Airports & ports security applications
Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is a challenge. This challenge extends to the control of access to cupboards, drawers, and cabinets where travel documents are stored — in the spotlight after new EU guidance on logging access to these documents. Previously, security for cabinets in Helsinki’s check-in area required airport managers to issue...
Challenge Managing access into and around Helsinki Airport. Managing access into and around Helsinki Airport is a complex task. Around 15,000 people work there and daily pre-pandemic passenger numbers hovered around 60,000 to 70,000. Clearly, only authorised people should have access to many areas at an airport. The management of movement — by passengers, staff and contractors — is critical to Finavia’s mission to deliver an efficient service. They sought new access solutions...
Murtala Muhammed Airport Terminal Two (MMA2) is Nigeria’s preeminent air terminal. In 10 years of operation, it has achieved its objective of becoming a world-class airport operator, setting new standards for the African aviation industry. As the country’s first and only privately-funded terminal, its unique structure, ultra-modern facility, world class terminals, customer service, safety, and security are celebrated in the industry. Three thousand passengers move through the termin...
Being isolated on the edge of wilderness means there’s a need for a video system that’s both reliable and flexible. For that reason, the team at Jackson Hole Airport (JAC) since 2009 has relied on video management software (VMS) from Milestone Systems to enhance security, safety, and efficiency. Challenge - Help to keep scaling At the edge of the frontier, Jackson Hole Airport has experienced considerable growth over the years. Significant capital investments in expansions have ma...
Consorzio Centro TIR Como Docks is a customs and logistics area that extends 150,000 m2 near the capital of Lake Como in Italy. Dubbed as the "Gate of Europe" by transport operators for its strategic location, it can accommodate up to 250 heavy vehicles at the same time, with a monthly transit estimated between 12,000 and 18,000 vehicles. "We are the last outpost before Switzerland for hauliers who have to carry out customs clearance operations directed towards Northern Europe," says Fabio Bert...
In an increasingly cosmopolitan world, time and security have become essential tiebreakers in determining passenger satisfaction at airports. Great airport management speeds up the processes and improves the quality of service. The customer Suvarnabhumi Airport (BKK) is the main travel hub of Thailand that is mostly used for long-haul and full-service flights to Bangkok. If users are looking for a flight to Thailand from Europe, the USA, or any other distant destination, in most cases their...
News
ODSecurity is thrilled to announce the successful installation of two Soter RS X-ray body scanners at the Cayman Islands Airport for the Customs and Border Control Service. These advanced scanners, developed by ODSecurity, are designed to detect contraband inside and outside the body using a very low X-ray dose, enhancing the airport's security measures. Effective and efficient installation The Customs and Border Control Service has expressed their satisfaction with the performance of ODSecurity and its involved partners, Installation Technology International (ITI) and AVCOM. The collaborative effort ensured the scanners were installed efficiently and effectively. ODSecurity thanks the Cayman Islands Customs and Border Control Service for their trust and everyone who contributed to this successful project. Together, they are making the world a safer place.
More than one million electric vehicles are registered in the U.S.—and they all have to plug in somewhere. As EV charging stations pop up across the country, one of the chief questions will be how charging station users are identified, authenticated, and connected with membership or payment systems. Radio-frequency identification cards and tokens and smartphone authentication apps have emerged as two viable options for EV charging authentication. Which is best? It may depend on the user base they plan to serve. User authentication for EV charging Most electric vehicle owners have a spot to plug in while at home, either in their own garage or carport or in a designated charging spot in a tenant parking garage. But electric vehicles also need spots to charge while owners are out and about. The EV charging market is broadly divided into two tiers: Level 2 charging stations, which operate at 208-240 V and use AC power. These stations will add 20-25 miles of range in about an hour of charging. The U.S. Department of Transportation listed more than 22,800 public Level 2 EV charging stations across the nation as of mid-2020. They are commonly found in public parking lots and garages, hotels, grocery stores, malls, and other commercial areas. They may also be installed in private parking garages and business parking lots for use by tenants, employees or fleet drivers. Collecting membership data Direct Current Fast Chargers (DCFS) are designed to charge an EV battery to about 80% in 20-30 minutes. There are currently about 15,000 DCFC stations across the U.S., but their numbers are expected to explode as more people start taking EVs on longer road trips. They are commonly found along major interstate highways. As the market evolves, user authentication requirements for EV charging stations are likely to vary by type, location, and user base. Some commercial locations may provide Level 2 EV charging as a free amenity to shoppers, guests or employees. If there is no charge for the service, there may be no need to authenticate users at all— people can simply park and plug at any available spot. However, there may be a benefit to collecting membership data (e.g., shopper reward club). Private charging stations Public, for-profit EV charging stations, like gas stations, need a method to collect payment for their services. In some cases (especially at roadside DCFS stations), users may simply pay for the minutes used with a credit card—just like at the gas station pump. However, many EV charging station users are already accustomed to identifying themselves with an RFID membership card or a smartphone app. Charging networks like ChargePoint and Blink enable members to access any EV charging station within their networks with a card or smartphone app, which connects to their membership, account, and payment information. Private charging stations—such as those offered to tenants, employees or fleet drivers—may not require payment but need to ensure that only authorised drivers are accessing power and taking up valuable parking spots. An RFID card or smartphone app can be used to identify authorised drivers and track charging behaviours. Moving forward, many EV charging stations may find that they need a mix of options for users, including membership cards, smartphone apps, and a credit card payment option for out-of-network drivers. Choosing between RFID and smartphone apps In the long run, the answer may be ‘both.’ RFID cards are economical and easy to issue When user identification and authentication are desirable, which is the better option: RFID cards or smartphone authentication? Both have their uses in the EV charging market. In the long run, the answer may be ‘both.’ RFID cards are economical and easy to issue. And for some users bases, they may not have to issue a new card at all—they can take advantage of an RFID card they already carry. In many cases, it is possible to leverage existing employee IDs and membership cards for access to privately controlled EV charging stations. RFID membership cards may be a good bet for: Fleet drivers who already carry an RFID card for vehicle access. Employee parking lots and garages where people already use a card for entry. EV charging parking spots at gyms or other locations where users want to limit charging access to active members. EV charging stations Most consumers would prefer not to have to carry a physical membership card for every retail outlet On the other hand, public charging stations may find that consumers would prefer to use a smartphone app rather than receive another membership card to carry in a physical wallet. Many consumers prefer to carry only their phone and one or two essential cards (such as a driver’s licence and a single credit or debit card). As more retailers enable consumers to pay via a digital wallet app on their smartphones, some don’t even carry a physical credit card anymore. Most consumers would prefer not to have to carry a physical membership card for every retail outlet they visit—and that includes EV charging stations. Smartphone apps for user authentication are simple to set up and highly secure. Instead of RFID, they typically use either Bluetooth® Low Energy (BLE) or Near-field Communication (NFC) protocols. Public charging stations For the user, the experience is almost identical to RFID authentication, except they wave a smartphone over the reader instead of a card. Apps have other user benefits, too. A custom app for EV charging can be configured to help users locate or reserve charging stations, check their balance and usage history, and change their payment options right on their phone. These features make smartphone authentication ideal for consumers These features make smartphone authentication ideal for consumers accessing a network of public charging stations. However, EV charging network managers should keep in mind that some users may still want a physical membership card. Smartphone-based authentication There are still some user populations, such as older consumers and those from lower income brackets, where smartphone ownership is not ubiquitous. If users are primarily using EV charging for a fleet vehicle, they may not want to download an application for work on their personal cell phone. Other users may find smartphone apps confusing or simply prefer to have a card for other reasons. The answer for both public EV charging networks and private charging station owners is to have an RFID reader that is capable of both card-based and smartphone-based authentication. This will provide maximum flexibility as user preferences change. Finding the right RFID reader for EV charging The ELATEC TWN4 MultiTech family of readers is ideal for authentication at EV charging stations The best RFID reader for EV charging is one that is flexible enough to meet the needs of all user populations and evolve as requirements change. The ELATEC TWN4 MultiTech family of readers is ideal for authentication at EV charging stations. The readers support 60+ RFID transponder technologies along with BLE and NFC smartphone authentication. This means that one reader can support all common technologies already in use across the entire user base—both nationally and internationally. This capability becomes important for applications where users want to enable drivers to use an existing RFID card (such as their employee or fleet ID card or an access card for a tenant parking garage) for access to charging locations. It also provides more flexibility as technologies or preferences change in the future. Supporting advanced encryption TWN4 MultiTech supports advanced encryption and security configurations for highly secure transactions between the card or smartphone and the reader. This is important for EV charging applications tied to payment or employee/driver identification. ELATEC readers are mobile-ready. The ELATEC Mobile Badge BLE NFC App offers simple and effective components for building or extending a mobile application for EV charging networks. Non-managed mobile credentialing using the ELATEC app is free. TWN4 MultiTech readers also work with multiple existing third-party managed credential systems, such as KleverKey, Safetrust, and Transact. The TWN4 MultiTech is easy to customise with the powerful Software Development Kit (DevPack) and App Blaster and Director utilities. Readers can be easily configured to support custom functionality (such as LED light flashing sequences or sounds for user feedback) and integration with backend software for easier member management. The DevPack tools make the TWN4 family the most powerful, versatile, and sustainable readers on the market. Hardware communication interfaces As electric vehicles move from niche to mainstream, EV charging infrastructure will need to grow and evolve to accommodate millions more drivers—both in the consumer market and in commercial fleets. With TWN4 MultiTech, EV charging station managers will be ready. Interested in learning more about technical considerations for RFID? Download 11 Considerations for Embedded System RFID Readers for additional advice, including operating power and consumption requirements, antenna placement, hardware communication interfaces, and more.
One of the main strengths of the Marina di Varazze tourist port is its privileged position with respect to the cities of Northern Italy and Central Europe. Marina di Varazze is open and active all year round and is a sought-after leisure destination for those wishing to spend their free time in an attractive, elegant environment. The stretch of water inside the port has 800 large berths for boats up to 35 meters in length, where owners benefit from the marina’s professional service. The complex also has prestigious apartments, all with a sea view, and 900 parking spaces serving the entire structure with charging columns for electric cars. The presence of luxury goods such as boats and prestigious cars, in addition to the high flow of people, requires a superior level of safety and security. Next-generation needs Marina di Varazze needed to replace a completely analogue video surveillance system that no longer met its needs. The security team, therefore, decided to invest in a new generation system to improve the quality of the recordings and give operators the ability to view footage remotely. The aim of the upgrade was to improve the safety of the personnel assigned to the structure The aim of the upgrade was to improve the safety of the personnel assigned to the structure, of the shipowners, and of the commercial premises located on the promenade of the port itself. Furthermore, there was the need to have the option of providing clear and effective documentation to the police in the event of a specific request/investigation. The video surveillance system had to be able to protect the 232,000 square metres of port, of which 144,000 square metres is water, as well as shops, restaurants, bars, car parks, public areas, and luxury apartments within the marina. The trusted choice The Marina security team had previously worked on a successful installation with XiX by Paolo Laterza, and had built a trusting relationship as a result. So they once again turned to XiX by Paolo Laterza to install the first phase of cameras, the fibre-optic infrastructure, and all active equipment, switches, servers, and clients. XiX by Paolo Laterza advised Marina di Varazze to continue investing in Wisenet Q and Wisenet X cameras, given the full range of video surveillance products and solutions available, and the possibility of centralising the system thanks to the VMS Wisenet WAVE. The first phase involved the installation of IP cameras, in particular 33 bullet cameras and four-speed domes. After completing this first phase, and with the changing needs of the marina, additional cameras were added, bringing the total to 67. Video management platform Operators can easily find the most appropriate footage and images relating to an event Marina di Varazze invested in Wisenet WAVE, Hanwha Techwin's VMS, to consolidate video feeds from both Wisenet cameras and legacy devices still in use. There is a control room on site to protect and monitor the marina 24/7, and thanks to Wisenet WAVE, operators can quickly access the footage to investigate events and people of interest. In addition, operators can easily find the most appropriate footage and images relating to an event and export this data to be delivered, if necessary, to the police. The Wisenet WAVE user interface is simple and intuitive to use, which means security personnel can quickly learn to use Hanwha Techwin's VMS. A powerful server-client system allows management both locally and remotely allowing the marina manager to view live and recorded videos remotely. Minimal visual impact The installed cameras have a minimal aesthetic impact, integrating with the architecture of the marina, designed by the Italian architects Roberto Gabetti, Aimaro Isola, and Pietro Venezia. The cameras are installed on customised AISI-316 stainless steel poles that recall the shapes of an anchor There are eight buildings that are inspired by early twentieth-century bathing establishments in Liguria, built from iroko wood and stone, with antiqued copper roofs. The cameras are installed on customised AISI-316 stainless steel poles that recall the shapes of an anchor, designed and manufactured by XiX by Paolo Laterza, using special brackets cut to size by laser, and are aesthetically discreet. Immediate safety improvements The new video surveillance system improves the safety of guests, visitors, staff working in the marina, material assets, and business premises. It also provides clear and effective documentation for authorities in the event of a crime, such as unauthorised access to docks and boats. The video surveillance system, thanks to the quality of the images provided by the cameras, has already demonstrated its effectiveness in supporting the investigation activities of local law enforcement agencies as well as allowing the Maritime Authority to reconstruct, for insurance purposes, the dynamics of any events that have occurred in the water and/or on the docks.
With 400 helicopters deployed for different types of missions, 70 naval systems in use, as well as military and civil aircraft, air traffic control radar and space solutions, Leonardo confirms its commitment to Latin America by showcasing its latest-generation multi-domain capabilities and technologies at the FIDAE international exhibition in Chile. Leonardo will participate in the FIDAE exhibition in South America, which takes place in Santiago, Chile from 5 to 10 April. The company will display technologies and solutions developed to meet the needs of governments, institutions, armed forces and civil operators in the aeronautic, electronics, helicopter and space sectors. Leonardo presents advanced solutions in the fixed-wing field M-346FA aircraft is already delivered to the first international customer. In the fixed-wing field, Leonardo is presenting the Fighter Attack version of the M-346 and the M-345 Dual Role, which, in addition to being ideal and technologically advanced solutions for training future pilots, also perform a wide range of missions at a lower cost than frontline fighters. In particular, the new operational version of the M-346FA aircraft, already delivered to the first international customer, has all the characteristics of the trainer variant and, through the integration of latest generation equipment and sensors, also becomes an effective light attack aircraft. Leonardo underlining its role as a leader in the helicopter sector FIDAE will also showcase the C-27J Spartan multi-role transport aircraft, already selected by the Peruvian and Mexican Air Forces and used to support those countries’ citizens. Leonardo underlines its role as a leader in the helicopter sector with a complete range of platforms deployed in more than 150 countries worldwide to meet the most complex military and civil requirements. The AW119T helicopter (VFR and IFR) trainer is the only single-engine helicopter in the world fully certified to operate according to instrument flight rules, while the AW139Mmulti-role helicopter is capable of carrying out a wide variety of security and defence missions. Uncrewed solutions of Leonardo The modular avionics system ATOS is able to manage a wide spectrum of sensors on an aircraft In addition to fixed and rotary-wing aircraft, Leonardo will also be at FIDAE with its uncrewed solutions. These include the Falco EVO, which can conduct a wide spectrum of missions on land and at sea, thanks to its innovative sensors and complete solutions for intelligence and surveillance, alongside flexible mission systems. The modular avionics system ATOS (Airborne Tactical Observation and Surveillance) is able to manage a wide spectrum of sensors on an aircraft, combining in real-time the information received about the complete tactical situation, enhancing situational awareness to accelerate and optimise decision-making. Leonardo's contribution to the electronic warfare segment Among key technologies in the field of defence electronics, developed to provide high levels of security in complex environments, Leonardo is presenting the Long Range RAT-31 DL / M digital radar with AESA antenna – an effective mobile system that can detect fast-moving targets, such as ballistic missiles. Leonardo presents RAT-31 DL / M digital radar with AESA antenna – an effective mobile system. In the Electronic Warfare segment, the Electronic Support Measures (ESM) system SAGE is a device that analyses the electromagnetic spectrum across the land, sea and air domains to map the sources of active emissions. It uses highly accurate Direction Finding (DF) antennas to identify the positions of targets. Meanwhile, among the latest generation of protection for defence, transport and special mission aircraft, the BriteCloud countermeasure has been conceived by Leonardo to provide state-of-the-art protection against radar-guided missiles. Leonardo is established as one of the major global players Also being highlighted at the event are the company's solutions for air traffic control, designed to meet the most stringent international standards. More than 200 airports, 110 worldwide are equipped with Leonardo's radar, control centres, and ATC technologies. Leonardo brings air traffic control solutions, designed to meet the most stringent international standards.Technologies focused on multi-domain interoperability, specifically in the Cyber & Security field, will also be presented – an area where Leonardo is established as one of the major global players in the supply of complete and integrated solutions. Thanks to its range of products and solutions for physical and cybernetic security, Leonardo's technologies cover a wide spectrum of activities, from cyber security through to services for the secure digitalisation of processes, infrastructure, and applications. The technologies also span professional communications, advanced command and control centres, all the way up to technologies for the development of smart and sustainable cities. Education and training of cyber security Leonardo's commitment is to design the future using integrated platforms, such as X-2030, to ensure safety, protection, and efficient decision-making by fusing data from various sources and sensors to monitor areas of interest, such as archaeological sites or critical areas. Alongside these technologies, Leonardo has developed solutions for the education and training of cyber security operators in the defence and civil sectors so that they are fully equipped to respond to new cyber threats. In Latin America, the Telespazio joint venture (67% Leonardo, 33% Thales), offers satellite services in the fields of telecommunications, geoinformation and navigation, strengthened by the presence of space centres across the geography.
Bosch has equipped the new Chinese mega-airport Chengdu Tianfu International with video security, a PA and voice alarm system, and a conferencing solution, ensuring safety and security for passengers and airport staff as well as enhancing comfort and ease-of-use for travellers. Chengdu Tianfu International, in Sichuan province, serves China’s quickly booming ‘garden’ megacity, an emerging hub for commerce, culture, and finance – with the new airport pegged to be the third-busiest for airport traffic following Beijing and Shanghai. Customised audio and video The installation of the audio and video technology was customised for the unique architectural requirements of the airport complex, which opened this June, including two terminal buildings that reference the ancient Golden Sun Bird totem unearthed in 2001 from Chengdu City’s Jinsha Ruins. Due to the unique design of the terminal buildings, ‘standard’ security cameras were not appropriate for installation as the ceilings were far too high for traditional solutions. Placing regular cameras on this ceiling would drastically reduce the quality of their image feed and produce a poor viewing angle. Each panoramic camera can monitor a semi-circle area with a radius of 25 metres, a detection range of 25 metres in distance Flexidome panoramic cameras Instead, Bosch Flexidome panoramic cameras were integrated into the interior design of the building and were either installed on walls or concealed within information boards. Each panoramic camera can monitor a semi-circle area with a radius of 25 metres, a detection range of 25 metres in distance, and a 180-degree viewing angle. This allowed the airport to install far fewer cameras, cutting the total number down by 75% from 4,000 standard cameras for a typical project of this scale to 1,000 panoramic cameras – thus saving costs on the cameras as well as on wiring and installation. Uses single lens, 4K-resolution Dinion IP cameras Additionally, competitors’ panoramic cameras usually use four lenses, reducing the image quality. Bosch Flexidome cameras, however, use just one lens – improving brightness, colour, and clarity. The precision tracking capabilities and high-quality video stream of the cameras ultimately free up human resources for the airport and allow incidents or events to be followed without additional staff on the ground. In the flight area, the airport deployed four 4K-resolution Dinion IP cameras to monitor the runway. As this area of the airport is very long, stitching software is used to combine the images of these four cameras into one complete image, covering the entire runway and allowing Chengdu Tianfu to monitor the whole take-off and landing process. Seamless customer experience with superior acoustics The design team ran an acoustic simulation to ascertain how many loudspeakers were needed As the interiors of the terminal buildings feature many glass surfaces, which cause sound reflections, Chengdu Tianfu needed to determine how to deliver a high level of speech intelligibility with minimal distortion, no matter where the passengers were located. The design team ran acoustic simulation software to ascertain how many loudspeakers were needed for the terminal areas as well as the placement of the arrays. Bosch Praesideo system For flight announcements as well as voice alarm and evacuation more than 9,000 loudspeakers were installed, covering 700 broadcasting zones and integrated via a Bosch Praesideo system, assuring passengers can hear announcements in all parts of the terminal. Additionally, announcements can be broadcast with accuracy to passengers travelling through other areas of the airport complex, such as the adjoining hotel. Dicentis wireless conferencing system Bosch also provided the Dicentis Wireless Conferencing System for the adjoining supporting airport offices. Meanwhile, the Praesensa public address and voice alarm system deployed at the airport hotel is integrated with the rest of the site, so passengers staying at the hotel can be alerted to ongoing events in the airport. Due to these integrated sound and video systems, the airport can guarantee security and safety for passengers while also providing a seamless experience for customers and staff.
A time attendance system can help to keep a close eye on an employee’s working hours, prevent time theft by accurately tracking and recording employees’ time and attendance. A biometric time attendance system allows employees to clock in quickly and easier compare to the standard system and eliminate “buddy punching” in advance to the traditional time card system. A complete biometric time attendance system includes both hardware and software. Include the electronic divide that scans an employee’s fingerprint or iris and software that stores all the data about time and shifts. Hardware and software can be purchased separately, but it’s best to find a vendor that provides both of them as a complete package. Price of the biometric software Small companies can purchase a basic system that includes hardware and software for about $1,000 to $1,500 Biometric time and attendance systems aren’t as expensive as one might think. Small companies can purchase a basic system that includes hardware and software for about $1,000 to $1,500. Some companies' solution, which works for companies with up to 50 employees, retails for $995 to $1,300. The price includes one fingerprint scanner and software that tracks arrivals and departures, calculates hours for payroll, and tracks vacation time and sick days. Large corporations with many hundreds or thousands of employees should expect to spend at least $10,000 on a biometric time and attendance system. For a complex system serving thousands of employees and multiple locations, the cost could rise as high as $100,000. In addition to a basic software and hardware package, one may need to purchase additional features, services, or accessories. Additional biometric scanners begin at about $1,000 to $1,300 each. Training begins at about $300 to $500 for smaller businesses and can run thousands for larger companies. Accessories like scanner covers, which protect the equipment when it is not in use, begin at about $30 to $50 each. CrossChex Cloud CrossChex Cloud's features include face recognition attendance, temperature, and mask identification Because there are so many options, it helps to talk to vendors about the products they provide. Some will charge an upfront fee for a set number of traditional software licenses; others will charge a monthly fee for web-hosted software. Although the market and advanced technology decrease the price of time and attendance system, some small companies or workshops still can’t afford extra spend besides salaries. Anviz introduces a new solution for those business owners - CrossChex Cloud. One can set up a new account and get only one hardware connected to be a lifetime free subscriber of CrossChex Cloud. Start at $500 only, one can get hardware that is suitable for CrossChex Cloud with advanced features includes: face recognition attendance, temperature, and mask identification, and get records of almost everything one wants to take control of.
Expert commentary
Changing customer needs can make specifying an alarm system that will continue to deliver in the long term a challenge. However, the latest modular alarm solutions provide the opportunity to build a more individualised system from the outset, as well as offering the ability to up-scale in the future without causing disruption. Martin Wilson, North EMEA Regional Director at Resideo, looks at how alarm specialists can use this style of solution to both benefit customers and build their own business opportunities. Holistic sense of home security In a survey of 1,000 homeowners undertaken by Resideo, the results revealed that, although deterring burglary was still a top priority, consumers were moving to a more holistic sense of home security, wanting to bring convenience, and property and life safety, into the mix. An alarm system no longer needs to function on one level, alerting only to a break-in taking place Indeed, an alarm system no longer needs to function on one level, alerting only to a break-in taking place. The latest modular alarm systems offer the flexibility to create a scalable security and life safety platform for homes and small businesses, as well as giving installers the ability to suggest future update options that can be added as and when budget or requirement allows. Valuable up-scales Finding an alarm that can be scaled over time has the obvious business benefit of ensuring it is easy to revisit and add to as customers naturally expand their existing security. With many modular designs connected via WiFi, this not only means installers can opt for the right mix of sensor options from the get-go but also that any additions can be connected to the panel and system with ease. Many control hubs have winning features in their own right. The ProSeries security panel by Resideo, for instance, has an intuitive touchscreen, easy-to-read, full-colour display to reduce false alarms, plus a built-in camera, speaker and microphone, intuitive icons and even five-day weather alerts. The ProSeries security panel by Resideo has an intuitive touchscreen Natural up-scale opportunities For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition For the installer, it has a plug-in power connection, trouble-shooting videos and end-user replaceable batteries to reduce unnecessary callouts. However, to build a scalable system, this needs to be coupled with the right, flexible solutions to tackle customer concerns. Taking the time to find out what is important to the end user is vital here and can lead to natural up-scale opportunities. For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition. Similarly, a panic button and even medical transmitters may be of benefit to others. All this, as well as other options, such as glass break detectors, door and window sensors and indoor and outdoor MotionViewers™, are available within the ProSeries range, and can be updated or added to an installation as needed or as a property grows with minimum disruption. Adding life safety The ability to propose an alarm system that can bring together alerts for different threats – for both the home and life – under one platform, also has real appeal. Indeed, in a survey of 1,000 homeowners undertaken on behalf of Resideo, a system’s ability to alert to the dangers presented by fire and CO was mentioned as an important part of the decision-making process by 41% of participants. For many, this increased awareness may stem from the many regulation updates regarding smoke and carbon monoxide (CO) alarms that took place in 2022. In Scotland, for instance, carbon monoxide detectors were required to be fitted in any room with a carbon-fuelled appliance in all homes, rented or owned. Social housing properties In England, smoke and carbon monoxide alarms were required in all social housing properties In England, from the 1st of October 2002, smoke and carbon monoxide alarms were required in all social housing properties, with carbon monoxide alarms now mandatory in the private rented sector. Wales followed suit in December for rented accommodation. The new guidance for England and Wales requires at least one smoke alarm to be installed on each storey of a property, to help alert to domestic fires more quickly, ensuring a quicker evacuation and reduced risk of fatality. For professionals, systems such as ProSeries, can be connected to a series of smoke and carbon monoxide detectors, in a ‘one-go-all-go’ setup that means the alarm will go off if one of these threats are identified. Smart and connected benefits The total Connect 2.0 app gives ProSeries end-users the ability to view and control the security platform remotely. The Resideo Pro app currently gives installers the ability to view the system and connect to the central monitoring system. The platform also supports home automation as it works with Zwave devices. The platform also supports home automation as it works with Z-wave devices. The platform also supports home automation as it works with Z-wave devices There are also extra benefits for alarm professionals too. The AlarmNet 360™platform on which ProSeries is configured gives greater insight to improve business operations, increase efficiency and deliver insights on accounts to identify additional upsell opportunities and ongoing services. Providing the ability to remotely diagnose brings valuable time-saving options and avoids unnecessary callouts. It also means the ProSeries panel and peripherals programming can be accessed anytime, anywhere, using the cloud, allowing ease of programming, troubleshooting and account management on the go. Needs and future possibilities Changing a complete alarm system to apply new functions is never going to feature highly with the end user, nor does it work where longevity and sustainability is concerned. Having the ability to build a modular system and add to this as needed, whether this is at a property or a small business, provides benefits for both customers and professionals when it comes to meeting immediate needs and future possibilities. Add connectivity and remote access to this and you have a platform that can help streamline business operations, putting professionals more in touch with customers, and helping to spot future opportunities.
The adoption of innovative and interconnected door hardware systems can help overcome the challenges associated with building security, explains Daniel May of Consort Architectural Hardware. The security of our built environment and the safety of its people is paramount throughout a building’s lifecycle. While these elements remain a primary focus at each touchpoint of a construction project, today’s design teams are sooner adopting modern access control systems to address this age-old challenge, but why? Modern access control Where systems were once rudimentary, modern access control has evolved into a revolutionary factor of building design, unlocking various benefits for its many users in the process. The Internet of Things (IoT) has enhanced building security as we know it, and as technology continues to advance, more options enter the market. Following more than a decade of innovation and integration, the access control market is projected to grow year on year, from £7.8 billion in 2023 to £11.8 billion by 2028. Modern user requirements have led to several operational and technological advancements Modern user requirements have led to several operational and technological advancements during this period, and decision makers and design teams alike can now choose from a versatile selection of options. Some door hardware products now utilise smart locks, cloud control and even biometrics for example, and most recently, there’s been a substantial change to the way access control systems operate, with focus moving towards end users and ease of use. Modern access control has evolved into a revolutionary factor of building design Smart door hardware From an operational perspective, interconnected access control systems gift users with an intuitive network that improves building security through the use of real-time status updates, while also providing them with the ability to grant instant access approval and denial at the touch of a button. Often, users can operate their building’s various access points through their mobile phone, which has led to improved flexibility and efficiency in most environments - whether at home or in a public access property. The security benefits also become clear when compared to the alternative of physical keys. If a traditional key is lost or stolen, the security of a building becomes at risk until it is found or replaced. Intuitive access control systems are designed to build upon the traditional lock and key methods. By seamlessly integrating smart door hardware into both new and retrofit projects, users can manage access points and improve security across the building - without stifling ease of access, stunting future scalability or unsettling the aesthetics. Users can operate their building’s various access points through their mobile phone Access control system The PSIA standard is one of the widely recognised and respected standards for access control products As many adopt Wi-Fi infrastructures, NFC technology and cloud services into their buildings, decision makers must also consider the need for better standards. While the introduction of IoT may advance security, performance and functionality, it can also introduce new risks which must be mitigated by adhering to both localised and international standards, such as ISO 27001 for example. The Physical Security Interoperability Alliance (PSIA) standard is one of the widely recognised and respected standards for access control products and provides comprehensive requirements for systems by focusing on interoperability, scalability, and functionality. While the introduction of IoT may advance security, it can also introduce new risks Providing comprehensive requirements This standard ensures that access control products from different manufacturers can seamlessly integrate and communicate with each other, allowing for greater flexibility and choice when designing a complete access control system. After all, a one size fits all access control solution simply doesn’t exist and decision makers would be remiss in not selecting a product that aligns with their building’s needs while meeting the required standards.
In the early stages of childhood education, kindergarten imparts foundational principles that shape future behaviour. Today, you can think about cloud computing in a similar manner: it has become a fundamental element in the architecture of modern technology. The cloud now plays a critical role in digital interaction, security, and infrastructure development. Far from being just another tool, the cloud is a cornerstone, providing essential support for the intricate network that supports today's digital ecosystem. Vomplex digital systems Much as kindergarten lessons lay the groundwork for cognitive development, the cloud offers base capabilities that are vital for constructing and operating complex digital systems. Recent advancements in cloud-based security — particularly in access control and video surveillance — emphasise the importance of cloud computing. It has been instrumental in unifying fragmented security systems, similar to how basic social principles taught in kindergarten help diverse children come together as a unit. The role of cloud computing in our technological world is multifaceted and continuously growing The role of cloud computing in our technological world is multifaceted and continuously growing. It has evolved into a space where innovation is cultivated and security commitments are maintained with vigilance. The fusion of artificial intelligence and analytics into cloud services signifies a concerted effort toward a future that is more cohesive, intelligent, and secure. Significant technological progress As we delve deeper into this topic, it will become evident that cloud computing, like the pivotal lessons of kindergarten, is indispensable. It quietly enables significant technological progress, mirroring the foundational principles taught in our formative years in both its essential nature and its growing influence. Play Fair: Technological Developments in Cloud-Based Security The past year has been a period of significant innovation in cloud-based access control and video surveillance. Cloud computing has evolved into a robust platform that fosters the creation of integrated security systems. These systems consolidate access control and video surveillance into a unified experience, demonstrating the cloud's potential to seamlessly combine disparate systems. Substantial industry progression The advent of edge computing has boosted bandwidth efficiency and accelerated data processing The incorporation of artificial intelligence and analytics into cloud services marks a substantial industry progression. This development provides businesses with advanced tools for in-depth analysis and intelligent decision-making, enabling them to not only gather comprehensive insights but also strengthen their security measures. The cloud has eased the transition to new technologies and emphasised a commitment to cybersecurity, with encryption protecting data integrity in transit and at rest. Simultaneously, the advent of edge computing has boosted bandwidth efficiency and accelerated data processing, highlighting a consistent drive to refine and adapt. The trend of integrating cloud security systems with other business platforms help create unified ecosystems, reflecting a broader narrative of security professionals’ pursuit of progress and enhancement. Potential future disruptions Wash Your Hands: Pandemic-Induced Transformation in Cloud Services As we all know, the COVID-19 pandemic necessitated a swift transition to remote operations, with cloud computing forming the backbone. i The urgent need for cloud solutions was apparent as businesses adopted remote collaboration tools, work-from-home policies, and virtual workspaces. This transition increased the demand for cloud services and prompted more adaptable and cost-effective pricing models. Recognising the critical role of cloud services, organisations enhanced their investment to safeguard operations against potential future disruptions. The pandemic fundamentally altered the perception and valuation of cloud computing, emphasising its critical role in sustaining business operations. Scaleable digital infrastructures The growing demand for SaaS has led integrators to create scaleable digital infrastructures Share Everything: Systems Integrators and the Adoption of Cloud Systems integrators have done much to realise the cloud’s potential. The growing demand for Software as a Service (SaaS) has led integrators to create scaleable digital infrastructures tailored to specific business needs.. The use of the cloud for data backup has improved efficiency and increased organisations’ ability to cope with disruptions. Although there has been a gradual shift among integrators toward cloud solutions, effectively marketing and supporting SaaS business models remains a challenge. But the possibility of continuous revenue streams through managed services is promoting broader adoption of cloud technologies. Cloud-based security solutions Live, Learn, Think: Enterprise-Level Cloud Adoption There is an increasing trend among large enterprises to adopt cloud-based security solutions. The shift toward VSaaS indicates a move towards subscription models that offer financial and scalability advantages. This transition is more than a mere operational change. Rather, it represents a commitment to the expansive potential for growth and innovation that the cloud offers. But let’s face it: the ‘cloud’ journey is accompanied by challenges, particularly concerning data security. Providers must deliver robust data protection measures to ensure the success of cloud-based security services, which depends not just on technological progress but also on fostering trust with clients. Addressing cybersecurity concerns The hybrid model offers a balanced solution for businesses looking to merge these two environments Baby Steps: Hybrid Cloud and On-Premises Infrastructure The hybrid model, which combines cloud with on-premises infrastructure, continues to be a strategic choice for many organisations. While the cloud provides flexibility and ease of access, on-premises solutions offer control over data security and comply with regulatory demands. The hybrid model offers a balanced solution for businesses looking to merge these two environments. Be Trustworthy: Cybersecurity Measures and Communication Transparent communication is key in addressing cybersecurity concerns with customers and partners. Companies that are transparent about their security protocols, including encryption and regular updates, build trust. Certifications such as SOC 2 Type II affirm a dedication to security, and proactive educational resources ensure that users are well-informed about best practices. Decision-making processes Cloud computing has become the cornerstone of modern security strategies Look: The Future Outlook for Cloud-Based Security Solutions Looking forward 5-10 years, cloud-based security solutions are expected to become even more central to organisational decision-making processes. The cloud is poised to become the hub for predictive decision-making, using AI algorithms and extensive data to proactively manage security risks. This vision of an intelligent, integrated approach to security, with the cloud enabling swift, collaborative responses to threats, is almost at hand. Cloud computing has become the cornerstone of modern security strategies, moving beyond its initial role as a digital transformation tool. As we look to the future, the cloud is set to redefine security paradigms and anchor a new era of intelligent, predictive security operations.
Security beat
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Case studies
Face recognition technology has been widely used in government, finance, military, education, medical, aviation, security, and other fields. When the face is aligned with the camera of the terminal device, the user's identity can be recognised quickly. As the technology further matures and social recognition increases, face recognition technology will be applied in more fields. The customer Joramco is an aircraft maintenance company with over 50 years of experience servicing Boeing and Embraer fleets. It is specialised in performing maintenance to air crafts at Queen Alia International Airport. Joramco has spacious areas for aircraft parking and storage programs that can take up to 35 aircraft. Additionally, Joramco has an academy that offers a comprehensive education in aviation, aerospace, and engineering. The challenge Joramco wanted to replace the old system with a fast and precise face recognition system The old access control devices that Jormaco used were not enough rapid and smart. The insufficient personnel storage also affected the efficiency of personnel management. Thus, Joramco wanted to replace the old system with a fast and precise face recognition system, which could centrally manage 1200 employees' access and attendance. In addition, the devices could be installed on turnstiles to control the turnstile gates. The solution: AI and cloud-based face recognition Based on Joramco's demands, Anviz valued partner, IDEAL delivered Jormaco Anviz's powerful AI and cloud-based face recognition solution, FaceDeep 5 and CrossChex. It can be used as a turnstile integrated management system composed of computers, face recognition technology, an intelligent pedestrian turnstile gate, a smart card, and a time clock. FaceDeep 5 FaceDeep 5 supports up to 50,000 dynamic face database and rapidly recognise users within 2M(6.5 ft) in less than 0.3 seconds. FaceDeep 5's Dual Camera technology plus deep learning algorithm enables liveness detection, identifying fake faces on videos or images. It also could detect masks. CrossChex Standard CrossChex Standard provides interactive dashboards specifically for workforce management CrossChex Standard is an access control and time attendance management system. It provides interactive dashboards specifically for workforce management, and real-time summary for shift management and leave management. Key benefits Faster recognition, more timesaving FaceDeep 5's ingenious face detection and facial recognition algorithm allow for liveness detection with the best combination of speed and accuracy. It reduces the waiting time for 1,200 employees during peak hours at Joramco's main entrance gates and the academy building entrance. Strengthened physical security and employee safety It also helps maintain employees' healthy and companies' physical access control security as the touchless face recognition system lower infection risk and prevents unauthorised access. Widely adaptable to various conditions FaceDeep 5 can adapt to outdoor and indoor environment applications with an IP65 protection standard "We chose Anviz FaceDeep 5 because it is the fastest face recognition device and has IP65 protection," said Jormaco's manager. FaceDeep 5 has high-definition cameras and smart LED light which can fastly recognise the face in strong light and low-light environments, even in complete darkness. It can adapt to outdoor and indoor environment applications with an IP65 protection standard. Fulfillment of management requirement Joramco is using CrossChex Standard connecting between the devices and database to manage employee schedules and time clocks. It easily tracks and export employee attendance report in seconds. And it is easy to set up devices and add, delete, or modify employees' information.
Kaohsiung port is the top 15 seaport in the world and the busiest seaport in Taiwan. With a handling capacity of 117 million TEU annually, the seaport is in full 24/7 operation and constantly receiving new missions. Therefore, the seaport must have an efficient system to track and monitor the operations. The situation room can help the seaport operator efficiently manage and monitor the seaport terminal operation. The administrator can also make decisions based on and easily review the performance of the seaport to take corrective action based on evidence recorded to enhance operational productivity. PoE (Power-over-Ethernet) port NViS 14162 support build-in 16 PoE (Power-over-Ethernet) port all in one, it empowers seaport front-end and back-end as follows: 1) Front end: DivioTec Network Cameras a) Connect up to 4 cameras for each ARMG including: Two DivioTec 360° panoramic 20MP Multi-Sensor Network Camera NMP851 Two DivioTec 2MP Bullet Network Camera NBR126PA b) Directly provide the network transmission and power supply of the front-end network camera. 2) Back end: Milestone Video Management System Push real-time video result to situation room through 2.5GbE LAN port. Support milestone smart map function for exception management in the situation room. LAN (1GbE) port connects LTE router to remote maintenance. Save the video recording in 120 days as a backup. Support 120+ days of backup recording NViS 14162 is equipped with triple storage space including M.2 SATA SSD for the OS and 2 SATA HDD for the recording storage which allows 120 days of backup evidence recording. Using the NViS 14162, which is equipped with the latest Intel® Celeron® processor, it may stream up to 16-channel in H.265 codec with the resolution of live view + recording at 2MP (1080p, 1920 × 1080). Real-time monitoring These specifications give NViS 14162 the ability to drive a maximum resolution of 4K60 on displays, which makes it easy for the supervisor to monitor the entire seaport operation. This also allows the operator to take direct measures by checking the recording for evidence tracking in real-time. The all-in-one design may allow the user to save up the TCO (Total Cost Ownership) of the edge recording that needs to be used while still providing great quality at the same time. Key features for application needs Support Intel®Celeron® J series 32GB DDR4 supported Dual display of HDMI and DVI-I 2 x 3.5" SATA HDD support RAID 0,1 1 x 2.5" SSD/HDD, 1 x M.2 2242 SATA SSD 1 x 10/100/1000 Intel®Ethernet 1 x 2.5G Intel®Ethernet 16 x 10/100 PoE (240W max PSE) Support TPM 2.0 onboard Support eMMC onboard (option)
To protect 1.7 million visiting sports fans each year, Zayed Sports City, the largest sports complex in the United Arab Emirates (UAE) has deployed a site-wide security system from Hikvision. Incorporating more than 670 integrated cameras; the solution reduces workloads and costs with cool AI features, while also providing super high-resolution imaging to boost security across the site. The challenge: The need for automatic video security Zayed Sports City, which has been recognised as the UAE's number one sports destination, welcomes more than 1.7 million sports fans each year. The site incorporates a stadium, ice rink, bowling centre, tennis centre, and a range of other sports facilities. With such large numbers of people moving around the site, there is always a chance that accidents and other incidents could occur potentially putting visitors to the complex at risk. The key to preventing accidents and keeping sports fans safe is to effectively keep track of all areas of the complex during sports events and to respond quickly if anything goes wrong. But with many hundreds of cameras needed to provide full coverage of the site, the resulting video streams are extremely difficult, if not impossible, to be processed manually. Need for high-resolution cameras The sports venues and facilities need to keep an eye on very large spaces, often with very high ceilings As an additional challenge, the sports venues and facilities need to keep an eye on very large spaces, often with very high ceilings. This means that high-resolution security cameras are needed to provide clear imaging at significant distances, with cameras often mounted high up on pillars, posts, or ceilings. To address these challenges, Zayed Sports City needed a security and safety system that could protect all areas of the site without the excessive workloads associated with manual approaches. The solution A stadium-wide security system from Hikvision To maximise visitor safety, Zayed Sports City has deployed a site-wide security system from Hikvision. This incorporates all the cameras and control room equipment needed to protect the site, 24-hours a day. The solution incorporates around 670 Hikvision cameras with different functions and types that were deployed during two major project phases. These are being used to protect all of the sports venues and facilities inside the Zayed Sports City, as well as spectator seating areas and parking areas. Multi-functional AI, ANPR, and VMS AI allows the security team to search back through video footage much more quickly and easily As well as offering high-definition imaging (with 2- and 4-megapixel resolution across the Hikvision bullet and PTZ camera fleet), selected Hikvision cameras also offer onboard AI capabilities to automate key security tasks. One example of this is license-plate recognition (ANPR) technology built into cameras in the stadium parking areas, which are increasing security and supporting efficient parking operations. AI capabilities also allow the security team to search back through video footage much more quickly and easily when investigating accidents and incidents. All Hikvision cameras have been integrated into the Zayed Sports City Video Management System. The benefits: Improved safety, efficiency, and scalability for site security management With the Hikvision solution, many routine security tasks can be handled automatically, reducing the risk of missed incidents, speeding up responses, and reducing staff workloads and costs. Khalid Al-Mutawa, Director of Operations for Abu Dhabi Entertainment Company, the company that manages and operates Zayed Sports City, says, "Streamlining our processes with this system has allowed us to work more efficiently. The automated security alerts and the HD Video help us to respond quickly and work with peace of mind. Increased operating efficiency Hikvision's AI features are very valuable in investigating incidents and it reduces the time required" With the ability to search through video footage quickly and easily to investigate accidents and incidents, the security team is achieving major time savings compared to reviewing video manually. "The Hikvision system's AI features are very valuable in investigating incidents and it reduces the time required by our staff significantly," says Khalid Al-Mutawa. "This frees our security team up for our core activity: keeping visitors safe and ensuring that the complex is secure at all times." Effective, efficient AI security at an affordable cost The fact that Hikvision cameras use onboard AI capabilities has made it cost-effective for Zayed Sports City to deploy the latest security technologies quickly, across the entire site. Additionally, new AI capabilities such as the ability to locate and help unaccompanied minors or to count people to prevent crowding can be added cost-effectively in the future, with no need to replace existing control room equipment or software. Seamless integration with the Zayed Sports City VMS All elements of the Hikvision security system could be integrated seamlessly with Zayed Sports City's chosen VMS. This minimised deployment cost and risk and is ensuring that all elements of the solution work in harmony to protect visitors to the stadium. "It was critical for us that cameras and other equipment deployed in phase 1 and phase 2 would integrate easily with our currently used VMS, with no compatibility issues," says Khalid Al-Mutawa. "Hikvision offered a fast and easy solution, and full coverage of the site was installed on time."
Being isolated on the edge of wilderness means there’s a need for a video system that is both reliable and flexible. For that reason, the team at Jackson Hole Airport (JAC), since 2009, has relied on video management software (VMS) from Milestone Systems, to enhance security, safety, and efficiency at the airport. Milestone XProtect VMS installed At the edge of the frontier, Jackson Hole Airport has experienced considerable growth over the years. Significant capital investments in expansions have made new video system integrations possible several times and Milestone XProtect VMS has supported the airport’s needs along the way. As of 2020, over 220 cameras are in use, but the airport shows no signs of slowing down As of 2020, over 220 cameras are in use, but the airport shows no signs of slowing down. New projects will include building a fuel farm, a car wash, and expanded parking facilities. As the need to increase security continues, XProtect open platform software will enable IT team growth and the seamless integration of new cameras, and data storage capabilities. Enhanced situational awareness All video is kept for up to a full year, with most of the system’s cameras set for motion recording, around the clock. As a result, administrators achieve greater situational awareness and better security. The video system has enabled improvements throughout the entire airport. For example, Jackson Hole Airport contends with a great deal of plane de-icing, for several months each year. The process occurs at a distance from the main buildings. Thanks to the video expansion, each airline is now able to monitor the de-icing of their planes. Allowing airline personnel to monitor progress on their own has saved airport staff time and resources. Monitoring security In addition, the airport uses the system to closely monitor the security checkpoint, to capture video documentation, in case of an incident. By monitoring baggage areas, it’s possible to investigate lost bags and left-behind items, by reviewing recorded video. New 4K multi-sensor cameras support an investigatory system, helping staff see previously uncovered areas. The cameras capture high-resolution video and provide enough data to zoom in, after the fact. Deployed Agent Vi’s video analytics Milestone Systems’ XProtect Smart Client has improved general situational awareness in the airport Additionally, the team has deployed video analytics from Agent Vi, to provide a layer of automated alarms, for flagging abnormal occurrences. For example, video analytics can detect travellers moving against the foot traffic flow and crossing into restricted areas. Milestone Systems’ XProtect Smart Client has improved general situational awareness in the airport. Authorised users now have a new standard for accessing surveillance remotely. It provides seamless viewing of live and recorded video, instant control of cameras and connected security devices, and a comprehensive activity overview. Force multiplication using advanced technology The ongoing use of Milestone’s VMS makes it possible to maintain the independence and efficiency of a small team of personnel, delivering maximum security at the edge of a wild frontier. Andrew Wells, IT Manager for the Jackson Hole Airport, said “Situational awareness for our team and our clients allow us to be as secure and efficient as possible, with our small team. The flexibility of the open platform VMS allows us to scale our system and add the features we need now and in the future.” Jackson Hole Airport Jackson Hole Airport lies seven miles north of Jackson, Wyoming, at the base of the Teton Mountains, in the USA. It is unique for being entirely within the Grand Teton National Park limits. It is the busiest airport in the state of Wyoming, with nearly 500,000 in-bound passengers welcomed annually. The Jackson Hole Airport covers over 500 acres of land area and has one runway, nine boarding gates, and three baggage carousels.
The Nation’s Seaports and Airports throughput thousands of people and billions of dollars worth of materials every day. These ports comprise of massive plots of land located amongst densely populated communities. Seaports can see throughput of more than a thousand trucks on any given day, while airports need to accommodate often erratic traffic consisting of support vehicles, fire trucks and heavy equipment. Securing these facilities requires a varied combination of crash rated barriers. At locations where restricting access of passersby is just as important as stopping unwanted vehicles, crash rated gates are the best option. Los Angeles International Airport has used a variety of Delta Crash rated gates to protect fuel depots, hangers and runways. Access control devices In-ground wedge barriers have found favour at port roadways, allowing security personnel to screen trucks entering and exiting the port. Delta Scientific has worked with more than one hundred port locations to design the barrier system that best meets the demands of the facility. Airports across the nation are now taking measures to protect everyone, passengers and employees Though every effort is made to ensure the safety of air travellers, what is being done to protect those that work within the airports? What about the security of the cargo delivered? What about perimeter security breaches – allowing possibly dangerous terrorists and criminals onto federal aviation property, thereby endangering everyone within? Airports across the nation are now taking measures to protect everyone, passengers and employees, by installing vehicle access control devices. These new airport security systems are designed to stop anyone from driving any type of vehicle. Controlling vehicle access Originally used primarily to stop the constant risk of thefts at car rental agencies, bollards, barriers, barricades and crash gates are now common throughout airports, especially after 9-11. Booths were traditionally used for housing guards who collected parking fees. They’re often ballistic rated. From protecting the tarmac to passenger areas, airports today are especially conscious of controlling vehicle access. As a countermeasure to the increased theft of rental cars throughout the nation approximately 15 years ago, many rental car operators began using traffic controllers to disable unauthorised vehicles from entering or leaving their lots. Installation of these units all but eliminates drive or crash out thefts. Over 120 other car rental lots throughout the nation have installed some variety vehicle access control systems. Motorised traffic controllers The rounded corners and custom painted design complement their two 9-level parking structures The motorised traffic controllers (the ‘wrong-way’ teeth), warning signs and traffic and surface mounted controllers (i.e. gates) together prevent thefts of rental cars by disabling unauthorised vehicles from entering or leaving the lot. Almost every airport features parking/cashier booths. Some are fairly basic; others are upgraded. For instance, on the way out of the Minneapolis/St. Paul International Airport 18 prefabricated Delta parking/cashier booths help handle the airport’s doubled parking capacity of 13,000 spaces. Put in prior to 9-11, these booths are simultaneously aesthetically pleasing and contribute to the overall security of the airport by providing vehicle access control. The rounded corners and custom-painted design complement their two 9-level parking structures. Two heaters, double insulation and tinted glass help parking attendants to guard against both the Minnesota winters and sun. Increased security measures Contrast them with the bullet-resistant level 4 booths used at California’s Ontario Airport. These 6 x 12-foot buildings were manufactured to meet tight specification requirements, including structural calculations and wet seals from drawings by a Registered California Structural Engineer. Such barricades can be raised or lowered at will to stop traffic or let it through The ramp-up in guard booths illustrates the increased security measures airports now take with vehicle control. Soon after 9-11, the United States Air Force began deploying very high-security DSC501 barriers at its facilities around the globe. The DSC501 barricade will stop and destroy a 65,000 lb. vehicle traveling 50 mph. Such barricades can be raised or lowered at will to stop traffic or let it through. In an emergency, the thick steel plates or bollards pop out of the ground within 1.5 seconds. Commercial airports followed suit. Optic communication lines This barricade was originally designed for the U.S. Navy and has also been selected for use at U.S. Embassies. Set in a foundation only 18 inches deep, the Delta DSC501 is able to survive after a 5.4 million foot-pound impact. With its shallow foundation, it obviates the concerns of interference with buried pipes, power lines, and fibre optic communication lines, a major consideration at airports. The shallow foundation also reduces installation complexity, time, materials and corresponding costs. Front face warning lights warn drivers that the barricade is in the ‘up’ position. There is also an open area on the front for signage. Diagonal yellow and white stripes are standard and optional colours and graphics are available. The open channel construction even lets airports specify hot dip galvanising. Securing access points The sliding gate system that is used in such an application must be crash rated Among the many FAA mandates airports must meet is one that requires securing access points to international freight lines. That includes access to air cargo facilities, where scores of trucks must go in and out on an hourly basis. That was the issue facing California’s largest fencing contractor, Alcorn Fence, at Los Angeles International Airport (LAX) for Qantas and Singapore Airlines. The sliding gate system that is used in such an application must be crash rated. Clear openings range from 12 to 30 feet. A linear crash gate will withstand the impact of a 15,000 lb vehicle striking the gate at 50 mph. To solve the problem, Alcorn Fence installed crash-tested swing gates on the runway that accesses the cargo facilities. Minimising installation costs The SCG1000 provides openings of up to 40 feet and the gates can be up to nine feet tall. Best of all no ground tracks are required, keeping installation costs to a minimum while protecting the integrity of the runway. These gates can be seen at LAX on the runway accessing the Singapore Airlines and Qantas Airlines terminals. This gate, like the SGC 1000, doesn't need a track, wheels or roller path across the entrance LAX additionally uses the SC3000 industrial gate in various places. This gate, like the SGC 1000, doesn't need a track, wheels, or roller path across the entrance or drive it protects. Thus, it adapts well to roads with high crowns, drainage gutters or other conditions that preclude ground tracks. Creating secure environments Aesthetics should not be overlooked. With smart designs, it's no longer necessary to choose between form and function. Airports can have them both. Designers are creating secure environments with more compatible and aesthetically pleasing architectural elements. With bollards, airports can create the look they want. Ranging from faceted, fluted, tapered, rings and ripples, colours, pillars, to shields, emblems and logos, bollards are aesthetically pleasing and versatile. In other words, they dress up airport security. Bollard systems operate individually or in groups of up to ten and are used for intermediate-level security applications. Individual bollards are up to 13.25 inches in diameter, up to 35 inches high and are usually mounted on 3-foot centres. Hydraulic and pneumatic versions can be operated by a variety of control systems. Manual versions are counter balanced and lock in the up or down position. Crash-resistant device All models are crash rated and lower to allow passage of authorised vehicles All models are crash rated and lower to allow passage of authorised vehicles. The incident at Glasgow International Airport raised new concerns for airports. The airport was evacuated after a green Jeep Cherokee struck the airport's terminal building and burst into flames. In such cases, a cost-effective fixed bollard array can be used instead of retractable bollards. However, airport infrastructures exacerbate installation problems caused by rough surfaces, turns, and lack of traditional foundation depth due to subsurface utilities and fibre optics, among others. Moreover, conventional barriers require surface areas to be completely level. Given the growing demand for a crash-resistant device that is easy to install, attractive, yet compliant with restrictive subsurface conditions, the DSC 600 Shallow Foundation Bollard was recently introduced. Unauthorised vehicle intruders Traditionally on curves, setbacks often end up too close to the facility. Now, airports can install bollards on the upper levels of parking structures and other unprotected facilities without using unsightly ‘make-do’ solutions to stop car bombers or negligent drivers. New DSC 600 Shallow Foundation Bollards will protect approaches to airport facilities New DSC 600 Shallow Foundation Bollards will protect approaches to airport facilities, drop-off and passenger loading areas at transportation hubs and other presently unprotected locations where unauthorised vehicle intruders have no obstacles to stop them. With the DSC 600 bollard modules, those facilities surrounded by streets, abutting sidewalks and set back on lawns can now be effectively protected. The new DSC 600 bollards will blend into curves, rough terrain or inclines easily. Setbacks can be as short as two feet, providing a much greater safety cushion for the airport facility. High-energy stops With a foundation only 14 inches deep versus the four feet typically required, Shallow Foundation Bollards can be installed within sidewalks, on top of concrete deck truss bridges or in planters as well as conform to the inclines and turns of a locale. The new 2-bollard modules, which can be arrayed in whatever length is required, will stop and destroy a 15,000-pound truck traveling 50 miles per hour. They have already successfully passed a K12 rating crash test, providing proof of their ability to provide high-energy stops. In fact, the DSC 600 is the first Shallow Foundation Bollard to successfully meet the U.S. Department of State Specification, Revision A that requires the bed of the attacking truck to go less than 39 inches beyond the point of impact. Total kinetic energy If the speed is reduced by 2/3rds, the force of impact will be reduced by nine times The new bollard modules also meet the 1-meter clearance regulations mandated by the Americans with Disabilities Act (ADA). Although the DSC 600 bollards will let people pass through them, they will stop vehicles dead in their tracks. Because of the relationship of velocity to the total kinetic energy possessed by a vehicle, airports typically force a vehicle to slow down before it reaches the bollard, or any other barrier in fact. The most frequently used technique is to require a sharp turn immediately in front of the barrier. When vehicle speed is reduced by 50 percent, the ‘hitting power’ is reduced by four times. If the speed is reduced by 2/3rds, the force of impact will be reduced by nine times. Reducing security risks Upon designing a way to slow down vehicle approach, they also assure that the attacking car cannot make a ‘corner cutting shot’ at a barricade. Often, only a light post defines a turning point and a speeding car can take it out and not even hesitate. Knolls and other impediments are typically employed. By their very nature, terrorist attacks are unpredictable and predicated on surprise. Staying one step ahead by identifying vulnerable areas, and securing them, is critical to staving off vehicular attacks. Terrorists typically don't go where they see barricades, so placing them wherever possible attacks can happen reduces security risks dramatically.
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, will hold its 2nd online Dahua Technology Partner Day, from October 13 - 14, 2021, with the theme - ‘Building a digital future’. Dahua Technology Partner Day Adhering to its strategy of open cooperation, Dahua Technology is committed to creating a win-win ecosystem, with major technology partners around the world. This year, Dahua Technology will join hands with its 22 global partners, in order to discuss interoperability, share industry trends and explore the future of digitalisation and intelligence together. “We are excited to host our second virtual technology partner day. Technologies have evolved fast in the past year and the needs of digitisation, and diversified challenges facing different industries today, are driving the integration of security companies,” said Mr. Jiaqi Gao, Overseas Marketing Director at Dahua Technology. Jiaqi Gao adds, “It is a great opportunity to show how we can build a digital future together with our partners and through which, we can jointly provide the right solution for our customers.” Smart solutions for IoT and security on show A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs During the 2-day event, Dahua Technology and its partners, including Vanderbilt, AxxonSoft, Immix and Optex, will unveil how their smart solutions benefit the field of security and IoT (Internet of Things). It will focus on Artificial Intelligence (AI), cloud solutions and alarm monitoring, as well as specific vertical markets, such as retail, smart building & facilities, critical infrastructure, transportation, etc. This year’s event will also include a section that demonstrates outstanding Dahua products and their compatibility with third-party solutions. A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs, including cyber security & privacy protection, full-colour 2.0 and TiOC 2.0, WizMind portfolio, and more. Attendees can register free of charge, connect with presenters and get product information. Behaviour analytics in Artificial Intelligence (AI) “The Dahua Partner Day event offers a great platform for AxxonSoft, to present our solutions. We successfully exhibited on last year’s Traffic & Parking session and are excited to share more information about behaviour analytics in the AI hub, this year,” said Alan Ataev, AxxonSoft’s Chief Executive Officer (CEO), adding “Together with Dahua, we are enthusiastic about creating joint solutions that grow our value proposition for both our partners and clients.” With its mission of ‘Enabling a safer society and smarter living’, Dahua Technology will continue to focus on ‘Innovation, Quality and Service’, so as to serve its partners and customers around the world.
Products
Round table discussion
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are the risks of port forwarding, and how can manufacturers and/or integrators mitigate those risks?
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download