Video signal devices & accessories - Expert commentary

Radar Technology Provides An Alternative For Smart Home Security
Radar Technology Provides An Alternative For Smart Home Security

In the state of the residential security market today, we see many who are offering home security packages that rely on numerous sensors and multiple devices to provide a comprehensive coverage of the home and provide peace of mind. Each individual sensor or device within the package provides a specific functionality, and the user finds himself burdened by an overwhelming amount of sensors and devices. This overload is intensified by the penetration of additional IoT and smart devices into the home, such as pet-cams or smart speakers that add to the burden of installation and maintenance. In addition, we are witnessing the rise in popularity of DIY security devices, indicating that users are looking for models and technologies that provide both contract flexibility and simplicity of use. The past years have seen major advancements in radar technology, which have brought the formerly military technology into the consumer space. Radars provide interesting prospects for home security and smart homes due to several inherent characteristics which give it an advantage over existing technologies. The resolution of an advanced radar sensor enables not only presence detection, but also provides advanced features for security, automation and well-being Advanced Security And Automation Features Of primary importance, a consumer designed radar sensor provides the user with full privacy, but the use of radar is also beneficial because it is indifferent to environmental, temperature and lighting conditions. In addition, radar signals (at certain frequencies) are capable of penetrating through almost any type of material, enabling concealed installation, robust monitoring in cluttered spaces and even the coverage of several separate rooms with only one device. In terms of capabilities, simple time of flight 2-antenna radar sensors, which have been around for a while, do not provide much additional value in comparison to existing solutions and are not necessarily competitive in terms of pricing. However, the new generation of radar sensors are also opening up new capabilities previously achieved with optics only. Today, the resolution of an advanced radar sensor is high enough to enable not only presence detection, but also to provide advanced features for security, automation and well-being, all in one. Imagine for example, that the security sensor installed in your elderly parent’s home could also detect a fall having occurred, monitor the breathing of a baby or even leaks in your wall. Due to the unique field of view that radar provides as well as the multi-functional potential, this technology will be the key to the awaited convergence of smart home functionalities and minimization of home devices. The security sensor installed in your elderly parent’s home could also detect a fall having occurred Secret Of The Consumer Radar A radar sensor’s accuracy and its ability to support wide functionality and applications is determined initially by its resolution, which is based on two key factors: bandwidth and number of channels. The wider the bandwidth and the more channels the radar supports, the more accurate the data received. Imagine the difference between a 1990s television model and a 4K 2018 television model - As the resolution is ever improving, the sharper and more detailed is the image. When looking at the short-range radar sensor market, prominent companies such as Texas Instruments and NXP are offering radar-on-chip solutions supporting 2\3 transmitters (Tx) and 3\4 receivers (Rx), mainly utilizing frequency bands of 77-81GHz, as they target mostly automotive and autonomous driving applications. Another company that develops such radar-on-chip solution is Vayyar Imaging, an Israeli start-up, founded in 2011, that developed a radar sensor for 3D imaging. Vayyar Imaging directly targets the smart home and security markets with its radar-on-chip, developing modules and products for intruder detection, automation and elderly care (fall detection). Providing not only chips, but complete systems, the new model makes radar technology highly available and accessible. The radar-on-chip technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue Radar-On-Chip Solution The radar-on-chip solution supports 72 full transceivers, an integrated DSP and radar bands between 3-81GHz. The resolution provided by this type of specification is high enough to provide subtle information about people’s real time location posture (lying down\falling\sitting\walking), and breathing, and enables to classify pets from humans, but it is low enough as to not compromise privacy. This type of technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue, such as in bathrooms or heavily lit environments. Moreover, utilization of this technology allows to dramatically minimise the numbers of sensors installed in the home, as it provides full home coverage with just one or two sensors and enables using the same HW to support additional capabilities such as breath monitoring, fall detection and highly accurate automation. Using AI and machine learning, the data derived by these sensors can be leveraged to provide smarter, verified alerts on the one hand and whole new insights on the on the other. The sensor can be tuned to learn the location of the house entrances or boundaries, where the inhabitants are expected to be at night, or where they should be expected to enter from into the home, adding new logics to the traditional yes\no decision making. Home security is widely regarded as a necessity, provides peace of mind to people and is integral to people's day to day lives Additional Smart Home Services Among the evolving home technology verticals, security is by far the most relevant and integral to people’s day to day lives. Home security is widely regarded as a necessity and provides peace of mind to people. Being a legacy industry with many well-known and well-trusted brands, security players are well positioned to introduce new technology into the home and have the ability and credibility to expand their offerings to additional smart home services by utilizing existing infrastructure and channels. With technology giants entering the security arena through the smart home door the DIY security solution market expected to explode with a CAGR of 22.4% (according to a report by Persistence Market Research). Now that new pricing and service models offer minimal commitment, traditional security players will need to step up. Security companies will need to explore new technologies and expand their offering if they intend to stay relevant and competitive in a market trending on functionality converge and minimization of maintenance and installation costs.

Are Your Surveillance Monitors Prepared For The Latest Video Technology Developments?
Are Your Surveillance Monitors Prepared For The Latest Video Technology Developments?

Everybody has been hooked on the discussions about Analog HD or IP systems, but shouldn’t we really be thinking about WiFi and 5G connectivity, removing the need for expensive cabling? Are wireless networks secure enough? What is the potential range? Even the basic question about whether or not the network is capable of transferring the huge (and growing) amount of data required for High Res Video, which will soon be quadrupled with the advent of 4K and higher resolutions. The Future Of Video Surveillance Monitors We have seen a massive uptake in 4K monitors in the security industry. While they have been relatively common in the consumer market, they are only now beginning to really take off in the CCTV market, and the advances in Analog HD and IP technology mean that 4K is no longer the limited application technology it was just a few years ago. Relatively easy and inexpensive access to huge amounts of storage space, either on physical storage servers or in the cloud, both of which have their own positives and negatives, have really helped with the adoption of 4K. Having said that the consensus seems to be, at least where displays are concerned, there is very little need for any higher resolution. So, where next for monitors in CCTV? 8K monitors are present, but are currently prohibitively expensive, and content is in short supply (although the Japanese want to broadcast the Tokyo Olympics in 8K in 2020). Do we really need 8K and higher displays in the security industry? In my own opinion, not for anything smaller than 100-150+ inches, as the pictures displayed on a 4K resolution monitor are photo realistic without pixilation on anything I’ve seen in that range of sizes. The consensus seems to be, at least where displays are concerned, there is very little need for any higher resolution Yes, users many want ultra-high resolution video recording in order to capture every minute detail, but I feel there is absolutely no practical application for anything more than 4K displays below around 120”, just as I feel there is no practical application for 4K resolution below 24”. The higher resolution camera images can be zoomed in and viewed perfectly well on FHD and 4K monitors. That means there has to be development in other areas. Developments In WiFi And 5G What we have started to see entering the market are Analog HD and IP RJ45 native input monitors. While you would be forgiven for thinking they are very similar, there are in fact some huge differences. The IP monitors are essentially like All-In-One Android based computers, capable of running various versions of popular VMS software and some with the option to save to onboard memory or external drives and memory cards. These are becoming very popular with new smaller (8-16 camera) IP installs as they basically remove the need for an NVR or dedicated storage server. Developments in the area of WiFi and 5G connectivity are showing great promise of being capable of transferring the amount of data generated meaning the next step in this market would maybe be to incorporate wireless connectivity in the IP monitor and camera setup. This brings its own issues with data security and network reliability, but for small retail or commercial systems where the data isn’t sensitive it represents a very viable option, doing away with both expensive installation of cabling and the need for an NVR. Larger systems would in all likelihood be unable to cope with the sheer amount of data required to be transmitted over the network, and the limited range of current wireless technologies would be incompatible with the scale of such installs, so hard wiring will still be the best option for these for the foreseeable future. There will be a decline in the physical display market as more development goes into Augmented and Virtual Reality Analog HD Options Analog HD options have come a long way in a quite short time, with the latest developments able to support over 4MP (2K resolution), and 4K almost here. This has meant that for older legacy installations the systems can be upgraded with newer AHD/TVI/CVI cameras and monitors while using existing cabling. The main benefit of the monitors with native AHD/TVI/CVI loopthrough connections is their ability to work as a spot monitor a long distance from the DVR/NVR. While co-axial systems seem to be gradually reducing in number there will still be older systems in place that want to take advantage of the benefits of co-axial technology, including network security and transmission range. Analog technologies will eventually become obsolete, but there is still much to recommend them for the next few years. Analogue technologies will eventually become obsolete, but there is still much to recommend them for the next few years Another more niche development is the D2IP monitor, which instead of having IP input has HDMI input and IP output, sending all activity on the screen to the NVR. This is mainly a defense against corporate espionage, fraud and other sensitive actions. While this has limited application those who do need it find it a very useful technology, but it’s very unlikely to become mainstream in the near future. Augmented Reality And Virtual Reality Does the monitor industry as a whole have a future? In the longer term (decades rather than years) there will definitely be a decline in the physical display market as more and more development goes into AR (Augmented Reality or Mixed Reality depending on who’s definition you want to take) and VR (Virtual Reality). Currently AR is limited to devices such as smartphones (think Pokémon Go) and eyewear, such as the ill-fated Google Glass, but in the future, I think we’ll all have optical implants (who doesn’t want to be The Terminator or RoboCop?), allowing us to see whatever we decide we want to as an overlay on the world around us, like a high-tech HUD (Heads Up Display). VR on the other hand is fully immersive, and for playback or monitoring of camera feeds would provide a great solution, but lacks the ability to be truly useful in the outside world the way that AR could be. Something not directly related to the monitor industry, but which has a huge effect on the entire security industry is also the one thing I feel a lot of us have been oblivious to is the introduction of quantum computers, which we really need to get our heads around in the medium to long term. Most current encryption technology will be rendered useless overnight when quantum computers become more widespread. So, where does that leave us? Who will be the most vulnerable? What can we do now to mitigate the potential upheaval? All I can say for sure is that smarter people than me need to be working on that, alongside the development of the quantum computer itself. Newer methods of encryption are going to be needed to deal with the massive jump in processing power that comes with quantum. I’m not saying it will happen this year, but it is definitely on the way and something to be planned for.

Networking Basics For Security Professionals:  Transmission Limitations
Networking Basics For Security Professionals: Transmission Limitations

The advent of IP security cameras has resulted in the need to maintain existing coax cable for networking applications Transmission of video and PoE power for IP security cameras over infrastructures can be confusing. Network infrastructures are designed using twisted pair cabling that we refer to as CAT (short for Category) cable, also referred to as UTP (Unshielded Twisted Pair). Security systems, coming from an analog environment, have historically transmitted over coax cable, and with the use adaptors can transmit over CAT cabling, which can be further broken down into single pair twist and untwisted applications. Cabling shares one, often misunderstood commonality. Any physical medium has a form of resistance to any element carried on that cable. With regard to network transmission over CAT 5 and greater (5e, 6, 7), there is a distance limitation of 328 feet or 100 meters. The applicable standards state that the bandwidth applied at one end of the cable at 10/100/1000 (1G)Mbps will be realized at the other end. This is also where we find the first limitation. At this same 328-foot distance there is a loss of PoE power. 802.3af or 15.4 watts is a value realized only at the PoE source. Under the standard, after traveling through 328 feet, the power at the camera is 12.95 watts. The same is true for 802.3at which has a source power of 30 watts and 328-foot distance power of 25 watts. The advent of IP security cameras has resulted in the need to maintain existing coax cable for networking applications. The first thing to realize is there are no standards for network transmission over coax. In reality the characteristics governing coax can be considered the opposite of CAT twisted pair cable. CAT cabling for network transmission consists of 4 wire pair, 2 of which are used for signal and PoE transmission. This ability to separate PoE and bandwidth transmitting over two pairs maximises power transmission. Coax cable, when used in the same application, is limited to a single pair – center conductor and shield. Its characteristics promote bandwidth but limit PoE transmission compared to UTP cable. I emphasize again, there are no standards for coax cable transmission. This process becomes more confusing when you realize there are various type of cables that are called either UTP or Coax. All of these cable have different characteristics that have a direct impact on their ability to transmit bandwidth and PoE. The standards for UTP transmission were set for CAT 5 (5e). Categories 6, 7 and above will tend to have lower cable resistance and longer transmission distance; CAT 3, higher resistance and shorter distance. Common types of coax cable have varying distance limitations The same applies to coax cable. Again there is no standard, the typical cable found in analog security applications is RG-59. In general, application distance limitations ran between 750 to 1000 feet, greater than the 328 network limitation. This is why extenders are required to convert from coax to UTP and to extend the signal and power range. As with UTP cable, there are two similarities. First, there are different grades of coax; second, there are different types. All these differences generally apply to cable resistance and therefore distance performance.  The most common types of coax cable are: RG 59, RG 6 and RG 11 Why is this important? In general there are two reasons. The first is in specifying equipment for a video security system, you are generally dealing with existing wiring and a fixed performance requirement. It is important to know the type and condition of the wiring in order to know what system performance requirements can be met. Second is a function of understanding specifications for the transmission equipment that will be used in the infrastructure. As noted, when maintaining coax, the use of coax-to-Ethernet convertors/extenders is required. In many cases even when UTP is used, distances over the 328-foot limit are required. A manufacturer’s product specification sheet can truthfully state their products can perform at 100 Mbps, they can handle 802.3at 30 watts and they can transmit distances up to 6,000 feet. However these must be viewed as separate performance claims. The key word is separate. Notice in these statements there is nothing that ties 100Mbps and/or 30 watts (these are examples only) and claimed distance of 6,000 feet together. Neither is the type of cable used indicated. By themselves, each individual claim is truthful; however, applications require they work together, and this is usually not the case. Many times it is difficult to read between the lines of manufacturer’s specifications. Failure to do so can cost additional time, money and even lead to removing the infrastructure itself. There is a simple answer. Call the manufacturer and have them confirm that their solution will perform as required for your specific application. If necessary, ask for proof that they have conducted testing to support their performance claims. Infrastructure is confusing, and you don’t need to be an expert, you just need to ask the right person(s) the right questions.

Latest Honeywell news

Security Experts Discuss Security System Lifecycle Considerations, Effectiveness And Cost Control
Security Experts Discuss Security System Lifecycle Considerations, Effectiveness And Cost Control

A substantial focus of the security industry is on the selection and installation of security systems, and there is no doubt that this is a critical element of the process. However, in order to ensure that security systems such as access control, video surveillance, intrusion detection and panic alarms deliver on ‘game day’, an equal if not greater emphasis has to be put on the actions that are taken after the installers have closed the doors on the truck and driven away. This article covers some important issues that were covered at the 2019 International Association of Professional Security Consultants (IAPSC) annual conference in Miami, Florida, where Frank Pisciotta, CSC, Business Protection Specialists, Inc. and Michael Silva, CPP, Silva Consultants, facilitated a discussion among security professionals on the topic. Backwards compatibility in access control solutions David Barnard of RS2 security highlighted the importance of backwards compatibility in access control solutions David Barnard of RS2 Technologies LLC highlighted the importance of backwards compatibility in access control software solutions. Reputable manufacturers are constantly evolving software products and it is critical that software continues to work with all installed hardware or owners will find themselves purchasing equipment a second time, which is never good news. An example, a case study with a client where the video management software upgrades were not backwards compatible through the mobile app and a small manufacturing site was looking at a US$ 75,000 price tag to upgrade cameras to make them compatible with the ‘updated software’. Risks of failures in door hardware products Jim Primovic from ASSA ABLOY cautioned about the risks of failures in door hardware products resulting in a failure to attention to detail in the selection and, in particular, the installation process. He explained the importance of using certified installers to avoid operation problems. In light of constantly evolving software revisions, how often does one see any additional training provided to end users when software updates are released? Charles Johnson of Open Options raised this important point and it is an excellent one. As organizations think about structuring maintenance agreements, it might be wise to consider ongoing training to cover software updates and ensure that end users can continue to optimize the features and benefits of software revisions. Software Support Kim Kornmaier of Honeywell mentioned another element of security system lifecycle consideration, which is ‘Software Support’. Maintenance agreements are available and will likely be offered from every installer and come in a variety of flavors. However, care needs to be exercised to ensure that whatever services and support are included, in the scope of a maintenance agreement, have a clear correlation between service and software upgrades versus the fee charged. Software upgrades and system testing Maintenance agreements should be avoided that simply guarantee the free replacement of parts (which may or may not ever get used, even after you pay for it). Services that should be considered include software upgrades, system testing and replacement of consumable parts, like back up batteries. Another key issue ties directly to periodically measuring and ensuring the risk reduction results of security systems, for example, with an access control system, there are several actions recommended for system owners, including: Conduct periodic door and alarm testing - This presumes users have installed all of the necessary parts to enable alarm monitoring). These tests should include the mechanical testing of doors and confirming door-held-open-too-long and forced-door alarms are properly reporting to the alarm client. Importance of harnessing door alarming capacity Excessive door alarms are an indication of either a user or system problem Excessive door alarms are an indication of either a user or system problem or all alarms should be investigated to determine root cause and corrective action needed. Organizations who fail to harness door alarming capability are giving away up to 50 percent of the system's potential benefit. Ensuring the integrity of the access control database is of prime importance. The failure to manage this can lead to unauthorized access and serious security incidents. This can be achieved in a variety of ways, but in the majority of risk assessments they have conducted over the years, it is common to find separated employees and contractor records with active credentials in the database. Ways to mitigate this risk include: Integrating your access control database with active directory (works for employees, not so well for contractors); Utilizing expiration dates on contractor credentials; Periodically manually auditing contractor and employee active badge reports for anomalies, which may indicate process weaknesses in the change management process; Utilizing the ‘use it or lose it’ feature in many software programs that automatically disable a credential after a set period of non-use (e.g., 90 days); and Establishing processes to limit the removal of certain badges from the site (e.g., those issued to contractors or temporary employees). ‘First Card Unlock’ feature Irregular schedules, holidays and natural disasters can result in access vulnerability. For instance, if access-controlled doors at a site are programmed to open on a timer and something prevents persons from arriving at work (e.g., snowstorm), a site may be left exposed. A mitigation technique against this type of risk would be to employ a concept called ‘First Card Unlock’. Under this feature, a lobby entrance to an office, for instance, would not enter into an unlocked state, until the first authorized employee presented a card and entered the workplace. Changing holiday programming in security systems Holiday programming in some systems needs to be changed on an annual basis Holiday programming in some systems needs to be changed on an annual basis. Managing holidays in an access control system results in doors staying secure which would otherwise be unlocked on a normal business day. Similarly, intrusion detection, duress devices and video surveillance systems can let users down without the proper care and feeding. Examples would include: A panic device fails to communicate an emergency situation because it was not properly reset or the wiring has been damaged due to poor installation. Panic devices should be regularly tested and ideally the activation during testing should be by a person who would be required to use the device in an actual incident. The objective here is to build competency in the persons who may need to activate a device discretely. Similarly, intrusion detection systems should be carefully tested to ensure that all devices are properly reporting to the panel and that the panel is communicating properly to the central station. If there are redundant communications channels, each should be verified. In the same way someone would conduct audits of active credentials in an access control system, it is strongly recommended that users perform a similar review with PIN codes, which have been assigned and would allow for an unauthorized person to disarm a system. Utilizing the failure-to-close feature to ensure that through collusion or negligence, if the last person out of a restricted area fails to arm the panel, the central station will notify a responsible party about the omission. Further, reviewing opening and closing reports might well detect inappropriate entries by authorized personnel which are indicative of suspicious or illegal activity. These features and reports will likely be at an additional cost, but they are important insurance to protect against insider threat. It is not uncommon to hear about an incident happening and during the investigation, the owner of the system discovers that the needed camera was not recording. Where video is not under routine observation, it is recommended to determine if your video management system can send an alarm in the event of video loss. This would allow for rapid remediation before the video loss is discovered in the course of an investigation. Avoiding degraded video quality over time In almost every case, degraded video quality is directly related to resource saturation With respect to video surveillance, as systems grow and evolve over the life of the system, organizations may experience degradation. Darren Giacomini of BCDVideo has studied this issue extensively and concludes that in many cases, installers or others are simply putting too many devices on a VLAN, which results in latency and other conflicts. Degraded video quality has a finite number of potential root causes. In almost every case, degraded video quality is directly related to resource saturation. The resources on a surveillance network consist of IP cameras, network switches, network uplinks, viewing stations, database management and archives. Resource depletions According to Giacomini, each of the resource shares a common thread. And, at the basic level, each of those items is nothing more than a purpose-built computer with limited CPU, memory and network capacity. When any of these resources exceed their capacity, the quality of service delivered will degrade. The following are common resource depletions that can degrade video quality and require a much deeper dive, but are included here as a starting point: IP camera CPU utilization is in excess of 85 percent; CPU elevation in the decoder or workstation decoding the video; and Network congestion or CPU elevation in the network switch. Maintaining the integrity of archived video data Giacomini indicated that the majority of the time degraded video is associated with resource depletion Giacomini indicated that the majority of the time degraded video is associated with resource depletion in one of these key components. Investigation of the potential causes can save time and effort, and prevent a video management software application from unduly being blamed for poor performance during its lifecycle. Also, on the topic of video, John Kampfhenkel, Director of Technical Sales at Veracity discussed the challenges that organizations face when video management system storage is undersized and the need to carefully plan for video retention of existing recorded data when the video system has to be expanded. This can be a problem organizations face and when they do, it is best to involve a video storage expert to determine options, costs and potential legal requirements for maintaining the integrity of archived video data. Selecting the right security technology Dependent on the level and type of integration between various systems, another challenge may be to preserve the integration between the two systems. System owners will need to coordinate carefully with installer(s) to ensure that a software revision to one system will not result in a disruption to a software level integration. This type of integration may require a delay in being able to upgrade one or the other application software versions until the integration can again be certified. Selecting the right security technology is an important element of an organization's security risk management. However, experts would argue that in terms of getting measurable results from technology, there needs to be a keen focus on sustaining activities after the installer closes the doors and drives away. By adhering to the consultant and manufacturers' guidance in this article, organizations can substantially reduce the risk to people, assets and information, and prevent criminal and terrorist incidents in the workplace.

Connected Technologies And Digital Watchdog Unveil New Software Integrations To Help Dealers And Customers
Connected Technologies And Digital Watchdog Unveil New Software Integrations To Help Dealers And Customers

Connected Technologies LLC, provider of a powerful cloud-hosted security management platform and Digital Watchdog (DW™), the provider of digital recorders, surveillance cameras and video management software have unveiled new integrations between DW Spectrum and Connect ONE that provide deeper reporting and management controls for dealers and their customers. Connect ONE and DW Spectrum integrate natively through software to receive or trigger notifications or events without system configuration such as opening a vulnerable in-bound port on the end-user’s network, port forwarding or connecting to the user’s IP address. Output control and lockdown With the expanded integration, dealers can add new feature sets, events and notifications gathered from DW Spectrum’s VMS, NVR or surveillance cameras for viewing and control on the Connect ONE, all-in-one interface. “Connect ONE is focused on expanding the possibilities for integrated systems for our dealer-customers,” said Dan Simon, Co-Founder and Managing Partner, Connected Technologies. “This integration gives dealers the ability to provide more value in their managed services offerings through Connect ONE,” he said. Connect ONE’s users can receive events to monitor the health status of the NVR or perform special logging of activities or analytics. All Connect ONE Event Rules can be activated in response to NVR events such as report logging, notifications to users and system control – including arming, disarming, output control and lockdown. Connect ONE pushed system events such as arming, alarm, access, trouble and audit changes to the NVR are supported. Providing complete solutions ConnectOne’s ability to simplify integration with a variety of technology presents an opportunity for DW Dealers" Events are shown on the DW Spectrum interface to indicate the source and type of event along with a text description, such as user, zone, door, area, etc. Events received by the NVR can also record video bookmarks, trigger a camera preset and increase recording quality. “We are excited to see our technology partners take a deeper dive into DW Spectrum’s open architecture and all the functionality it offers,” said Patrick Kelly, Director of IP Video Solutions, DW. “ConnectOne’s ability to simplify integration with a wide variety of technology really presents an opportunity for DW Dealers to provide complete solutions.” DW Spectrum and Connect ONE integrate via direct network connection or DW Cloud. Integrated security management solution Following set up, users can retrieve a camera list for quick and easy configuration, view live video, search playback recordings, record snapshots upon an event from intrusion/access system for video verification and review a 10-second pre-event and up to a 45-second post event video clip. DW Spectrum is a powerful and user-friendly IP Video Management software, highly optimized to provide unlimited scalability, unmatched bandwidth savings and simplified system setup and management. Connect ONE by Connected Technologies is a cloud-hosted integrated security management solution which provides a single user interface to control intrusion, access control, video surveillance, critical environmental monitoring and energy management. Connect ONE works with the Bosch B and G series as well as DMP XR/XT series, ELK M1 series and Honeywell Vista Turbo security and access control panels.

The Role Of Building Systems To Ensure Safety As Employees Return To Work
The Role Of Building Systems To Ensure Safety As Employees Return To Work

Returning to work after the global pandemic will not be business as usual, and security systems are an important asset when it comes to helping to keep occupants and buildings safe. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. These foot-traffic patterns can inform settings for a variety of devices – like ventilation and temperature controls – and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. “While the ‘new normal’ is still being defined, we believe there will be a greater focus on creating healthier environments while also complying with new regulations,” says Marcus Logan, Global Offering Leader, Honeywell Commercial Security. “Temperature, humidity, energy efficiency, security, safety, comfort, productivity, and demonstrating compliance with regulations are all a part of a healthy building.” For example, social distancing is a new concept for the workplace. How do you make that happen in an open work setting, in breakrooms, elevator lobbies and meeting spaces? Optimized systems create healthier environments Anxious employees will need reassurance about returning to the workplace Building owners will need to look at how they can optimize their systems – or deploy new ones – to create a healthier environment. Building technologies, like those provided by Honeywell's Healthy Buildings solutions, provide building owners with more control over critical factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations, and a company's risk management policies. These solutions also provide transparency for occupants into a building's status, says Logan. Hygiene will be a critical issue: People will want to know that the spaces are ready for their return. Increased cleaning procedures and schedules will evolve, and a way will be needed to demonstrate the procedures are effective and that they have been strictly adhered to. Identifying ways to measure effectiveness of sanitisation and track compliance to the procedures will be a key challenge to solve. This is a space that will evolve significantly in the coming months and years, says Logan. Access control and video analytics Contact tracing is a new requirement in some businesses, and security technology – like access control and video analytics with advanced reporting – can help. Access control technology integrated with video analytics can be used to trace occupant movements within a facility. These technologies capture data that can be used with advanced reporting to provide a digital footprint of where a person has been within a facility and if they may have been exposed to someone identified as being infected with a contagious virus. Building owners can then proactively notify exposed individuals evolve to self-quarantine and minimize further spread of an infection. Video analytics can help to predict where and when occupants encounter each other Anxious employees will need reassurance about returning to the workplace. They will not only seek confidence that the building is optimized for a healthier environment but also that processes are in place to quickly identify and respond to potential issues. Transparency and visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace. “One way to do this is to share building analytics with occupants – to help them understand factors about the indoor air quality or occupancy density,” says Logan. Controlled health, safety and security Honeywell’s solutions provide building owners with more control over critical health, safety and security factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations and a company’s risk management policies, Logan adds. Visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace Every day there is new information coming from the medical and scientific community about COVID-19, and the building industry is just starting to learn what it all means. Logan warns that there is no single solution that will keep every environment healthy and safe. A good strategy features deploying a combination of solutions, optimising systems and being vigilant to make sure that companies are sustaining compliance to new and changing regulations, says Logan. “Today more than ever we must be mindful of the changing culture of how buildings are managed by making apparent the need to be mindful of health and well-being in all aspects of our lives,” says Logan. Honeywell has developed outcome-based solutions that allow building owners to transparently address building quality factors while supporting their business continuity needs in the uncertain environment. “We’re giving them the data they need to confidently reassure their employees to accelerate their business operations,” he adds.

Related white papers

Understanding Video Management Systems