at places of worship during the first half of 2023, doubling from the previous year, underscores a pressing need for enhanced security measures. Integrating such technology offers a potent solution for securing donation boxes at places of worship, providing an extra layer of protection for these sacred spaces. By integrating facial recognition systems, these institutions can ensure that only authorized personnel have access to the donation box area, thereby minimizing the risk of theft or tampering. Real-time monitoring Facial recognition systems tailored for use in places of worship boast specific features and capabilities, such as real-time monitoring of entry points, automated identification of suspicious individuals, and integration with existing security infrastructure. This way of implementing a security system in a religious community not only provides the means for enhancing security but also allows for preserving the holiness and openness of the worship places. Instantaneous crowd monitoring The authorities can identify the hot spots for crowds and predict the events that might lead to blockage Facial recognition systems can be applied as an important tool for resolving the crowd problem and processing the civil unrest in places of worship. The authorities can identify the hot spots for crowds and predict the events that might lead to blockage or congestion with the help of facial recognition systems which provide instantaneous monitoring of crowd flows and crowd densities. Furthermore, these systems have the potential to point out those people who could be the ones inciting violence or disseminating unrest. This creates an opportunity for targeted interventions, resulting in tension de-escalations and order-restoration. Perimeter intrusion detection Notably, facial recognition technology could also help officers track the path on which individuals in civil disobedience move, identifying and apprehending suspects who cannot stop themselves from breaking into public stores or other criminal acts, ensuring the safety and well-being of worshippers during times of overcrowding and civil unrest. At a time when all aspects of security seem too big a threat to be overlooked, the combination of facial recognition technology systems with perimeter intrusion detection starts shining with the appearance of a powerful solution. Especially considering such places over history have transformed into landmarks or propagating tourist sites, the conservation strategy offers a sturdy defense against such human activities as well. Alarm activation, threat identification The system calculates a matching score and does a global comparison against the database of registered faces Imagine this: as an individual approaches the perimeter, the cameras with facial recognition systems take a picture of the face in the blink of an eye. In a snap of the fingers, the system calculates a matching score and does a global comparison against the database of registered faces to see whether the individual is permitted to be inside. If the system detects an unauthorized presence doing so will send a signal, stating security personnel or whatever predetermined responses are deemed suitable such as alarm activation. Not only does this fusion of technologies make threat identification more exact, but also provides proper and available responses in a short time that guarantee the security and the sanctity of these sacred areas. Physical security solutions Physical security solutions are essential in enabling regular users of places of worship to feel safe, but the aesthetic considerations of those measures are equally important: while on-site security design must serve to keep trespassers out and help prevent crime, it should also be welcoming and instill a sense of safety. There is a fine balance to be struck between effective security and aesthetics. By fostering ongoing evaluation, community engagement, and ethical reflection, religious institutions can harness the potential of facial recognition technology to create safer and more welcoming spaces for worshippers. Smart decision-making The objective is to seek the balance between security requirements and the values of an open and inclusive system The objective in the end is to seek the balance between security requirements and the values of an open and inclusive system of the practice of the religion where individual rights are truly respected. Joint efforts and smart decision-making, however, guarantee the technology to be utilized as a tool of divine harmony and spiritual nurturing during worship. "In a world where peace is paramount, it's imperative we prioritize not just physical security, but the preservation of sanctity within places of worship. Facial recognition technology, when deployed thoughtfully, becomes a beacon of reassurance," said Sukrit Varma, Global Marketing Partner, APAC & MENA Region, RecFaces. Proactive approach "Facial recognition systems offer a proactive approach to securing places of worship, enabling real-time monitoring of entry points and automated identification of potential threats, while still respecting the sanctity of these sacred spaces," said Valerie Lapteva, Business Development Director, APAC Region, RecFaces. "Implementing facial recognition technology in places of worship presents an opportunity to address overcrowding and civil unrest effectively, allowing for targeted interventions to de-escalate tensions and restore order while ensuring the safety and well-being of worshippers," said Eugenia Marina, Business Development Director, MENA Region, RecFaces.
Award-winning global manufacturer of intelligent access control and security solutions, ICT (Integrated Control Technology), is delighted to announce the appointment of Gaurav Mahajan as sales director for the Middle East and India. With an extensive career in the security industry spanning more than two decades, including significant sales leadership roles at Bosch, Pelco, and Optex, Gaurav brings a wealth of experience and a deep understanding of the challenges faced by security integrators. Access control, CCTV, and intrusion Having worked with many conventional security systems, Gaurav has profound knowledge and expertise in Access Control, CCTV, and Intrusion system specification. Thomas Napora, VP and GM for ICT EMEA explains “Gaurav has developed a deep respect and trust in the market throughout his tenure in the Middle East. He has a proven track record of delivering high-end enterprise-level security projects for prestige customers, I look forward to supporting his growth ambitions.” Business development and sales experience Gaurav will play a pivotal role in driving channel growth, fostering strong relationships Expressing his enthusiasm for the new role, Gaurav said, "I am very excited to join the dynamic and growing ICT EMEA team and look forward to utilizing my business development and sales pioneers experience to accelerate the adoption of ICT’s pioneering products throughout the Middle East and India.” In his capacity as Regional Sales Director, Gaurav will play a pivotal role in driving channel growth, fostering strong relationships with integrators, and providing strategic leadership to further elevate his position. Dubai-based satellite office This commitment to local support is echoed by the opening of a new Dubai-based satellite office to act as the hub for daily operations, with technical support staff to be appointed as part of an ongoing growth strategy. Thomas continues “Dubai’s Silicon Oasis is a great place to be, It's the right hub for ICT. "The market wants high-end solutions to protect very large and complex projects, and I believe our offering and experience fit perfectly here.” ICT extends a warm welcome to Gaurav Mahajan as he takes on his new role.
Expert commentary
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometer, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardization of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration toward the standardization of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralizing as much as possible. Practically, this means utilizing APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of Cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralization in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well-positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
If you were to ask people outside our industry what door and access security entails, chances are their answers would reflect their common encounters with locks, security guards, cameras, and maybe metal detectors, badges, or automatic doors. But if they were curious enough, they’d probably be astounded to learn how extensive, intricate, and interesting the business can be and, of course, how vital it is to life safety, physical security, and cybersecurity. Integrated, interoperable solutions They’d also discover that it’s not just about levers, deadbolts, and other products. Instead, it’s a system of many systems, integrated, interoperable security solutions that cover everything from access control, video surveillance, fire alarms, and communications to server rooms, IT networks, energy efficiency, and more. Partnerships to keep up with changing needs A manufacturer’s support of their customers is how prepared they are to respond with high-quality advice Integral to the future success of the openings solutions industry is how well manufacturers and security experts keep up with the changing threat landscape and their customers’ evolving needs. Part of a manufacturer’s support of their customers is how prepared they are to respond with high-quality advice, service, and innovations that address the questions and concerns that arise. That’s why more developers, designers, and end-users alike are leaning on partnerships with visionary manufacturing companies and systems integrators who proactively keep their ear to the ground and an eye on the future. Caution: curves ahead As we look toward that future here in North America, there will always be forces of change to contend with and the accompanying impact on people’s safety, security, health, and livelihoods that our industry will need to address. The forces range from the incessantly unfolding threat scenarios in our country and the world’s geo-political dynamics to climate change and a host of other shifting factors, including the ways we want to work post-pandemic. Bypassing tailored approach Commoditization poses risks to customized systems integration, good design, the environment Like many industries, ours has seen a change in the level of commoditization in recent years. While this may give some customers access to cheaper door products in the short term, it usually means bypassing a tailored and more effective approach to security solutions that better meet risk assessment needs for the long haul. It can also get in the way of fulfilling a customer’s forward-thinking requirements for sustainable and aesthetic building materials. In other words, commoditization, with its tendency toward “sameness” and dependency on less sustainable, corner-cutting materials and processes, poses risks to customized systems integration, good design, the environment, and potentially security itself. Change for the better Fortunately, change has its upside, especially as it applies to innovation, the counterforce to commoditization. It’s the primary reason why progressive architects, integrators, and security professionals in North America keep gravitating to manufacturers with the instincts and resources to make bold investments in people, new ideas, and processes that produce advanced, planet-friendly solutions. From our view of the door security industry, sustainability will be a central component of innovation from here on out, where the development of new solutions and products is guided by practices and values that reduce their environmental footprint and increase their positive impact. Sustainably-made solutions Transparency in the form of documentation and third-party certifications to back up sustainability claims Along with being a top-down priority for certain manufacturers, sustainably made solutions and products are in higher demand than ever from the design, building, security, and end-user communities. They want to know about the carbon footprint and health impact of product ingredients, their recyclability, and how responsibly things are being made, packaged, and delivered. And they expect transparency in the form of documentation and third-party certifications to back up sustainability claims. Resilience Along with sustainability, a greater focus on resilience has emerged. Climate change is being looked at as a key contributor to the increase in wildfires and the intensity of windstorms and flooding. There will continue to be an expanding need moving forward for FEMA-rated storm shelters, fire- and water-resistive doors, and even blast-resistant openings for certain locations. On the near horizon Facial recognition has long been in use in government and other high-security applications The door security industry is also seeing a fusion of technologies, including newer touchless/contactless opening solutions that incorporate improved biometric access credentials like facial recognition. Facial recognition has long been in use in government and other high-security applications, and we’re starting to see more adoption and willingness to use advanced biometrics devices for door access. Video sensing data and analytics Fortunately, there are new strides regarding the transparency of the algorithms relating to facial recognition. Reassurances about the prevention of bias will help further that adoption. Voice and video will also soon become more prevalent for building and security management by using video sensing data and analytics to inform door security solutions. These developments often stem from the convergence of application engineering and systems integration. Application engineering It also advances the de-commoditisation of security and access control solutions Openings solutions innovators and manufacturers receive vital feedback and insight from both channel partners and customers about the characteristics of a vertical market and/or region. Not only does this partnership require trust and close working relationships, but it yields near and longer-term advantages to all participants. It also advances the de-commoditization of security and access control solutions. Serving underserved communities Smaller businesses need to manage the security and safety of their personnel and assets just as larger operations do. The challenge has been how to offer the right fit of robust door security solutions that also fit these organizations’ budgets. Historically, they’ve been caught between having to choose an enterprise system that would provide the security they need but comes with a high price tag or settling for mechanical locking doors and a fire alarm system that will at least satisfy a certificate of occupancy requirement. Smart lock system Many small business owners want technology that’s simple to install, even DIY in some cases Many small business owners would like to add a smart lock system to enhance their company’s security which also gives them the flexibility to issue mobile credentials and manage employee and visitor access remotely. Ultimately, they’re looking for a higher level of functionality than what’s available at the low end but something with far less infrastructure and at a lower cost than what’s inherent with higher-end solutions. They also want technology that’s simple to install, even DIY in some cases. Scalable electronic access control Supporting these underserved customers requires developing scaled solutions to match the fewer doors, employees, and amount of space that smaller businesses need. This unique approach to electronic access control is new, but it’s already proving to be successful in helping organizations better manage their time, resources, and security. Training The need for expanded solutions awareness, product knowledge, and installation training is also growing The need for expanded solutions awareness, product knowledge, and installation training is also growing. Retirements and other changes within the locksmithing, systems integration, and facilities management sectors continue to affect how our industry needs to recruit, develop, and retain talent. So do technological advancements in electronic access control and door security hardware overall. Change, innovation, and learning A manufacturer or organization that can offer comprehensive training led by seasoned professionals will go a long way toward expediting the onboarding of new hires and providing continuing education for experienced professionals at all levels and from all disciplines connected to safety and security. Ultimately, door security experts and companies who embrace change, innovation, and learning will gain the extra edge customers are always looking for to add value to their investments in security.
Security beat
Security professionals are recognizing the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organizations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analyzing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognize the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilizing open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualized through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritize critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratization of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivize bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimizes the occurrence of analytic errors caused by inaccurate machine translations. This minimizes the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognize its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyze massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations center, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Center— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyzes the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centering on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
Case studies
In the heart of Aalborg is a lovely and well-kept private home. Here lives a family of five who in 2016 would rent out their basement to utilize the home’s square metres. WHY – To access the basement, the tenants must go through the back door. The family and the tenants thus share the same entrance at the back of the house. Therefore, the family was looking for a solution on how they could give the tenants access to the basement without them also having access to the family’s private residence. WHAT – It was important for the family to keep the architectural style of the house. However, it was not entirely straightforward to find an access control solution where the solution only sat on one side of the door, says Michael Goth-Rindal. Together with CONLAN’s CEO, Ejner Hansen, the family found a solution where they could both preserve the old door and at the same time avoid pulling wires for electricity. Tenants keyless access The keyboard can go through many cycles before the battery needs to be replaced The CT1000 keypad is installed on the back door of the house, giving both family and tenants keyless access to the house. In addition, the C1000LP keypad is installed on the front door of the private home, where the solution is only visible from the side of the staircase. From the inside of the house, they can not see that the door is powered by a keypad. The keypad on the front door of the private residence is battery-powered, meaning the old door could remain, without the pull of wires. As the keypad is a low-power device, the keyboard can go through many cycles before the battery needs to be replaced. The family changes the battery themselves, and the keyboard tells when it’s time. Keypad’s daycode function This allows them to create a code for, e.g., the cleaning, which only works the one-day Benefits - With this solution, the family can access their home, completely without the need for keys. “We are really happy with our solution. It works and is a flexible system that we can easily handle ourselves,” says Michael Goth-Rindal. In addition, the family also uses the keypad’s daycode function. This allows them to create a code for, e.g., the cleaning, which only works the one day. With this, the family has full control over who has access to the house and when. Low power consumption CT1000 reader on the back door – A standalone reader with code. Possibility of up to 28 user codes. The keypad can also be connected to the alarm, so that the alarm is switched off at the same time as the door is unlocked. C1000LP reader on the entrance door for the private home – Reader with code and low power consumption for access control. Several options for access with codes, including one-time, day and period codes that are active from one to 28 days. In addition, the keypad can be powered by both battery or wired power.
Riga Sports Arena is a municipal facility maintained by the city of Riga, Latvia. Covering a total area of 21,821 square meters, the arena accommodates 2,500 spectator seats. It houses several training halls, including a large athletics arena, a training and warm-up hall, a weightlifting hall, and a sports field. Challenge Enhance security by replacing inefficient guards with technical equipment Riga sports arena faced a significant security challenge, relying on two guards who worked only night shifts. Depending on just one person was insufficient to ensure the safety of the complex, given its substantial size. The guards struggled to effectively cover all areas, leaving the arena vulnerable to security risks. Moreover, the financial burden of employing guards strained the city’s budget. There was a need to enhance security while eliminating the human factor and optimizing associated costs. Moreover, the financial burden of employing guards strained the city’s budget The client required a professional security system that could be implemented without extensive construction work or the need to lay a substantial number of cables throughout the building. They sought an effective and easily installable system that would enhance security without compromising the integrity of the facility. Solution Cost-effective wireless solution reinforcing security for a large municipal facility Considering the building’s size and recent reconstruction work, the installation of a traditional wired security solution was deemed impractical. This option would have required several months to complete and additional renovation work after installation. Moreover, the presence of many oversized windows, each requiring protection with detectors, made cable-based solutions even more impractical. GRIFS AG proposed an Ajax wireless solution that can be quickly installed without damaging the walls, allowing for complete control and management of the system through a mobile app. To streamline control without the need for multiple hubs, Hub 2 Plus Jeweler was selected In total, 115 devices were installed throughout the building to ensure comprehensive security coverage. To streamline control without the need for multiple hubs, Hub 2 Plus Jeweler was selected. This hub can control up to 200 devices, managing 25 security groups with a total of 200 users. This feature aligns with the client’s requirements, given the installation of many devices and the need to manage security modes for separate premises, all in the Ajax app. For example, it allows keeping employees’ offices in armed mode while conducting training sessions in the main hall. GRIFS AG installed DoorProtect Jeweler Given that the sports complex spans three floors and considering the need for the hub signal to pass through two reinforced concrete floors, the decision was made to enhance its communication range. To ensure stable communication between all 115 detectors and the hub, the ReX 2 Jeweler radio signal range extender was installed. This guarantees a reliable connection between all system components, ensuring seamless communication even in areas with challenging signal transmission conditions. For comprehensive security, GRIFS AG installed DoorProtect Jeweler opening detectors to oversee For comprehensive security coverage, GRIFS AG installed DoorProtect Jeweler opening detectors to oversee all doors. Additionally, MotionProtect Curtain Jeweler, with a narrow viewing angle and a maximum detection range of up to 15 meters, protects the large windows in corridors and sports halls. The challenge with large windows was that glass break detectors may be positioned far away from the hit spot, making it difficult to detect glass breakage. However, MotionProtect Curtain Jeweler, equipped with PIR sensors, instantly reacts to movement within its detection zone along the whole length of a window. Notably, the detector catches movement only if a person enters its field of view, allowing for protection even when a cleaner is working nearby, or a staff member is walking around. In addition, MotionProtect Jeweler detectors were installed throughout all entrance groups, major corridors, and stairwells to promptly notify the owner and the security company in case of any detected motion. Multiple HomeSiren Jeweler devices To facilitate arming and disarming of the security system for numerous employees in the sports complex, a wireless touch KeyPad Jeweler was installed. By entering a code, the device can activate the full security mode and automatically blocks itself if an incorrect code is entered multiple times. KeyPad Jeweler supports up to 99 codes, each corresponding to a separate user, making it suitable for enterprises with many employees. HomeSiren Jeweler devices were installed indoors throughout the skill to provide loud signs For rapid security response, the wireless alarm Button Jeweler was installed, enabling quick notification of the security company in case of intrusion. Furthermore, multiple HomeSiren Jeweler devices were installed indoors throughout the building to provide audible warnings in case of danger or deter potential intruders. These sirens emit loud sounds up to 105 dB to prominently signal a breach, effectively preventing unauthorized individuals and enhancing overall security. The arena management plans to automate evacuation doors using the Relay Jeweler system soon, enhancing safety and security by allowing remote door opening during emergencies. Why Ajax Cost-saving security solution. Customers can experience significant savings by opting for Ajax. The costs of the Ajax system installation were approximately equal to the expenses for security guards’ salaries per year. However, starting from the second year, the Municipality of Riga can achieve significant savings by paying only a low monthly fee for monitoring. Easily scalable future-proof system. With Ajax, the security system is easily scalable, allowing for future expansion and the implementation of additional functionality as needed. For instance, Hub 2 Plus Jeweler, already installed, supports the addition of up to 200 detectors, including MotionCam Jeweler detectors for photo verification of alarms, without requiring any system reorganization. This enables seamless integration for enhanced security measures, ensuring the system can adapt and grow with changing security requirements and evolving customer needs. Effortless wireless installation. Ajax offers a wireless solution, eliminating the need to lay cables in walls or undergo extensive repairs. This allows for quick and efficient installation without the limitations of wired infrastructure. After implementing the Ajax security system at the sports arena, the center’s management noted its convenience and decided to install Ajax in their homes.
Wetlands, the "kidneys of the Earth", are considered one of the three major ecosystems on Earth, along with forests and oceans. Hosting a diverse range of terrestrial and aquatic plant and animal species, wetlands serve as crucial habitats for numerous bird species. Red-crowned cranes Beautiful Wetlands vs Critically Endangered Cranes The Red-crowned Crane is considered as the "God of Wetlands" and is highly sensitive to environmental changes. It is one of 14 bird species in China classified as critically endangered, with only around 2,000 wild Red-crowned Cranes remaining worldwide. Monitoring these rare bird species not only aids in their effective protection but also reflects changes in the wetland ecosystem to some extent. Red-crowned Cranes migrate between the regions of East China and Northeast China In China, during spring and autumn seasons, Red-crowned Cranes migrate between the regions of East China and Northeast China, requiring wetland management personnel to make all necessary preparations in advance every year. Recording and tracking data (e.g. time of arrival/departure, and total number) play a significant role in monitoring both the Red-crowned Cranes and the wetland ecosystem. Hence, monitoring rare bird species is essential not only for their conservation but also for understanding the changes in wetland ecological environments. Vigilant cranes, eager for improved, smarter observation However, Red-crowned Cranes have extremely strong vigilance. Even while foraging or resting, there are often adult birds designated to be on alert, making warning calls and taking flight if any danger is detected. Therefore, it becomes challenging for monitoring personnel to observe them up close, as they need to maintain a distance of several hundred meters using binoculars to avoid disturbing the cranes. Such limitations in observation pose difficulties in monitoring the population distribution and activities of Red-crowned Cranes. To achieve efficient and intelligent monitoring while minimizing human interference, many wetlands have enlisted the assistance of an intelligent "avian expert". Dahua: the guardian of cranes with smart technologies In recent years, avian intelligent recognition systems have been increasingly applied in wetland monitoring. Dahua Technology actively explores the integration of technology and wetland conservation to support the monitoring and protection of bird species across multiple wetlands. Rare bird species like the Red-crowned Crane can be automatically identified and counted By employing high-point video footage combined with avian intelligent recognition algorithms, rare bird species like the Red-crowned Crane can be automatically identified and counted. This allows monitoring personnel to discover and observe various bird species clearly and promptly without disturbing them. Additionally, techniques such as background removal and contour deformation processing help reduce the interference caused by lighting conditions and backgrounds, ensuring that the footage presents the identifying characteristics, location, and time for each bird. With this approach, comprehensive and accurate data recording and result analysis can be achieved without disturbing the Red-crowned Cranes up close. A brighter future for biodiversity using intelligent analysis In addition to population counting, vocalizations play a crucial role in bird research. By utilizing voiceprint recognition, it becomes possible to track and study the population distribution of rare bird species. Many regions have established and improved databases of avian vocalizations, creating a foundation for biodiversity monitoring and analysis. These databases, combined with visual identification, are being cataloged in order to facilitate more comprehensive research and analysis, optimize timely conservation measures, and enhance dynamic and diverse science communication and education. Dahua Technology continues to empower biodiversity conservation through technology. The Dahua AI platform enables continuous algorithm training that helps reduce the development cycle of recognition algorithms for specific species. At present, Dahua has developed over 800 bird recognition algorithms, with more than 500 focused on waterfowl and migratory birds primarily inhabiting wetland environments. This extensive collection of algorithms greatly supports and contributes to biodiversity conservation efforts around the globe.
As a longtime maintenance provider for Trafalgar Theaters at their Orchard Theater site in Dartford, Blake Fire & Security and Cygnus’ distributor Illumino Ignis (Kent) Ltd (IIKL) were approached for a solution to a unique problem: Satisfying the stringent fire safety requirements of their new temporary venue to hold 1,091 audience members, while the main Orchard Theater was closed due to RAAC Works. SmartNet-Pro fire detection With a very short turnaround of a week, Blake Fire & Security and IIKL instantly knew that the Cygnus EN 54 certified, fully wireless SmartNet-Pro fire detection and alarm system would be a perfect fit for the venue. It provides an aesthetically pleasing solution and quick installation, with full EN 54 and BS5839 Part 1 compliance, while also allowing the right cause and effects for the theater operation. SmartNet-Pro range’s wireless network features SmartNet-Pro range’s wireless network features give a minimum of two communication paths to each wireless device Designed to deliver a reliable and safe solution, the SmartNet-Pro range’s wireless network features patented Cygnus technology and is run by battery-powered radio devices as part of a robust, self-forming, and self-healing mesh network, giving a minimum of two communication paths to each wireless device for maximum reliability. “We have worked with Cygnus and the SmartNet-Pro system previously and knew it would be ideal for this unique project,” comments Rory Foster, Fire Safety Systems Manager at Blake Fire & Security. 100% wireless “SmartNet-Pro is 100% wireless as well as being robust and reliable, it was exactly what we needed for the complexities of this project. We also knew we could rely on the Cygnus team to help deliver the project in a timely and efficient way.” Given the nature of the venue, the fire alarm system needed to have some advanced features to give the theater control of the system. Factors to consider The Blake Fire & Security and IIKL team were required to consider these factors when creating the system: Smoke Machines being used during the performances. A function of the SmartNet-Pro panel allowed us to program a function on the button on the control panel to isolate the smoke elements of the detectors in the auditorium during performances (Show Mode) while keeping the Heat elements of the detectors functioning as normal. Heating pipes with hot air being blown throughout the site. By utilizing the Cygnus SmartNet-Pro Combi Smoke/Heat A1R detectors, we were able to only have the smoke detection parts active for devices in the stream of the hot air, to avoid A1R false alarms. The costly effect of a false alarm and evacuating the venue during a performance. By having a 30-second initial delay, and a 2.5-minute investigation delay, we satisfied both the Fire Service and the Theater by allowing the theater staff to assess the cause of the alarm before evacuating the venue, without leaving too long without the fire alarm activating if no one responded. The combustible nature of the building is mostly dressed in linen throughout. Additional smoke detectors were installed on the edges of the linen-draped ceilings at the request of the local fire authority, with high-sensitivity smoke and heat detection to raise the alarm extremely quickly if the linen was likely to become compromised by fire. specification and design The whole process was taken care of without any design surprises at the end of the project After a free site survey and design service, Blake Fire & Security and IIKL provided the specification and design to the theater who then got the design signed off by the local council and local fire authority. Working closely with the theater and local council, amendments and additions were made to the design, so the whole process was taken care of without any design surprises at the end of the project. testing and demonstrations The SmartNet-Pro system of 65 devices was installed in a day, with another day allowed for testing and demonstrations; using rods and Unistrut fixings to fix detectors into positions where wired detectors would not feasibly be able to be installed. The fire alarm panel was installed by the stage door so that the stage door staff could hear when an activation has occurred, and then decide on whether to initiate the investigation delay. Zone Plan and As-Fitted Drawing The system was demonstrated to the crew, so they knew what the alarm sounded like, and how to react As with all Blake Fire & Security and IIKL installations, a framed Zone Plan and As Fitted Drawing were fitted by the Control Panel, to give the Theater Staff and Fire Brigade instant knowledge of the building, and where the Fire Alarm activation has occurred. All members of the Stage Door crew were trained by Blake Fire & Security and IIKL in the operation of the system including all the advanced functions like the delays and “Show Mode”. The system was demonstrated to the crew, so they knew what the alarm sounded like, and how to react when the panel buzzer activates. high-level detection Rods with the detectors mounted onto them were clamped onto the trusses for the lighting, giving high-level detection in the auditorium where it was not possible to fix the black linen ceiling. These detectors were then programmed on the SmartNet-Pro system to be Heat Only when the system is in “Show Mode” to prevent unwanted alarms from special effect smoke used during performances. Manual Call Points Combi detectors were mounted just below the linen ceiling using rods clamped to the metal structure Ensuring all exits including stage exits were covered by Manual Call Points which would instantly evacuate the building without delay was imperative to allow occupants and staff in the venue to feel safe in the knowledge that if a person identifies a real fire, the fire alarm can be raised instantly at any exit from the building. The ceilings in the Front of the House have heating tubes running through them, so combi detectors were mounted to the side of this, just below the linen ceiling using rods clamped to the metal structure above the linen. smoke detection Extra smoke detection was installed along the low-level edges of the linen ceilings, on L Brackets, so that a fire could be detected quickly before the linen ceilings caught alight. These detectors were supplementary to the main detection along the apex of the ceilings. Given the nature of the ceilings, conventional wiring methods would not have been possible without a very unsightly installation, so the wireless nature of the Cygnus SmartNet-Pro system was an obvious choice. ongoing maintenance Blake Fire & Security and IIKL issued the O&M Manual with all certificates and drawings required for Building Control Following the completion of the installation, commissioning, and testing Blake Fire & Security and IIKL issued the O&M Manual with all certificates and drawings required for Building Control to sign off the system and deem the venue safe to open to the public. Blake Fire & Security and IIKL will provide ongoing maintenance of the system to ensure that the system is kept up-to-date and compliant. EN 54 certified, and BS 5839 compliant fire detection SmartNet-Pro is the world’s first 100% wireless, EN 54 certified, and BS 5839 compliant fire detection and alarm system while the new SmartNet-100 is ideal for small to medium-sized projects, where the scalability of SmartNet-Pro is not required. Cygnus was thrilled to support the project by providing a complete SmartNet-Pro system to guarantee the fire safety requirements were met.
The Dutch powerhouse Kramp is one of the biggest suppliers of parts and accessories for Europe’s agricultural sector. Founded in 1951, focusing on simplifying life for those who work the land, Kramp boasts a staggering 590,000+ products, from tractor gears to stable shovels. Kramp’s success hinges on its robust infrastructure. A strategically located network of 11 distribution centers across Europe ensures prompt deliveries, while 24 sales offices provide localized customer support. Localised customer support Challenge- Balancing reliability and installation speed in a temporary warehouse security upgrade. Kramp rented a warehouse covering an area of over 5,000 m2 for approximately three years with a security system installed. However, it needed to be updated to fulfill the Grade 2 insurance requirements. Therefore, the client decided to replace a security system and, at the same time, wanted to install a fire alarm system. Since Kramp is known for the speed of the company’s business processes, the warehouse security system had to be updated and launched as fast as possible to prevent any disruption to the operation. This demanded a solution that could be installed quickly and with minimal costs, yet maintaining quality and reliability. Central monitoring station Ajax wireless security system with third-party device integration for intrusion and fire detection in a large facility Solution - Lankhof Beveiliging proposed Ajax wireless systems for a client’s temporary warehouse to address the requirements for a convenient and flexible solution. Ajax products are quick and easy to install, which is particularly valuable in this case, as everything can be easily moved and reconfigured when needed. For the expansive 5,000 m2 space, Lankhof Beveiliging’s chosen solution involved the implementation of the Hub 2 Plus Jeweller control panel. It has four communication channels (Wi-Fi, Ethernet, and two SIM cards) and supports LTE and photo verification. With such a configuration, up to 200 devices can be added to the hub, making it a perfect fit for a large facility. Integration with the client’s LAN network ensured compliant reporting to the central monitoring station. ReX 2 Jeweller radio signal range extender The ReX 2 Jeweller radio signal range extender was installed to ensure stable communication between Ajax detectors and the hub. The hub’s communication range was sufficient to cover a given perimeter, but the warehouse presented some challenges. Significant radio interference was expected due to its metal walls and many metallic goods stored within. However, the professional installer efficiently designed the system to maintain stable communication throughout the facility, successfully implementing just one range extender. DoorProtect Jeweller Third-party contacts on the overhead doors for vehicles were seamlessly integrated into the Ajax system In terms of intrusion prevention, pedestrian doors were equipped with DoorProtect Jeweller opening detectors for reliable monitoring. Furthermore, third-party contacts on the overhead doors for vehicles were seamlessly integrated into the Ajax system. MotionCam Jeweller detectors were placed around the warehouse to detect movement and capture any possible intrusion, providing additional false alarm verification with a series of pictures available in the Ajax app. KeyPad Plus Jeweller To make the system convenient and easy for the client but also protected from unauthorized access, Lankhof Beveiliging installed KeyPad Plus Jeweller and distributed contactless Pass cards to employees for access to the facility. At the same time, the administration and installation company used straightforward Ajax apps to monitor the system status and implement additional settings. StreetSiren, FireProtect 2 RB and MultiTransmitter Jeweller The module features 18 wired zones for device connection and five contact types of support Installed on all sides of the building, StreetSiren Jeweller sirens provided both deterrence and audible notifications. Fourteen FireProtect 2 RB (Heat/Smoke) Jeweller fire detectors were installed within the business premises to address fire safety. Larger spaces were equipped with new third-party long-beam fire detectors, connected to MultiTransmitter Jeweller. The module, featuring 18 wired zones for device connection and five contact types of support, made it easy to connect the third-party fire detectors. Why Ajax Complex protection against intrusion and fire: An Ajax system offers complete intrusion protection, video surveillance, fire detection, water leak prevention, and automation solutions that can be integrated with wired and wireless detectors. In this case, the solution covered the client’s need for a single intrusion and fire protection system with quick and easy configuration and management in one app. Flexible and quick-to-install wireless solutions: Since the warehouse is temporarily at the company’s disposal, and the client needed to put the warehouse into operation as soon as possible, Ajax wireless devices were the most effective solution to meet these security demands. They are quick, easy to install and configure in the app, and comply with the Grade 2 insurance requirements. In case of a relocation, the entire system can be easily removed and installed at another facility. Large-scale capability with the Jeweller radio protocol: Thanks to the Jeweller proprietary radio protocol, the chosen security solution facilitated a swift and hassle-free implementation in a 5,000 m2 industrial hall. The Jeweller protocol offers reliable two-way communication between a hub and detectors, covering distances of up to 2,000 meters and transmitting alarm signals in less than 0.15 seconds. Products Hub 2 Plus Jeweller: Security system control panel ReX 2 Jeweller: Radio signal range extender that boosts the range of Ajax security system devices MultiTransmitter: Module for connecting wired alarm to Ajax FireProtect 2 RB (Heat/Smoke) Jeweller: Wireless fire detector with heat and smoke sensors MotionCam: Motion detector with a photo camera to verify alarms DoorProtect Jeweller: Wireless opening detector StreetSiren: Wireless outdoor siren with vandalism resistance KeyPad Plus: Wireless touch keypad supporting encrypted contactless cards and key fobs Pass: Encrypted contactless card for keypad
Since the end of 2023, Bosch's artificial intelligence has been safeguarding the world-renowned Aachen Cathedral, which is more than 1,200 years old. Germany's first UNESCO World Heritage site has been equipped by Bosch Building Technologies and the engineering firm planning with an intelligent video solution that protects it against a multitude of potential threats. Intelligent video solution Fires, in particular, can be devastating for such a historic building of inestimable intangible value and this is precisely why Aachen Cathedral has opted for the new system, which can detect a potential danger particularly quickly: Over 50 Aviotec cameras from Bosch in 16 rooms use intelligent video analytics to visually detect smoke and flames directly at their source. Due to AI algorithms, video cameras can also differentiate, for example, candlelight from a developing fire. This substantially reduces the likelihood of false alarms. Thus, the cameras respond much earlier than conventional ceiling-mounted fire detectors, which require smoke to rise to them. Fire detection "We are proud of this globally unique project at Aachen Cathedral," says Dr. Marcus Nadenau, Head of the European system integrator business Energy and Building Solutions at Bosch Building Technologies. "Aviotec offers an invaluable speed advantage in fire detection, especially in buildings with complex layouts and high ceilings," adds Dr. Nadenau. Video surveillance Cathedral master builder Dr. Jan Richarz, who took over the project from his predecessor Helmut Maintz, emphasizes the significance of this technology for the protection of Aachen Cathedral, supported by the Karlsverein / Cathedral Construction Association and the state of North Rhine-Westphalia, "With this video surveillance solution, Aachen is a global leader." "It protects our World Heritage site as reliably and innovatively as befits its historical, religious, and cultural significance. I am very satisfied with the result and the collaborative partnership," says Dr. Richarz. AI protects treasures of immeasurable value Aviotec raises the alarm if someone enters the virtual exclusion zones around individual exhibits Aviotec primarily secures the cathedral's interior with its valuable relics and unique artworks, admired by over a million visitors annually. The video solution ensures that visitors can get as close as possible to the many treasures without endangering them: Aviotec raises the alarm if someone enters the virtual exclusion zones around individual exhibits. Day-night surveillance During the day, it protects the cathedral from vandalism and theft, and at night from break-ins. Thanks to Aviotec, visitor flows can now be managed much more efficiently, as only a limited number of people are allowed in the cathedral at any one time: The previously laborious manual counting of visitors is now undertaken by the video solution. Protecting an important building together Bosch Building Technologies, in collaboration with the engineering firm, planned, developed, and implemented the comprehensive video solution for the cathedral. Every step was closely coordinated with the Cathedral Construction Lodge, whose challenging task is to preserve the cathedral and its treasures for the future. "Aviotec from Bosch offers early fire detection and video security functions in one system, perfectly meeting the special protection needs of this sacred building," says Ralf Wolters from the engineering firm planning. "Cutting-edge technology meets centuries-old treasures. This combination has excited me," says the engineer. Integrated fire alarm system A monitor shows arriving firefighters live images from the cathedral and informs them about the exact location An advantage of the Aachen solution is its close integration with the local fire department: As soon as one of the Aviotec cameras detects a developing fire, the Aachen professional fire department is informed via the normatively integrated fire alarm system. A monitor shows arriving firefighters live images from the cathedral and informs them about the exact location where the danger was detected. This saves valuable time. Due to the high Aviotec standard, the fire department allowed the solution to be connected to its systems as a special detector. As the world's first system for video-based fire detection, Aviotec was certified by VdS in 2017. Close coordination with heritage conservation To determine the ideal position for each camera within the building, digital floor plans were initially created, followed by an elaborate 3D simulation. Heritage conservation was involved early on, allowing the video system to blend almost invisibly into the existing ensemble. During the installation phase, more than 30 craftsmen worked in the cathedral at times, implementing electricity, lighting, and the new video solution in coordination. For the entire team, it was a special experience to work on a UNESCO World Heritage site.
Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organization, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Products
Videos
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadArtificial Intelligence
Download