Wireless video security system
Swann, a globally renowned provider of do-it-yourself security solutions, has announced the release of the Swann Tracker security camera as well as the Swann Enforcer camera systems in 4K resolution, a perfect indoor and outdoor security solution for any home or business. The 1080p resolution Enforcer cameras are coming soon. Swann Tracker security camera The Swann Tracker security camera was first unveiled at the Consumer Electronics Show (CES) 2020 earlier this year and was named a CES 2020...
Even the most reliable security equipment is never fully protected from false alarms. Most of the time, they occur due to simple oversights, hyperactive pets, or incorrect installation. But when the security companies react to false alarms, they risk getting late in case of a real emergency. Some send security patrols to check the unverified alarms right away. The others count the detector triggerings before responding and lose precious minutes in the result. In any case, false alarms bring str...
BX-35ZBS bell box is a battery-operated wireless outdoor siren generating a loud 104 decibel siren sound and strobe lights during an alarm to provide visible and audible alerts. Encased in a durable, IPX5 waterproof design, easy-to-install BX-35ZBS is a premium choice for the modern smart home. The BX-35ZBS is energy saving and environmentally conscious, requiring only two Alkaline batteries, yet still has a long battery life. The BX-35ZBS generates unique alarm sounds for fire and burglary to...
SR-32 is a battery-operated wireless indoor siren, generating a loud 104-decibel siren to alert users to possible intruders, emergencies, and safety incidents. The multi-functional indoor siren can work with the control panel to emit entry and exit delay beeps. The SR-32 generates unique alarm sounds for fire and burglary to audibly inform the user of the type of danger at hand. Encased in an elegant, modish design, the SR-32 will effortlessly fit into the home decor. SR-32 is lightweight and e...
OPTEX, a global provider of sensors, is launching the QX Infinity (QXI) series, a new range of general application outdoor intrusion sensors for the EMEA region. The QXI series is a family of compact, outdoor sensors that provides a 12m detection area up to 120° in width. A particular benefit of the new range is that the sensors are specifically designed to be mounted at heights of up to 2.7m, making them less obvious to intruders and out of reach from vandals. One model in the range, the Q...
As organizations continue to connect their infrastructures, wireless connectivity remains a critical piece of their strategy. To meet the growing demand for wireless connectivity in the most challenging environments, Cisco Systems is announcing its intent to acquire Fluidmesh Networks, a privately-held, US-based security company renowned for providing wireless backhaul systems. Fluidmesh’s technology will compliment Cisco’s robust industrial wireless portfolio, providing reliable and...
Motorola Solutions has agreed to acquire IndigoVision, a U.K.-based provider of end-to-end video security solutions. The boards of Motorola Solutions, its holding company and IndigoVision have reached an agreement on the terms of a recommended cash acquisition for approximately $37.2 million, representing a premium of approximately 116 percent based on the average share price over the most recent 12-month period. The acquisition will be funded by existing cash resources of Motorola Solutions and become final in May 2020. Motorola Solutions has a strong presence in the large and expanding area of video security since acquiring Avigilon in March 2018. Their product offerings include high-definition cameras, advanced video analytics, network video management hardware and software and access control solutions. IndigoVision is a developer of complete, end-to-end video security solutions from cameras to video recorders to body worn cameras to security management software. Motorola Solutions says the IndigoVision range of products, global presence and customer base are "highly complementary" to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. "The access we will now have to Motorola Solutions' range of innovative technologies will create new opportunities for IndigoVision and enable us to bring an exciting proposition to the market that allows us to further deliver on our goal of delivering safety, security and business intelligence," says Pedro Vasco Simoes, Chief Executive Officer of IndigoVision. "We share IndigoVision's commitment to providing next-generation, end-to-end video security solutions that enhance safety, security and efficiency," says John Kedzierski, Senior Vice President, Video Security Solutions, Motorola Solutions.
Nukleas Ltd. is slated to exhibit the Nukleas Integrated Security Solutions (NISS) consortium, a one stop UK security industry solution for command and control/surveillance requirements, at Security and Policing 2020 security event, taking place in the Farnborough International Exhibition and Conference Center from 3 - 5 March, 2020 on stand E49. Nukleas solutions The NISS consortium combines British industry excellence to provide complementary solutions for a coordinated approach on all types of security projects. This single integrated solution combines, command and control systems, robust camera surveillance solutions, secure wireless transmission and networking, integrated communication hubs, incident management, perimeter protection, intrusion detection, mobile devices, live streaming of images, video analytics (including globally renowned facial recognition) and multiple other security and safety solutions, which are scalable and tailored to each unique project requirement. NISS consortium combines British industry excellence to provide integrated solutions for a coordinated approach Richard Freeman, Director of Nukleas Limited said, “We are looking forward to exhibiting at Security and Policing and welcome UK and international visitors to stand E49, next to the UK Government zone, at the center of the event. Together, the NISS consortium has a track record of well over 140 years of providing UK manufactured products, software and services for complex site security designs and budget cycles. NISS can offer turnkey solutions with innovative and cost-effective solutions, supported by world leading training and we are actively seeking to build joint venture partnerships”. Critical national infrastructure protection The UK’s critical national infrastructure protection and emergency services are considered amongst the best in the world and this reputation has been built by working in partnership with the UK security industry and includes the deployment of Nukleas solutions. NISS experience and expertise ensures the safety and security of people and infrastructure across the globe, providing assurance through UK standards including those set by the Center for the Protection of National Infrastructure (CPNI). The consortium concept is also advocated by the UK Government’s Department for International Trade’s Security Export Strategy and can be supported by UK export finance.
The Nukleas Integrated Security Solutions (NISS) consortium, a one stop UK security industry solution for command and control/surveillance requirements, is exhibiting at Security and Policing 2020, Farnborough International Exhibition and Conference Center between 3-5 March, on stand E49. The NISS consortium combines British industry excellence to provide complementary solutions for a coordinated approach on all types of security projects. This single integrated solution combines, command and control systems, robust camera surveillance solutions, secure wireless transmission and networking, integrated communication hubs, incident management, perimeter intrusion detection, mobile devices, live streaming of images, video analytics (including world leading facial recognition) and multiple other security and safety solutions which are scalable and tailored to each unique project requirement. Innovative and cost-effective solutions Richard Freeman, Director of Nukleas Limited said: “We are looking forward to exhibiting at Security and Policing and welcome UK and international visitors to stand E49, next to the UK Government zone, at the center of the event. Together, the NISS consortium has a track record of well over 140 years of providing UK manufactured products, software and services for complex site security designs and budget cycles." "NISS can offer turnkey solutions with innovative and cost-effective solutions, supported by excellent training and we are actively seeking to build joint venture partnerships”. Infrastructure protection and emergency services The UK’s critical national infrastructure protection and emergency services are considered amongst the best in the world and this reputation has been built by working in partnership with the UK security industry and includes the deployment of Nukleas solutions. NISS experience and expertise ensures the safety and security of people and infrastructure across the globe, providing assurance through UK standards including those set by the Center for the Protection of National Infrastructure (CPNI). The consortium concept is also advocated by the UK Government’s Department for International Trade’s Security Export Strategy and is supported by UK export finance.
KBC Networks will be present at ISC West 2020 with their industrial transmission and remote power solutions on booth 29093 from March 17th – 20th. Well known in the industry for their trusted fiber transmission solutions, KBC will highlight their broad range of fiber products, including their direct replacements for the discontinued IFS and Fiber Options legacy products. KBC’s fiber optic range offers multimode and singlemode solutions for static and PTZ cameras; industrial data systems including RS-485, 232 and 422 telemetry; single and multi-channel contact closure and Ethernet media conversion including Power over Ethernet. Digitally encoded video transmission Both the Mobile and Fixed Base Surveillance Systems are fully compatible with KBC industrial transmission products Solutions include simple point-to-point transmission links, self-healing ring, daisy chain and BUS to custom-build, multi-interface modems with provision for up to 128 real-time video signals plus other signals over a single fiber. The range supports video, audio, data, Ethernet, telephone, contact closure, DVI, HD-SDI, 3G-SDI and USB, and features 8- or 10-bit digitally encoded video transmission. Designed for faster installation and to maximize product density, KBC fiber products are available in compact, wall-mount, DIN rail, 19” rack and cards for 3U or 4U chassis. Built to perform in non-conditioned environments, they are housed in industrially hardened casings and have extended operating temperatures. Mobile Surveillance Systems Also on display this year will be the newest Mobile Surveillance Systems (MSS). After successfully introducing the MSS at ISC West last year, KBC will debut a fixed base unit available for stand-alone design or multiple unit installations. This custom configured solution is ideal for applications requiring semi-permanent or mid to long term video, audio and data security. Both the Mobile and Fixed Base Surveillance Systems are fully compatible with KBC industrial transmission products, including the gigabit wireless and ThruLinkTM hardware-based VPN device.
Allegion, a provider of security products and solutions, and CBORD, a provider of campus card technology solutions, announced a new integration that strengthens perimeter security across colleges and universities in the U.S. Allegion’s Von Duprin Remote Undogging (RU) and Remote Monitoring (RM) options will now extend the impact of CBORD’s card software system for greater control of secondary doors over perimeter access. The integration improves perimeter security by providing electronic override of mechanical dogging so lockdown can occur from the CBORD interface. To ensure peace of mind, remote monitoring capabilities are also available through the integration. Security issue on campus Colleges need to be able to lock down immediately if there is a security issue on campus" This integration also makes Allegion and CBORD one of the first to bring this solution to higher education campuses for access control at this scale. Higher education campuses face a unique challenge when it comes to security – they are larger, open by design, and tend to have more buildings than other learning institutions, making security a demanding task for facility personnel. “This is one of the most critical security hurdles universities face,” said Robert Lydic, Vice President of PACs OEM business at Allegion. “Due to the required circulation between buildings, colleges need to be able to lock down immediately if there is a security issue on campus.” Electronic access control system Yong Lacy, category leader of openings at Allegion, added, “It is not feasible for universities to leave perimeter doors locked during operating hours because students, faculty and visitors constantly need to move across campus buildings with ease. Remote undogging and monitoring can enhance security to avoid putting the college community at risk in emergency situations.” Many secondary doors are not connected to a campus’ electronic access control system, exposing universities to potential security breaches, especially during emergency lockdowns. The Von Duprin RU and RM options, coupled with CBORD’s software, are designed to extend the benefits of electronic access control to these openings. This integration provides higher education customers a wide range of affordable solutions to meet their perimeter electronic access control needs, seamlessly integrating with security systems like Schlage’s electronic locks, readers and credentials. Access control software The RM option is the sensor-only configuration for exit-only or fire-rated doors that require monitoring" “CBORD has been a provider of campus technology for more than forty years and works with partners like Allegion to design innovative solutions as security risks continue to evolve,” said Jim Hoefflin, CBORD president. “We’ve taken a best-of-breed in security solutions and integrated it with our industry-leading access control software for a smart integration that responds to the market’s increasing need for improved campus perimeter security.” The Von Duprin RU option is a retrofit kit for exit devices that enables remote undogging for centralized lock down and door status monitoring with integrated request to exit (RX), latch bolt (LX) and door position switch (DPS) signaling capabilities. The RU option connects wirelessly via BLE to the ENGAGE Gateway, providing real-time, bi-directional communication to the Open Options DNA Fusion software via IP network connection directly to the Gateway. Advanced access control adoption The RU option is a modular battery powered kit that can be added on to existing Von Duprin 98/99 and 33A/35A series devices. The RM option is the sensor-only configuration for exit-only or fire-rated doors that require monitoring. It provides visibility to door status with the same RX, LX and DPS signals as the RU option, without the centralized lockdown component. This integration is part of the next wave in Allegion’s quest to work with the leading players in the industry to spearhead advanced access control adoption, making seamless security the new standard at higher education institutions.
Ambarella, Inc., an AI vision silicon company, announced the CV22FS and CV2FS automotive camera system on chips (SoCs) with CVflow AI processing and ASIL B compliance to enable safety-critical applications. Both chips target forward-facing monocular and stereovision ADAS cameras, as well as computer vision ECUs for L2+ and higher levels of autonomy. Featuring extremely low power consumption, the CV22FS and CV2FS make it possible for tier-1s and OEMs to surpass New Car Assessment Program (NCAP) performance requirements within the power consumption constraints of single-box, windshield-mounted forward ADAS cameras. Other potential applications for the processors include electronic mirrors with blind spot detection (BSD), interior driver and cabin monitoring cameras, and around view monitors (AVM) with parking assist. Intelligent viewing platforms ZF is pleased to be working with Ambarella on the intelligent viewing platforms for Surround View Visualization" The two new SoCs are the latest additions to Ambarella’s successful CVflow SoC family that offers automotive OEMs, tier-1s, and software development partners an open platform for differentiated, high-performance automotive systems. ZF, a global technology tier-1 and supplier of systems for passenger cars and commercial vehicles, is working with Ambarella on viewing and sensing systems: “ZF is pleased to be working with Ambarella on the next generation of intelligent viewing platforms for Surround View Visualization, Driver Monitoring stand-alone vision processing, and e-mirror solutions for both the passcar and commercial vehicle markets,” said Aaron Jefferson, vice president of ADAS product planning at ZF. “The CVflow SoCs’ combination of high quality imaging and advanced AI processing enables ZF to offer a wide range of viewing and interior sensing applications.” visual perception software HELLA Aglaia, a global developer of intelligent visual perception software, has worked with Ambarella’s CVflow processors over the past year: “We chose Ambarella’s CVflow SoCs due to their ability to deliver extremely high computer vision processing performance with very low power consumption,” said Kay Talmi, managing director at HELLA Aglaia. “With the introduction of the CV22FS and CV2FS ASIL SoCs, Ambarella now delivers the functional safety features required by automotive OEMs for the mass production of safety-critical systems.” “Ambarella’s CVFlow architecture delivers an unparalleled combination of AI performance and power efficiency,” said Fermi Wang, president and CEO of Ambarella. “We are pleased to introduce these ASIL compliant CVflow SoCs, delivering on our promises to our partners and customers and further demonstrating our commitment to the automotive market.” Advanced stereovision applications Ambarella will also demonstrate a range of applications from other key partners running on the CVflow engine The CV22FS and CV2FS’s CVflow architecture provides computer vision processing in 8-megapixel or higher resolution at 30 frames per second for object recognition over long distances and with high accuracy. The SoCs each include a dense optical flow accelerator for simultaneous localisation and mapping (SLAM), as well as distance and depth estimation. Multi-channel high-speed sensor input and Ambarella’s image signal processing (ISP) pipeline provide the necessary camera input support, even in challenging lighting conditions. CV2FS also enables advanced stereovision applications by adding a dense disparity engine. Ambarella will demonstrate its CVflow SoC family during CES 2020 to select customers and partners. Demonstrations will include HELLA Aglaia’s deep learning ADAS algorithms and Ambarella’s EVA (Embedded Vehicle Autonomy) self-driving prototype vehicle. Ambarella will also demonstrate a range of applications from other key partners running on the CVflow engine. CV22FS and CV2FS are scheduled to sample to Ambarella customers in the first half of 2020. Wireless video streaming CV22FS and CV2FS SoC key features: CVflow architecture with DNN support Quad-core 1-GHz Arm Cortex-A53 with NEON DSP extensions and FPU Safety island with dual-core lock step (DCLS) Arm R52 targeting ASIL-C Dense optical flow engine Dense stereo disparity engine (CV2FS only) ASIL B functional safety level - High speed SLVS/MIPI CSI-2/LVCMOS interfaces Multi-channel ISP with up to 480-Megapixel/s input pixel rate Native support for RGGB, RCCB, RCCC, RGB-IR, and monochrome sensor formats Multi-exposure high dynamic range (HDR) processing and LED flicker mitigation Real-time hardware-accelerated fish-eye dewarping and lens distortion correction (LDC) 4-megapixel AVC encoding for video logging and wireless video streaming Rich set of interfaces includes CAN FD, Gigabit Ethernet, USB 2.0 host and device, dual SD card controllers with SDXC support, MIPI DSI/CSI-2 4-lane output Advanced security features, including OTP for secure boot, TrustZone, and IO virtualization AEC-Q100 grade 2 (-40C to +125C (TJ) operating temperature) 10 nm process technology
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behavior, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organizations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behavior of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education program. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
Wireless surveillance systems are attractive to customersas they are cost-effective and easy to install Various studies, market statistics and forecasts project growth for the surveillance market from 2016 to 2020. Besides needs ranging from traditional analog cameras to IP network cameras, more and more consumers also have a high interest in intelligent surveillance systems. Along with safety, these systems provide additional details for users in applications such as people counting and object tracking. As terrorist attacks become more serious, people and governments are eager to find solutions to prevent incidents and protect safety and property. Therefore, with the increased demand for security products, surveillance companies are pushing themselves to launch more innovative and higher quality products for customers to satisfy a variety of needs. Wired vs. Wireless Surveillance System Surveillance applications can be separated into two types – wired surveillance systems and wireless systems. An original wired surveillance system requires much more equipment to complete an entire system, such as switches and cables. However, wireless surveillance systems are attractive to customers as they are easy to install and also save the cost of wiring. Hence, more and more consumers tend to search for wireless surveillance solutions for their flexibility and cost effectiveness. What Are WiFi, 3G and 4G? Before introducing wireless surveillance systems, it’s important to have a clear understanding of the differences among WiFi, 3G and 4G. WiFi is a local area wireless computer networking technology that allows electronic devices to network without cords or cables. WiFi is based on the IEEE802.11 network standard, and different protocols will provide different features. WiFi mainly uses the 2.4 GHz and 5 GHz ISM radio bands. Meanwhile, the data transfer is protected and encrypted by WPA and WPA2 security standards, and the EAP authentication standard. WiFi could be the most popular wireless communication protocol, which can be used for indoor and outdoor applications. Differences between WiFi, 3G and LTE (4G) 3G is short for third generation, which means the third generation of mobile telecommunications technology. 3G telecommunication networks support services that provide an information transfer rate up to 700 kbps (3.5G uplink 5.7Mbps). Unlike WiFi service, which users access through networking hotspots, users of 3G must be subscribed to a service provider to get network connectivity. Most devices connect to the 3G network through their SIM card or a 3G data card. In contrast to 3G, WiFi has a distance limitation; the device must stay close to the access point to ensure network connectivity. However, 3G transmission is broader; as long as there is a signal, the device can connect to the network easily. 4G (LTE) is the fourth generation of mobile telecommunications technology. LTE stands for Long Term Evolution. It’s a term used for a particular type of 4G that delivers the fastest mobile Internet experience. 4G is ideally suited for services that demand more capacity, such as video streaming, mapping and social networking. Compared with 3G, users are able to have up-to-date information faster than ever, regardless of upload or download data. 4G means that a network offers peak data rates of at least 100 Mbps for high-mobility communication like users in cars or trains, etc., and at least 1 Gbps for low mobility communication such as pedestrians and stationary users. Wireless Surveillance System Advantages Wireless surveillance combines wireless transmission with network video surveillance to create a powerful solution that overcomes the challenges that prevent many people from installing surveillance and monitoring systems. These challenges can include distance, lack of network infrastructure, environmental conditions, and costs. Wireless systems can overcome these obstacles and work exceptionally well for monitoring separate building units or rural areas where there is a long distance between two sites. There are also numerous add-ons for wireless systems. Wireless surveillance systems perfectly protect the structural integrity and maintaina building’s beauty without sacrificing safety Cost-Effective: Wire-Free Wireless surveillance systems are an undeniably cost-effective solution for the users, not only saving the material cost but also the time of installation and maintenance. Implementing a wired surveillance system can be a massive issue for installers and also extremely time consuming due to various challenges of placement. Therefore, a wireless IP surveillance system can offer a more affordable solution for the user, and this financial benefit can continue for a couple of years after the installation through maintenance cost savings. Building Protection And Aesthetic Wireless installations keep the building’s aesthetic appearance intact as users do not have to worry about wires and the means to conceal them. Instead, users can enjoy a safe environment with an aesthetic and clean placement. Wireless surveillance systems perfectly protect the structural integrity and maintain a building’s beauty without sacrificing safety. For users who have these particular kinds of surveillance needs, wireless solutions can perfectly match their expectations. Flexible And Scalable: Less Infrastructure Limitation For an environment that lacks a complete infrastructure, it would be difficult to build a wired surveillance system. Digging and burying a fiber network may not be desirable for all locations, such as historical monuments, farms, parking lots or wilderness. However, a wireless solution can conquer this challenge by using a wireless infrastructure for connectivity. Cameras do not need to be permanently located next to a wired network; instead, they can be set up anywhere as long as the signal can be reached. Moreover, wireless solutions are available for even the largest scale deployments, and are also available in ruggedised enclosures for deployment in all weather conditions. Meanwhile, the entire wireless surveillance system setup can be moved to a new location easily and quickly. Conclusion Consumers have more and more excellent options when it comes to wireless surveillance security systems. Wireless systems now offer complete functionality, flexibility, and ease of use compared to wired system. The innovative technology promises users a better and safer living environment, and surveillance companies will continue developing more valuable products and solutions.
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Covid-19 concerns Concerns about the coronavirus have increased the business world’s dependence on teleworking. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Traffic in other countries is up 400% or more, and specialist video conferencing businesses have seen a near doubling in share value (as the rest of the stock market shrinks). Basic email security has remained unchanged for 30 years Email is a core element of business communications, yet basic email security has remained unchanged for 30 years. Many smaller businesses are likely to still be using outdated Simple Mail Transfer Protocol (SMTP) when sending and receiving email. “The default state of all email services is unencrypted, unsecure and open to attack, putting crucial information at risk,” says Paul Holland, CEO of secure email systems provider Beyond Encryption. “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority,” says Holland. The company’s Mailock system allows employees to work from any device at home or in the office without concerns about data compromise or cybersecurity issues. Acting quickly and effectively As the virus spreads, businesses and organizations will need to act quickly to establish relevant communication with their employees, partners and customers surrounding key coronavirus messages, says Heinan Landa, CEO and Founder of IT services firm Optimal Networks. Employers should also enact proper security training to make sure everyone is up to speed with what’s happening and can report any suspicious online activity. Reviewing and updating telework policies to allow people to work from home will also provide flexibility for medical care for employees and their families as needed. Scammers, phishing, and fraud An additional factor in the confusing environment created by the coronavirus is growth in phishing emails and creation of domains for fraud. Phishing is an attempt to fraudulently obtain sensitive information such as passwords or credit card information by disguising oneself as a trusted entity. Landa says homebound workers should understand that phishing can come from a text, a phone call, or an email. “Be wary of any form of communication that requires you to click on a link, download an attachment, or provide any kind of personal information,” says Landa. Homebound workers should understand that phishing can come from a text, a phone call, or an email Email scammers often try to elicit a sense of fear and urgency in their victims – emotions that are more common in the climate of a global pandemic. Attackers may disseminate malicious links and PDFs that claim to contain information on how to protect oneself from the spread of the disease, says Landa. Ron Culler, Senior Director of Technology and Solutions at ADT Cybersecurity, offers some cyber and home security tips for remote workers and their employers: When working from home, workers should treat their home security just as they would if working from the office. This includes arming their home security system and leveraging smart home devices such as outdoor and doorbell cameras and motion detectors. More than 88% of burglaries happen in residential areas. When possible, it’s best to use work laptops instead of personal equipment, which may not have adequate antivirus software and monitoring systems in place. Workers should adhere to corporate-approved protocols, hardware and software, from firewalls to VPNs. Keep data on corporate systems and channels, whether it’s over email or in the cloud. The cyber-protections that employees depended on in the office might not carry over to an at-home work environment. Schedule more video conferences to keep communication flowing in a controlled, private environment. Avoid public WiFi networks, which are not secure and run the risk of remote eavesdropping and hacking by third parties. In addition to work-from-home strategies, companies should consider ways to ensure business cyber-resilience and continuity, says Tim Rawlins, Director and Senior Adviser for risk mitigation firm NCC Group. “Given that cyber-resilience always relies on people, process and technology, you really need to consider these three elements,” he says. “And your plan will need to be adaptable as the situation can change very quickly.” Employees and their employers Self-isolation and enforced quarantine can impact both office staff and business travelers Self-isolation and enforced quarantine can impact both office staff and business travelers, and the situation can change rapidly as the virus spreads, says Rawlins. Employees should be cautious about being overseen or overheard outside of work environments when working on sensitive matters. The physical security of a laptop or other equipment is paramount. “It’s also important to look at how material is going to be backed up if it’s not connected to the office network while working offline,” says Rawlins. It’s also a good time to test the internal contact plan or “call tree” to ensure messages get through to everyone at the right time, he adds.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
Open Options, based in Addison, Texas, provides a truly open access control architecture that will strengthen the ACRE portfolio and increase the breadth of solutions offered by the global provider of security systems. The acquisition of Open Options is also an opportunity for ACRE to focus on growth opportunities in North America and “balance the scales a bit,” says Joe Grillo, CEO of ACRE, which significantly grew its reach in Europe, the Middle East and Africa with the acquisition of Siemens Security Products in 2015. “Open Options is also a company that's growing, is profitable and fits seamlessly into our vision for the access control space in which we operate,” says Grillo. Independent Operations The strength of Open Options in the Southwest provides significant additional coverage for ACRE in that region of the United States The Open Options brand will continue to operate independently under the ACRE umbrella. Open Options CEO and Founder Steve Fisher will continue in his role as leader of the company, says Grillo. “There is a strong and competent management team in place that will continue to provide leadership going forward.” Open Options’ open-architecture access control solutions will add value to the solutions ACRE already offers under the Vanderbilt brand. In a market that has traditionally been proprietary, the open-platform solution offered by Open Options helps deliver more opportunity to offer customers a full-scale solution based on their needs, says Grillo. In addition, due to its origin as a Texas-based company, the strength of Open Options in the Southwest provides significant additional coverage for ACRE in that region of the United States. Technical And Financial Resources On the other hand, ACRE provides a greater level of technical and financial resources that Open Options can utilize to help them grow even faster. These resources were not as available to the company if it remained independent, Grillo notes. ACRE’s divestiture of Mercury Security in 2017 facilitated this investment. As discussions began earlier this year, ACRE realized the potential of adding to its access control portfolio in the North American market, says Grillo. Open Options and Mercury have been "partners" for 20 years; Mercury provides hardware panels for Open Options systems. Each company will manage and make decisions about their reseller channels independently “The Mercury brand continues to be a strong one, so we're interested in continuing to nurture that relationship, and in fact we have become a larger and stronger partner to Mercury as ACRE,” says Grillo. “After owning Mercury for a number of years, we had the understanding of the company, the product portfolio and the partner relationships that defined it, so we were confident that the deal would be a positive one for the ACRE brand.” Meeting Customer Needs “Open Options and Vanderbilt share some customers already and we can leverage that by gaining more share of their business while providing them with a portfolio that will meet a broader set of customer needs,” says Grillo. “Where possible, we can look for synergies in channel partners that are not currently shared to provide access to both brands. This will be a benefit to Open Options, Vanderbilt and our customer base. However, importantly, each company will manage and make decisions about their reseller channels independently.” Are there more acquisitions on the horizon for ACRE? “We're always looking for opportunities that fit into the nature of our business,” says Grillo. “Companies that have growth potential and share similar go-to-market strategies and visions for the future are of particular interest to ACRE. "We're still operating in a highly fragmented market, so we're going to see continued consolidation in both access control and beyond, which means ACRE will be looking for the right opportunities to follow along that path.”
Brienon-sur-Armançon is a city in the Burgundy-Franche-Comté region of north-central France, with a population of about 3,300. Located at the intersection of two rivers – Créanton and 'Armançon, Brienon-sur-Armançon enjoys an advanced road network which is vulnerable to illegal activities. To make the city safer, the local government, with far less than sufficient police force at hand, chose to secure its city and residents with Dahua Safe City Solution. There were two main pressing issues that needed to be addressed. Firstly, the city had far less than insufficient police force, only one policeman was supposed to look after the whole 3,300 dwellers. Secondly, Brienon-sur-Armançon had not prepared itself with necessary cables needed for modern surveillance systems, requiring the Dahua Team to design a tailored solution according to the unique local environment and limited human resources of this city. Wireless transmission device This solution aids them in obtaining video recordings that can be used as evidence in case of an incident To make up for the shortage of police force and network cables, Dahua Technology delivered a customized solution covering the whole city with various kinds of video surveillance devices. These equipment are linked by a wireless device combining PTZ camera and antenna that transmits all the collected information to the highest point in the city center. These data are then transmitted to the control center, making it easy for the police to achieve round-the-clock monitoring. To monitor major sections of the city, an array of modern devices were utilised including Starlight IR PTZ AI Network Camera, Multi-Sensor Panoramic Camera, Eyeball Camera, Thermal Camera, ANPR Camera, Wireless transmission device, keyboard, etc. From the control center in the police station, the police can check real-time situation and decide whether to take action. This solution also aids them in obtaining video recordings that can be used as evidence in case of an incident. Vehicles trigger detection In addition, the combined strength of the Dahua general camera and PTZ camera created a smart capture mechanism for the police. General cameras were installed to monitor fixed scenes, once human or vehicles trigger detection rules set by the operator (like tripwire and intrusion), the PTZ camera will automatically zoom-in and start tracking. For low-light applications, the Dahua Starlight Technology of the PTZ camera also offers outstanding light sensitivity, capturing color details even under ultra-low light condition. Moreover, ANPR Cameras were deployed for road safety enforcement on main roads. Embedded with License Plate Recognition (LPR) algorithm, the cameras have the ability to detect and recognize moving vehicle's plate number within low speed. Furthermore, installing Thermal Cameras took care of the job of monitoring the BBQ sites in the park with their built-in fire detection functionality that can detect fires even at long range distance. Effectively monitor major areas The police has solved a cemetery theft case with evidence recorded by the Dahua PTZ cameraWireless transmission device made it possible for all cameras in all locations to connect to the control center without the cost and trouble of wiring. NKB 5000 HD Network Control Keyboard was installed in the control center to help the police achieve split screen operation of both general and PTZ cameras. Some Seagate hard disks were also used to store recorded videos for future use. The Brienon-sur-Armançon police can now sit remotely in the control room and operate in an efficient way with the help of Dahua Safe City Solution, which allows them to effectively monitor major areas in the city and respond in time when an incident takes place. Dahua PTZ camera The recorded videos also serve as crucial evidence and help the police to crack a case with much less effort. In the first week of the test run of this smart system, the police has already solved a cemetery theft case with evidence recorded by the Dahua PTZ camera. “The origin of our cooperation with Dahua dates back to the visit to China a year ago. This visit to the Dahua headquarters in Hangzhou concluded with a reciprocal commitment – to equip the city of Brienon with video surveillance. We welcomed this agreement, which allowed the installation of the system and improved the daily life of our residents.” said Mr. Jean-Claude M.CARRA, Mayor of Brienon-sur-Armançon.
Theft from stock rooms and shop floors is a persistent problem for retailers. With around €900 million lost annually to thieves in Belgium alone, upscale fashion boutique Patio sought an easy, low-cost deterrent. Code Handle locks fitted on key doors were the answer. A location on Leuven’s most exclusive shopping street did not insulate Patio from retail theft. Shoplifting is a growing problem in many European countries, and thefts had also proliferated at Patio. Thieves were using the store’s toilet to remove clothing tags. Some even went upstairs to Patio’s offices and stole valuable items. Access control system Code Handle proved an ideal solution for us to protect non-public spaces from the public" During a store renovation, manager Jeff Van den Bergh decided Patio’s offices and customer toilet needed proper security. Shoppers and visitors should not enjoy free, casual access to these sensitive rooms. However, he did not want staff wasting their time tracking physical keys when they could be helping customers. An expensive access control system was also ruled out. Door hardware had to look clean and contemporary, to meet the style-conscious standards of Patio’s interior. The store’s security contractor recommended Code Handle, which adds electronic PIN locking to doors without wires or an expensive access system. “Code Handle proved an ideal solution for us to protect non-public spaces from the public,” says Jeff Van den Bergh, Patio’s Store Manager. Door security Door security is operated by a discreet PIN-pad built into a brushed-chrome handle. Two standard batteries slot inside each Code Handle to power the digital security. These typically last for 30,000 lock/unlock cycles. "The design fits well within the store,” adds Mr Van den Bergh. Now, Patio customers still use the toilet — but not unsolicited. An employee unlocks the door for them without a key or pass. The door to Patio’s offices is closed to everyone, except staff who unlock it with a personal PIN. Code Handle comes with one Master PIN; the store manager issues up to 9 additional 4–6-digit PINs. When an employee leaves Patio, it’s simple to delete their PIN. For further information visit https://campaigns.assaabloyopeningsolutions.eu/codehandle
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organize up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardizing security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
SMARTair® Wireless Online access management has proven a simple, school-wide electronic solution for greater control and security at Westbridge. Each staff member carries one RFID credential card programmed with access rights personalized to their individual role. In an emergency, the school can institute a complete lockdown via the centralized system. “Having a SMARTair® system in place has given us peace of mind. It’s quicker, it’s safer and it’s simple,” says Joanna Brunton, Executive Officer at Westbridge School. The school’s teaching, administration and residential buildings require multiple layers of access control, for both staff and students. The inflexibility of a legacy mechanical locking system had presented facility management and pupil safety challenges for years.“With over 50 staff, we needed more subtlety in assigning access permissions, which you simply can’t do with a bundle of metal keys,” explains Joanna Brunton, Westbridge School’s Executive Officer. New access system The system would need to be installed over the holidays for minimal disruption to the school’s busy calendar Beyond replacing and upgrading outmoded, inflexible mechanical key security, Westbridge had a number of requirements for its new access system. Devices in the new, unified system would replace piecemeal mechanical locking on 80+ doors around the site. School leaders wanted access control already proven in the field, with a track record of successful installations managing access in schools worldwide. New electronic locks must provide a real-time audit trail, so facility managers always know which doors are opened by which staff cards. The new system would also need to work within the school’s security budget — and be installed over the holidays, for minimal disruption to the school’s busy calendar. "We essentially had a safety and security need,” adds Joanna Brunton. “We needed to be able to discourage students from going where they didn’t need to be on site or redirect a student who was in a heightened state from re-entering a classroom and potentially disrupting the class or causing damage.” Wireless and battery operated SMARTair® solution has done everything we wanted it to do in terms of safety, security and monitoring" System administration is easy even for non-specialists. “I taught staff how to use the software and encode access cards,” says Kylie Bray, director at Western Lock Services, who have long managed hardware maintenance for Westbridge. “If a staff member loses their card, you can go straight in and delete it." The intuitive SMARTair® system software can open or secure individual zones, connecting to individual locks via a network of 9 hubs. “We now have the ability to set higher security for specific areas of our site, especially over the school holidays when students have gone home,” says Joanna Brunton. “Our regular maintenance contractors have their own access keys, so they just get straight on with their work without calling us to meet them for access. This keeps our time, and their costs, down. SMARTair® door devices are wireless and battery operated. Because there’s no need to run cabling to individual doors, installation was fast and cost-efficient. From a facilities management point of view, the solution has done everything we wanted it to do in terms of safety, security and monitoring,” adds Joanna.
Comelit 4 camera wireless CCTV system has been selected on site at the iconic, Grade II listed Chichester Cathedral, to protect the retail area and provide 24x7 high-quality monitoring capability and extra peace of mind for staff. Wireless CCTV surveillance This magnificent Cathedral has stood at the center of Chichester for over 900 years. With unique architecture from each century of its life, this Cathedral is both ancient and modern, where original medieval features sit alongside world famous contemporary artworks. Any works needed to consider the sensitivities of working in such a historic building. Comelit’s simple four camera wireless CCTV system provides a clear, detailed and well-defined high-resolution image A representative from Chichester Cathedral commented, “When it came to upgrading CCTV for the retail area, we contacted Envisage Technology Ltd who recommended Comelit’s 4 camera wireless CCTV system. It has proven to be the perfect solution, with the system proving simple to install. Staff now have access to monitors by the till points that also act as a significant visual deterrent. The high-quality images available add extra peace of mind.” Four camera wireless CCTV Kevin Brown, Managing Director, Envisage Technology added, “Chichester Cathedral is one of the most prestigious visitor sites in West Sussex. Comelit’s wireless CCTV specification, coming from such a renowned brand, provided the necessary infrastructure to embrace the need for delicate installation, minimizing the need to run cables, and still provide the high-quality footage. We can support the ongoing maintenance process to ensue volunteers, customers and staff are kept safe and secure.” Comelit’s simple four camera wireless CCTV system provides a clear, detailed and well-defined high-resolution image Comelit’s simple four camera wireless CCTV system provides a clear, detailed and well-defined high-resolution image. Installed outside of opening hours to avoid disruption to the retail environment, monitors were positioned directly by the till points, enabling staff to have full visual access of the complete area at all times. Retail surveillance Tim Edmonds, Comeilt CCTV Manager concluded, “The retail area, established in such a significant Cathedral is a great example of how Comelit’s wireless CCTV system can be used to protect any environment.” “Working with Envisage, the solution was presented as a simple, yet effective option, installed with absolutely no impact on the surrounding building. The result is a powerful visual deterrent and peace of mind that staff in store, and in back offices can keep an eye on operations quickly and easily, on a 24x7 basis.”
In the aging trend of 21th century with rapid aging population and high healthcare costs are creating a growing demand for care at home, especially for seniors with long-term health conditions. Home care is moving towards tele-health monitoring and telemedicine, including video conferencing and remote monitoring technology to help increase caregiver efficiency while still providing constant convenience to the patients. Living independently and aging gracefully are the ideals that every individual seeks to pursue, and the challenge is to ensure that all people can age with dignity and security. Climax’s GX Cubic Smart Care Medical Alarm is an all-in-one wellness, and personal safety medical alarm solution, designed to help the elderly to manage their long-term health conditions, bridging medical health monitoring information to care providers/hospitals and create points of care to keep them safe in their own homes. GX Cubic medical alarm GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors, like blood glucose monitor, pulse oximeter, blood pressure monitor, or weight for tracking health data and providing customized alerts to meet individual needs. The measurements can be automatically sent to a health professional who can review the results and continuously keep an eye on the patient’s health needs and provide early treatment as necessary. In addition to medical health monitoring, GX Cubic is also compatible with Pivotell Advance Automatic Pill Dispenser to keep secure of all pills, and remind the user to take the correct medicine at the pre-set time. The solution allows health professionals to monitor pill taking timely results and keep an eye on the patients’ treatment as needed. For situation when remote monitoring care given is insufficient and the user requires onsite assistance, GX Cubic can raise an emergency alarm to inform the caregiver or medical personnel for immediate action. Seniors can be assured that they are always being taken care of, and provide their family members with a peace of mind. Voice recognition solution Voice recognition has innovated over time and continues to advance, allowing products to become even more intuitive and easier to use. GX Cubic has built-in voice recognition and can activate an emergency call to care provider or central monitoring center by preset vocal commands or keywords. This allows seniors to receive emergency attention even in situations where they are immobilized or cannot manually reach the panic button. Working with the leading voice ecosystems Amazon Alexa and Google Home via cloud, GX Cubic also features voice control to activate home electronic devices, complete daily tasks, and seek help during emergencies. Voice over Internet Protocol With the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice callsWith the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice calls to contact their caregivers or family members at any time. With the additional add-on of DECT, GX Cubic can pair with voice extenders, talking pendants, call points, and voice extenders placed strategically around the home to create a safety net. Smart Home Automation Comprehensive elderly-friendly health care should also have a focus on preventive action to maintain a healthy ageing process. To realize independent living in a smart way, GX Cubic pairs with Zigbee or Z-Wave sensors to enable the whole-home control with various protocol-of-choice. GX Cubic can be programmed to turn on the hallway lights automatically when a sensor reports a senior’s movement in the middle of the night, to reduce a chance of falling; or automatically adjusting air conditioning when there is a sudden temperature-drop. The scenarios are unlimited to fit individual requirements, ensuring a safest living experience for the senior users. GX Cubic can also integrate IP security cameras and camera PIR motion sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and Monitoring Center to verify the event and sending immediate assistance as needed. Lastly, GX Cubic can support wireless sensor devices, allowing users to add in smoke detectors, water leakage sensors, and gas sensors to monitor environmental emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build a healthier, safer independent living.
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload
The 2020 State of Physical Access Control ReportDownload