Audio surveillance
IPConfigure, a trusted pioneer in enterprise video management software (VMS), has joined forces with Blue Eye, an innovator in remote video monitoring (RVM), to deliver an industry-first integration. This partnership empowers IPConfigure's customers to activate Blue Eye's advanced remote video monitoring services directly within the Orchid VMS platform, all in just a few clicks and without additional hardware requirements. Remote monitoring capabilities "This collaboration represents a transf...
TOA Canada's D5000 Series provides unprecedented speech clarity, delivering the presenter’s voice to audiences in any speaking scenario. Whether for the classroom, office meeting rooms, banquet halls, courthouses, or multipurpose halls, the D-5000 delivers audio with clarity and ease of use. To this point, this series has been a special-order product, but TOA Canada are happy to announce that they are now officially bringing it into the extensive catalogue of sound solutions. Suite...
Securitas Technology, a world pioneer and global provider of security, health, and safety technologies, is proud to announce the acquisition of Sonitrol New Orleans. This strategic move underscores Securitas Technology’s ongoing commitment to innovation, client-centric solutions, and expanding its geographic footprint to better serve clients across North America. Securitas Technology portfolio Sonitrol New Orleans, known for its expertise and pioneering Sonitrol audio sensor technology,...
Zenitel, a global pioneer in Unified Critical Communication solutions, proudly announces the launch of Zenitel Connect Pro, the industry’s first critical communication solution that unifies all types of audio communication solutions, helping to bring safety, security, operational, and infotainment communication needs under one platform. Zenitel Connect Pro Cybersecurity demands are fundamental to any security specification and the Zenitel Connect Pro platform is built on secu...
Radiofrequency (RF) technology specialists, SPX Communication Technologies launched Evenlode Lite, an entry-level video downlink system designed for regions new to airborne surveillance or those looking to enhance Intelligence, Surveillance, and Reconnaissance (ISR) capabilities. As geopolitical tensions rise and the need for real-time situational awareness grows, Evenlode Lite offers a cost-effective solution for defence, security, border control, and search and rescue teams. Evenlode L...
Hikvision, a major manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, is excited to announce an exclusive, limited-time offer on its cutting-edge ColorVu cameras, recognised as the industry standard for 24/7 full-colour surveillance. Through September 30, security professionals can get Hikvision’s ColorVu cameras at the most competitive price-performance ratio ever offered. 24/7 full-colour imaging...
News
Teledyne Marine is pleased to announce that, Teledyne Benthos, a pioneer in underwater communication technology, has been awarded a $975,000 grant from the National Fish and Wildlife Foundation (NFWF) to advance on-demand, or ropeless, fishing technology. Ropeless fishing provides lobster and crab fisheries a means to recover fishing gear remotely, through subsea acoustic communication, thus reducing, or removing, the need for ropes, lines, and surface buoys. NFWF grant This grant will support the development and advancement of ropeless fishing technology, crucial to promoting sustainable fishing practices while reducing marine life entanglements. Teledyne Benthos, EdgeTech, Inc., and the Sea Mammal Education Learning Technology Society (SMELTS) have been at the forefront of developing and testing ropeless fishing gear since 2018. Ropeless fishing gear Gear marking will be improved through directional measurements, enabling a common interface The funded project is focused on modifying commercial equipment to enable these organisations to collaborate on a common user interface and associated acoustic transducer for vessel or portable use. The focus will be the interoperability between transponders and acoustic modems developed by Teledyne Benthos and EdgeTech. Gear marking will also be improved through directional measurements, enabling a common interface with Teledyne Raymarine chart plotters, and enhancing usability, making ropeless fishing gear more accessible to end users. Subsea communication Teledyne Benthos acoustic modems are the backbone of the ropeless fishing system. They facilitate reliable subsea communication that provides the information needed to deploy and retrieve gear without the traditional ropes and lines that can entangle marine life, including North Atlantic right whales and other cetaceans. Developing a universal deck box used with an associated transponder will allow for a robust method for gear marking and retrieval. User-friendly interface The transponders emit acoustic signals that are then detected by the vessel's deck box, enabling precise location marking and ensuring a seamless operation between Teledyne Benthos and other devices. The integration of a chart plotter provides a user-friendly interface that is designed to meet practical users’ needs in real-world conditions, making it efficient for everyday use. Viable and sustainable alternative Teledyne Benthos will continue to work with deck box and transducer developers to test ropeless fishing gear Teledyne Benthos will continue to work with deck box and transducer developers to test ropeless fishing gear by addressing interoperability requirements and improving gear marking technology to provide a viable and sustainable alternative for the fishing industry. Teledyne Marine’s Chief Engineer, Bob Melvin, stated, “We are excited to be taking a significant step forward in innovative fishing technology." Reliable and efficient tools "We are committed to providing the fishing industry with reliable and efficient tools while continuing to protect marine life and be responsible stewards of the ocean environment.” This project is made possible through a grant from the National Fish and Wildlife Foundation and will be executed in partnership with Edgetech and SMELTS.
In August 2024, Speco Technologies announced the addition of five new teammates to their roster, expanding their product management, marketing, and sales teams. Speco’s newest employees include Mike Martin, National Sales Director; Adrian Tameguia, West Coast Regional Sales Manager; Andrew Escoto, Marketing Manager; Jordan Gaffney, Inside Sales; and Vinod Moorjani, Product Manager. Welcoming new members “We’re very excited to welcome this group of talented professionals to the Speco family,” said Speco Technologies President, Todd Keller. “Each of them brings a wealth of experience that we are confident will strengthen our ability to deliver innovative solutions and exceptional customer service.” Video surveillance, access control, and audio solutions Speco Technologies has continued to invest in its product development and customer relations teams As a family-owned and financially independent business, Speco Technologies has continued to invest in its product development and customer relations teams, despite a weaker-than-expected U.S. job report in early August and fears of a potential economic downturn. As new security threats emerge, Speco’s commitment to delivering high-quality video surveillance, access control, and commercial audio solutions continues to set them apart from their competitors. VP's comment “Our customers always come first,” said Speco Technologies Vice President, Corey Mutterperl. “For us to put our best foot forward, as a company, it’s crucial that we continue to invest in the teams that develop the products that define our brand. We’re incredibly proud to add each of these individuals to the Speco family.”
Convergint, a global pioneer in systems integration, announced the expansion of its Middle East & Africa (MEA) operations into Saudi Arabia. Security, IT infrastructure, and AV The company will offer customers a comprehensive suite of advanced solutions in security, IT infrastructure, and audio-visual systems. With the largest technical workforce in the market, including 10,000 colleagues across 220 global offices, Convergint leads the industry in developing seamless, next-generation technology systems for key sectors including government, critical infrastructure, energy, education, healthcare, and finance. Convergint Middle East As Convergint enters the Saudi Arabian market, it is well-positioned to support the region’s rapid digital evolution Convergint Middle East (MEA) is a longtime trusted provider of engineering-driven technology solutions, with established offices in Dubai, Abu Dhabi, Iraq, and South Africa. As Convergint enters the Saudi Arabian market, it is well-positioned to support the region’s rapid digital evolution. The company’s advanced security, automation, and IoT solutions align with Saudi Arabia’s ambitious drive towards smart cities, enhanced cybersecurity, and tech-driven economic diversification. Through this expansion, Convergint aims to support innovation, contribute to the growing tech ecosystem, and assist in developing a skilled digital workforce. Robust, innovative technology "We look forward to building long-term relationships with customers in Saudi Arabia and helping them reach their business objectives through robust, innovative technology systems. Our unique and empowered culture, driven by our Values and Beliefs, allows us to stay accountable to our mission and provide exceptional services that meet the evolving needs of our global customers," said Ann Fandozzi, CEO of Convergint. Ann Fandozzi adds, "By combining our world-class partner ecosystem with our extensive technical experience, we are well-positioned to become a leading provider of cutting-edge system integrations in the Saudi Arabian market." Digital transformation hub Said Kiwan, Regional Managing Director of Convergint Middle East, stated, "Convergint is fully equipped and ready to operate in the Saudi Arabian market. As we expand our engineering-powered capabilities, we will have a stronger footprint, allowing us to serve our customers better and enable them to meet their business goals. We are excited to contribute to Saudi Arabia’s vision of technological advancement and to be part of its journey towards becoming a hub for innovation and digital transformation."
The requirement for open server-based telephony systems has increased multifold in the last few years since it gives the freedom to choose a hardware platform of one’s choice. Open server-based systems Traditional hardware-based PBXs are slowly getting replaced by open server-based telephony systems. This is largely because hardware-based PBXs create hardware dependency, require manual upgrading, and incur heavy wiring costs. ANANT UCS ANANT UCS improves employees' productivity and speeds up the decision-making process Matrix has designed an enterprise-grade highly capable, durable, scalable, and efficient Unified Communication Software solution - ANANT. ANANT UCS can be scalable to up to 5000 IP Users to fulfill the communication requirements of large enterprises. The hardware-independent platform provides customers with a choice to select a reliable server as per their requirements. With a range of enterprise-grade calling features like built-in Auto-attendant, Voicemail, Unified Messaging, etc., it improves employees' productivity and speeds up the decision-making process. Single platform ANANT connects all the employees on a single platform. The employees can connect from anywhere at any time by installing Matrix VARTA on Laptops /Tablets /PCs /Smartphone devices of their choice. Our UC Server offers a range of enterprise-grade calling features that improve employees' productivity and speed up the decision-making process. With an in-call redundant system, ANANT boasts of providing the best customer engagement. By integrating ANANT with VoIP Gateways and IP Phones, customer requirements with multiple location communication set-ups can be met. Key features: 5000 IP Users. 1024 Concurrent Calls. 512 Three-party Conference. 64 Simultaneous Call Recording. Other features: RAID1 and RAID5 Support. Hardware Independent. Active-standby Redundancy. Built-in Auto-attendant and Voicemail.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that the New Brighton Department of Public Safety in Minnesota has digitised its evidence management processes with Genetec Clearance™. Home to 24,000 residents, New Brighton is a nature lover’s hub with 13 parks, an executive golf course, and bordering beautiful Rice Creek. To protect this family-friendly suburb, the city takes a technology-forward approach to its public safety initiatives. i-PRO body-worn and in-car camera They use the CentralSquare RMS and computer-aided dispatch (CAD) to manage 911 calls, first-responder dispatch, and incident response while streamlining information-sharing with other police departments. They also modernised their surveillance technology to include i-PRO body-worn and in-car camera systems, which are synched to capture high-resolution video of situations in progress. In addition to RMS data and mobile video, in the course of investigations, the department collects cellphone and doorbell footage, audio recordings, and more. Cloud-based public safety technology Trevor Hamdorf, New Brighton Deputy Director of Public Safety, said, “We’ve gained a lot from this solution." "We want to share what we’ve learned with other agencies and help them achieve these efficiencies, too. From a time, resources, and safety perspective, there’s great value in this cloud-based public safety technology." Managing evidence more effectively The department has digitised its evidence management process with Genetec Clearance Storing and sharing a fast-growing amount of data became more complex and time-consuming. More than 1,000 digital media requests are received per year, and each one takes department records staff an hour or more to burn onto DVDs. To give time back to those resources, the department has digitised its evidence management process with Genetec Clearance. Genetec Clearance As it integrates seamlessly with the CentralSquare RMS and i-PRO cameras, Genetec Clearance delivers a comprehensive public safety solution that streamlines processes for everyone from dispatch operators to police officers and records staff. This saves significant hours by automating manual processes from dispatch through evidence management. Data safety Ensuring evidentiary integrity is particularly important for criminal cases and discoveries Additionally, since Clearance is web-based, officers can access information from anywhere. Being able to set user permissions for viewing, downloading, and exporting evidence within Clearance allows the New Brighton DPS to further protect and compartmentalise data. Ensuring evidentiary integrity is particularly important for criminal cases and discoveries. With all data stored in the cloud and protected by built-in security features in Clearance and their Microsoft Azure Government cloud, the New Brighton DPS is assured data is safe, and privacy is protected. Clearance camera registry feature Using the Clearance camera registry feature, New Brighton DPS has also started collaborating with other organisations. With the Minnesota Department of Transportation (MnDOT), for example, interstate cameras are linked on a city map with Clearance. Should an incident occur, they can quickly locate nearby cameras and send MnDOT a video evidence request, all from the DEMS.
The full-day expo is headed to New Jersey and expects up to 5,000 attendees and hundreds of exhibitors, with the Bridge Cable team as some of those attendees. The full team of Bridge Cable is set to attend the ADI Expo 2024, as it makes a stop in Cherry Hill, New Jersey on Tuesday, August 27th, 2024. ADI Expo The annual event exhibits manufacturers like Honeywell, Resideo, Telguard, Turing, DSC, Yale, and more. Attendees will be spending the day learning the latest trends within telecommunications and receiving hands-on training from industry experts. The Bridge Cable team will be networking with these major suppliers and various members of the ADI team, and sharing updates about their newest projects, services, and partnerships. Past expo experiences A senior technician at Bridge Cable, Ray Faas, shared some insight about the team’s past experiences A senior technician at Bridge Cable, Ray Faas, shared some insight about the team’s past experiences with the expo, and their excitement for the next one, "I am super excited to be going back to the ADI Expo again as there is always something new to learn about in the telecommunications industry." He adds, "I love seeing the new products and keeping up with the technology as it advances. Something is going on in every part of the building with the grand ballroom having vendors and meals like breakfast, lunch, and dessert, and classes and demonstrations going on as well." Networking opportunity Ray Faas continues, "I have been to a few classes in the past that discussed fibre, access control systems, and video surveillance, and have been to both a door lock and security camera demonstration." He further stated, "There are a ton of different sales representatives that you can network with from security camera companies to hardware/tool companies, and they always take the time to share valuable information with you and answer any questions you may have. There is also a ton of awesome gear and products that ADI gives away throughout the event, which is an aspect I am always excited about!"
Expert commentary
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Inadequate security measures on your essential infrastructure can have severe consequences. Consequences Consider the rail industry: If a vandal cuts the cables on a vital mechanism that controls train signals, train safety is jeopardised. To avoid train collisions or derailments and thus significant damage to property and potential loss of life, the operating company must shut down the service until the infrastructure is repaired and the network is up and running again. The disruption affects the rail ecosystem itself, but also the people using the trains, the transportation of cargo, and more. The financial cost of repairing the damage, restoring signal functionality, and compensating for delays can be substantial. For another example, consider electrical substations: A fire or targeted attack can damage the system and lead to devastating power outages. Traditional surveillance limitations Traditional video surveillance has its limits when it comes to protecting transformer stations Traditional video surveillance has its limits when it comes to protecting transformer stations. The facilities are often located in rural areas, where straying animals or flying leaves trigger false alarms. 3D Surveillance solutions overcome these challenges by volumetrically securing the area and immediately detecting intruders only raising the alarm in the event of a human intruder and even identifying drone attacks. Protecting critical infrastructure with 3D surveillance Critical infrastructure must be monitored. It remains at risk if operators do not have systems for monitoring entire areas rather than just the periphery if security personnel has limited information in case of an intrusion and if security response protocols are not automated. 3D Surveillance solutions 3D Surveillance is an important tool for protecting critical infrastructure and ensuring the safety of those who rely on it. Integrating LiDAR technology, 3D Surveillance solutions provide a comprehensive view of the area being monitored with real-time monitoring and response, protecting critical infrastructure from damage and providing a more comprehensive security system. Advanced analytics and artificial intelligence Security personnel can identify and verify threats more easily and track the movements of individuals or vehicles, as well as respond to incidents as they happen. 3D Surveillance systems can be equipped with advanced analytics and artificial intelligence (AI) capabilities to detect patterns and anomalies that may indicate a potential threat. This can help to prevent potential attacks or accidents before they occur, as well as enable more accurate responses to incidents. Talent challenge Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols 3D Surveillance can also help tackle the talent challenge in the industry: Recruiting security professionals involves extensive background checks, and jobs in the industry are notorious for their low salaries, which results in high staff turnover. Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols and ensure reliable infrastructure protection. Additional security measures In many countries, more stringent legislation now mandates the implementation of additional security measures to safeguard critical infrastructure, particularly at a country's points of entry, such as airports and harbours. Protecting the perimeter is no longer enough. For instance, airport management must ensure that critical areas, including the space around aircraft and near unauthorised access points, are secure. While multi-layered screening of individuals at the perimeter is a valuable security measure, it must be complemented by smooth and efficient surveillance of the entire area, which can only be achieved through advanced technology. Different adoption rates 3D Surveillance technology is only beginning to gain traction in most locations, and adoption rates differ significantly from one region to another. For instance, Scandinavia and Eastern Europe have embraced 3D Surveillance to a greater extent than Western Europe. Regions with lower adoption rates will likely catch up as they seek to reinforce the security of their critical infrastructure, especially given the conflict in Eastern Europe. Vandalism and damage protection 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue 3D Surveillance offers reliable protection against vandalism and damage - major concerns for companies that rely on critical infrastructure. LiDAR-based, software-enhanced 3D Surveillance solutions provide real-time insights and enable automatic processing of the information so that operators can autonomously and quickly detect and respond to potential threats. These solutions are scalable and customisable, allowing companies to adapt their security measures to their unique needs and changing environments. 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue, and ensures compliance with regulatory requirements. Asset management and maintenance planning Beyond its security benefits, 3D Surveillance can help with tasks such as asset management and maintenance planning. It can help identify potential problems or maintenance needs before they become more serious issues by providing a real-time view of the monitored infrastructure. This can help to reduce downtime and keep critical infrastructure running smoothly. Real-time management The same technology can also perform volume monitoring tasks and thus facilitate the management of valuable resources such as bulk material, grain, wood chips, or chemicals. By scanning the stock 24/7 and automatically calculating stock volume updating records in real-time, this technology supports lean production systems and automated processing.
Nowadays the Internet of Things has become an integral part of business around the world. The enhanced functionality made possible by the Internet of Things (IoT) and associated technologies are responsible for many of the major changes seen across society today. Video surveillance Video surveillance is one area that experiences substantial evolution driven by IoT technology. The intelligent monitors and sensors of the IoT combined with emerging high-speed network solutions promise to improve the performance and capabilities of video surveillance systems. At the same time, the video surveillance system also enables the data of IoT applications more intuitive, effective, and practical. What Is the Internet Of Things (IoT)? Internet of Things is several physical devices connected, working, and sharing data in tandem via the internet. How can IoT devices work with video surveillance? The network video cameras can be connected and work with any IoT devices such as temperature sensors, humidity sensors, fire detection sensors, etc via the internet. And all the data from IoT devices can be overlaid on the video. See the image captured by one IoT video management system below: This allows these IoT machines to be “seen” in real-time. Incident management with video cameras To detect changes and mitigate threats like theft, vandalism, fire, intrusion, etc, video cameras must interpret effectively However, it needs more than just an internet connection. To detect changes in the environment and to mitigate threats like theft, violence, vandalism, fire, intrusion, etc, video cameras must also be able to interpret such incidents effectively. For this, they need to function in tandem with other systems like IoT-based alarms, alarm management systems, fire alarm systems, motion detection, etc, and trigger various actions, such as audible warnings, a pop-up video on the video wall, email, SMS, etc. Actuators While the cameras and sensors sense the undesired conditions in the environment, actuators are responsible for carrying out the actions to bring back the equilibrium. This not only ensures safety from intrusion but a number of other hazards that can possibly happen in that area. The devices can be trained to detect motion, light, objects, vibrations, change in temperature and moisture levels, smoke and fire, excessive carbon particles in the air, and so on, to ensure the security of the premise in every thinkable way. Not only do these systems provide security, which is the most obvious part of its operations, but it also gives you workable insights by analysing data gathered so far, assisting in improving the overall performance of the enterprise. IoT-based alarms Set IoT-based alarms, for example, users can set temperature alarm thresholds, when the environment temperature arrives at a certain alarm threshold, it will trigger actions to let users know what is happening. See the image below: With real-time remote monitoring and quickly detecting changes in the environment, users can adjust the facility’s condition and avoid any loss due to environmental changes, such as avoiding spoiling stock. That’s how the Internet of Things has diversified the benefits of a video surveillance system. Real-time insight Intelligent video surveillance systems can easily search IoT device data to identify environmental changes And at the same time, video surveillance systems make everything of IoT be seen intuitively. Intelligent video surveillance systems can easily search IoT device data to identify environmental changes, and easily found the location of different IoT devices and their corresponding videos on maps. Automated analysis of current conditions provided by IoT systems can generate real-time insight enabling a rapid response to incidents which makes the whole system more effective and practical. Predictive analytics Using the raw material provided by video feeds, predictive analytics can alert organisations to potential issues so they can proactively mitigate risks before they become problematic. That is how this enhanced IoT video surveillance system enables network cameras to be interoperable and function effectively with IP-based IoT systems to create a wholesome ecosystem of Smart Safety. Benefits of an enhanced IoT video surveillance system It can prevent disasters and ensure facility safety With real-time remote monitoring and control, facility managers can know and adjust the facility’s condition. Track stock as it moves through the facility. Consistently monitor the facility conditions and quickly detect changes in the environment to avoid spoiling stock. Act quickly on security alerts without the need to review footage. It can avoid unnecessary intervention for false alarms IoT video surveillance systems can help facility managers determine if an alarm has been triggered by an accident or threat without law enforcement or an in-person inspection. It protects critical assets from loss Safety and security issues can be costly. Real-time alerts and comprehensive visibility help business owners and facility managers identify risks. It makes informed decisions to improve processes Business owners and managers can improve security processes by collecting and analysing data from connected devices.
Security beat
For an enterprise, addressing cyber security requires that stakeholders have immediate access to critical information compiled from multiple sources and presented where and how they need it. Various data sources monitor the cyber security status of a company’s computer systems to provide real-time visibility. Aggregating that data into visual dashboards and presenting it to operators enables any cyber security problems to be flagged quickly and resolved. Software system enhances cyber security Userful Corporation provides a software system that enhances cyber security operations for an enterprise Userful Corporation provides a software system that enhances cyber security operations for an enterprise, enabling stakeholders to envision various cyber security factors, such as application security, network security, cloud security and IoT (Internet of Things) security. The software system empowers operators to respond more efficiently. Working in conjunction with a company’s existing IT infrastructure, Userful software combines datasets from diverse systems into a visual format and delivers the information to a desktop computer, a video wall, or even to a home office. Real-time visibility “It provides a new dynamic to how cyber security issues are resolved,” said Shane Vega, Userful Corporation’s Vice President (VP) of Product Marketing, adding “The individuals who have flagged a cyber security issue may not be the ones to respond. Having real-time visibility provides more value to the overall response.” A typical cyber security operations centre resembles a physical security command or emergency management hub – large video walls, individual desktop workstations, and operators that need to share information and respond quickly to any incident. Userful’s software helps in managing operations centres Userful’s software manages how data is presented in an operations centre environment, without relying on proprietary hardware, operating outside an end-user customer’s IT infrastructure. Managing operations centres is a core offering for Userful Corporation, including command centres of all types, from traditional network operation centres to emergency network systems to security systems. The ability to use one software system throughout an enterprise is appealing to companies that have historically grappled with proprietary and siloed systems. Solutions that are easy to deploy, manage and scale Cyber security professionals need solutions that are easy to deploy, manage and scale" “We are a platform that can be utilised across the enterprise,” said Shane Vega, adding “Cyber security professionals need solutions that are easy to deploy, manage and scale, so they can manage all the threats every day.” Compiling and displaying information to an operations centre has historically involved silos of proprietary audio/video (AV) hardware. Ironically, the hardware approach presents cyber security risks that undermine the very mission of protecting a company’s data and networks. The proprietary systems operate outside the company’s network infrastructure, and IT professionals do not have visibility into the systems. Security Orchestration, Automation and Response (SOAR) Instead of hardware, displaying information on Security Orchestration, Automation and Response (SOAR) can be accomplished using software running on off-the-shelf components, managed by the IT department and featuring all the cyber security protections required, throughout the enterprise’s network infrastructure. SOAR includes threat and vulnerability management, security incident response and security operations automation, enabling companies to collect threat-related data from several sources and automate the responses. Cyber security threats Possible threats might include an influx of packet generation, malware, someone seeking access to the network, or a malicious email. Various tools manage each threat, and each must be visualised. Because the threats are related, a comprehensive dashboard enables operators to create parallels and respond more efficiently. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware In the Userful AV-over-IP scenario, an IT department takes full ownership of the computers and subsystems installed on the network. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware. Companies always have an ecosystem of interconnectivity. Single platform/solution The single platform/solution also extends beyond operations centres to include meeting rooms and digital signage. All images are captured using existing protocols, such as Real Time Streaming Protocol (RTSP), HTTP Live Streaming (HLS), Web Real-Time Communication (WebRTC), and so forth. In contrast, the AV industry is hardware-centric and has been known to circumvent software approaches in order to justify selling more hardware. AV systems typically operate in terms of pixels rather than bytes of information and use proprietary software. Companies always have an ecosystem of interconnectivity Different departments in a company have historically installed their own specific AV systems, based on proprietary hardware, so that each department is siloed from the rest of the organisation. Dangers of random hardware on a network Random hardware on a network, beyond the reach of the IT department, can provide access points to the network for hackers and other cyber security threats. Each proprietary hardware system exists outside the existing security protocols of the enterprise and each represents a cyber security vulnerability. Some companies end up with five or six different operations centres that involve three or four manufacturers, all siloed. Software versus hardware Our biggest challenge is to get people to understand what is possible with software versus hardware" “Our biggest challenge is to get people to understand what is possible with software versus hardware,” said Shane Vega, adding “The industry is inundated with hardware, and the risk is the unknown. Customers may not be familiar with a software solution that can accomplish what they have historically depended on hardware for.” Userful Corporation works through channel partners (integrators), who assemble complete systems using Userful software and other components, such as video screens, large-format commercial displays, groups of tiled displays, projectors – any type of display with an input. Corporate policy specifies security at every level Userful’s corporate policy specifies security at every level, including user authentication, encryption, endpoint security, air-gapped servers, information security policies, General Data Protection Regulation (GDPR), and a solution built on industry-leading IT standards. To spread the word about Userful Corporation’s capabilities related to cyber security, the company will be participating in Infosecurity Europe 2022, taking place from June 21 to June 23, 2022 at ExCeL, London, United Kingdom (UK).
Audio-video technologies have historically been a silo in the enterprise, separated from the larger network infrastructure by their use of analogue, hard-wired and proprietary connections. Software-defined system However, AV devices such as video walls and corporate signage add more value to security and emergency response operations when they are connected to the larger IT network and can interface seamlessly with other systems. That’s the approach provided by Userful, which offers a software-defined system for end-to-end control of audio-video applications in an enterprise, using a web browser and standard industry protocols. The use of software avoids the need for proprietary hardware and the compatibility challenges of multiple hardware systems operating in silos. It also yields visibility and control throughout the system. Single software system The single software system grants IT, administrators, the ability to govern multiple platforms The single software system grants IT, administrators, the ability to govern multiple platforms, while providing individual departments access to the specific applications they need. The emphasis is on meeting stakeholders’ functional requirements using a system governed by the IT department. The data travels across the IT network infrastructure without being blocked by the use of proprietary hardware and cabling, for example. Digital transformation Avoiding the analogue (hardwired) approach enables enterprises to “digitally transform” the operation of their audio-video devices. The approach is especially useful at the intersection of security and digital signage. “We give the power back to the local IT administrators, who can govern the system and enable customers to govern their applications,” says Shane Vega, VP of Product Marketing at Userful. The company’s software aggregates video information and distributes it as needed to individual video displays. Real-time event monitoring The software enables various video devices to become a seamless part of the IT infrastructure. It also facilitates sharing of information throughout the enterprise, even in an emergency. In contrast, proprietary, siloed systems hamper the free flow of information when it is needed the most. For example, if there is an emergency or active shooter situation, video devices throughout an organisation can be leveraged to inform occupants about the details of the event in real-time and to provide actionable instructions specific to an occupant’s location in the building. Visual communications When security is integrated into a larger platform, it can spread the message visually throughout the enterprise Visual communications, such as digital signage, comprise a powerful extension of a security system that actively monitors threats, and offers the ability to communicate to a large group of people. When security is integrated into a larger platform, it can spread the message visually throughout the enterprise. Strategic messaging can guide building occupants to their best course of action during an emergency, whether it is to flee or to shelter in place. Situational awareness The software-driven IT system can aggregate information from multiple sources, such as video camera feeds or information from an access control system, and display it on a large video wall, for example. Free-flowing information promotes situational awareness in a control room, and enables immediate response, whether it’s to call the fire department, sound an alarm, or initiate a mass exodus of building occupants. IT software approach “It makes everyone strategically aware and sends the appropriate messaging to those who need it, rather than to everyone at once,” says Vega. Facilitating more effective operations centers is the “tip of the spear” of what Userful offers customers, he adds. The IT software approach simplifies video wall applications, which are becoming increasingly complex, by enabling content to be scaled, chopped, and aggregated to fit the demands of a display wall. An analytic might trigger the system to enlarge a camera view on the full screen, to send video to the police, or “take over” screens throughout a building to provide strategic messaging. Third-party integrations Designing video walls more strategically in an operations centre can help operators interpret information quickly Designing video walls more strategically in an operations centre can help operators avoid fatigue and interpret information quickly and efficiently. “Userful’s role in the display world is to make sure software can distribute the information despite the hardware,” said Vega. Userful works with third-party integration to add system functionality and automate responses. Software flexibility “We’re a platform that pulls in sources of information, maybe it’s a hundred cameras, and then we manage the entire solution,” says Vega. “We enable users to take data from multiple sources and send it to a wide range of displays, creating a repository of information.” “When you have a software-defined platform, you can extend the solution using the flexibility of the software into a system that cannot be achieved with hardware,” says Vega. “If people want to scale their system to multiple locations, we can add a source remotely.” Proactive responses to security “Security is an important market for everyone, paramount for any organisation,” says Vega. “Individuals are responsible for the safety and security of constituents and require a proactive, not reactive response.” “We can provide proactive responses because of the nature of AV-over-IP, which is interoperability. It can draw attention to threats and proactively communicate response plans.” Managed service provider The “software-defined” approach can help systems integrators position themselves as a managed service provider Getting away from siloed solutions should be a priority for any IT purchase by an organisation, says Vega. “We need to train end-users to take a holistic view and not to look at it from a siloed perspective. A fuller understanding helps them gain efficiencies.” The “software-defined” approach can help systems integrators position themselves as a managed service provider rather than just “selling boxes.” “Think about how you can partner with end-users over the long term,” advises Vega. Information-based automation “Think of technology as a holistic part of the business for better outcomes across the whole business. More information is better information, and integrators can help customers create automation that will provide more awareness.” The Userful proposition offers especially good value in transportation markets, such as ports and airports; and in campus environments, such as enterprise, higher education, and airports. In any scenario where there are a lot of screens, the system can distribute corporate and emergency messaging, whether on a baggage claim screen or a way-finder screen.
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cyber security, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analogue cameras. A higher percentage of commercial customers use mobile applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
Case studies
Melbourne Connect is a new ecosystem led by Melbourne University to provide a visionary precinct to collaborate on first class education, hands on training, and top-edge research. This district is on the edge of the Melbourne CBD with commercial and retail partner tenants, including technology, design, energy, health and major multi-nationals to create an epicentre of brilliant minds. EQUANS were engaged by Lendlease and Melbourne University to integrate all areas of the precinct with shared AV spaces for multiple tenancies and the Student Accommodation Building (SAB). The requirements for this project were to provide seamless, cutting-edge audio-visual collaboration spaces to cater for innovative, world-class research, education, and training. The Solution EQUANS took a tailored approach to installing a range of custom and bespoke AV elements Across the precinct buildings, EQUANS took a tailored approach to installing a range of custom and bespoke AV elements, maximising the ability for users to project and share content. In the School of Engineering, EQUANS installed custom and bespoke elements into the department. Especially in the Human Computer Labs where IDL group users utilise 3D mapping and augmented reality to further research and insight into their innovative future. EQUANS installs audio-visual equipment In the Science Gallery, which includes a multitude of spaces, EQUANS installed audio-visual equipment in the Ground Floor Exhibition, Theatres, Basement Gallery and over 43 lecture theatres and 63 workshop areas. To capture the attention of the younger generation and for a first-rate space to explore issues and ideas of the future, EQUANS integrated cutting-edge audio-visual equipment in all areas to create a world class education area dedicated to STEM. Similar projects were implemented in the Student Accommodation building and the Melbourne Connect Superfloor. The Benefit Through EQUANS, all audio-visual systems and spaces have been curated in a way to encourage a high level of collaboration and learning from the younger generation. Students, researchers, and high-tech companies will further understand, explore and achieve their goals in STEM. This multi-million-dollar AV project has also been designed to ensure it is future proofed and represent evolving and innovative solutions.
EQUANS were engaged by JLL to create a Digital Artwork Display using LED to showcase immersive content and create a high tech but nature-driven aesthetic at one of Melbourne’s premier business addresses. Digital Artwork Display The Digital Artwork Display had to encompass functional requirements, including LED video wall display, a display interface unit for image processing, LED time module control and remote monitoring, a digital playback server capable of displaying the artwork’s intense digital content, and a control interface accessible via web browser and mobile tablet device. The display’s aspect ratio of 32:9 presented a unique and challenging canvas for content creation. To ensure the highest aesthetic standards, any content had to be able to be displayed in its native aspect without stretching or compressing. The Solution This project is a real-time artwork with interactive waves, tides and currents from an island cluster This project is a real-time artwork with interactive waves, tides and currents from an island cluster in Australia. The PC that the artwork is generated from reads the tidal information in real time and converts it into the artwork. As the wind blows, waves ripple across the screen and during high tide the islands are covered with water. A digital set-top box allows display of commercial TV channels for breaking news and events, if relevant to the building occupants. The LED cabinets are mounted onto a custom aluminum-extruded mounting frame to ensure sub-millimetre accuracy required for an extremely flat image without visible cabinet lines. Sound system with 25 speakers installed To support the video art, a sound system with 25 speakers across three separate zones and 8 audio channels allows for optimal tuning and configuration. The audio resides on a QSC digital sound processor platform supporting network audio. This enables visitors to listen to highest quality sound from a range of audio sources. Control of the video wall takes place via a Crestron control system with a wireless touch panel that technicians can access from the foyer. All head-end equipment is powered by a 2KVA uninterrupted power supply, allowing soft power downs in case of power outages, helping extend the life of the system. The Benefit EQUANS have implemented ground-breaking technology at Freshwater Place’s newly refurbished foyer. The publicly accessible digital artwork provides an opportunity for all building occupants to engage with interactive, situational and customised technology. The 11x3m Silicon Core LED screen and audio system was a successful installation from EQUANS ANZ. Overview Key facts: 25 speakers across three separate zones & 8 audio channels Unique display aspect ratio 32:9
Matrix client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options, while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. Matrix VoIP Gateway The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs, but also strategically positioned it for future advancements and scalability.
360 Vision Technology, the UK-based manufacturer of ruggedised HD, radar, and thermal PTZ surveillance cameras, has been selected to supply its radar surveillance camera technology to a solar farm site in Ross-on-Wye, Herefordshire. Predator Radar camera Capable of generating 1-Megawatt of electrical power, the solar farm site was constructed by VARTEC EPC Limited for Lowther Renewables Ltd, to help offset the carbon footprint of its parent company, AJ Lowther & Son Ltd, which provides a range of steelwork, cladding, and refurbishment services, including steelwork structures catering for manufacturing, industrial, agricultural, commercial and equestrian buildings. In collaboration with VARTEC, a technical specification for the solar farm was jointly devised by Craig Carton, 360 Vision Technology’s Technical & Customer Support Manager, resulting in the specification of a 360 Vision Predator Radar camera unit specified to secure the entire site. Cost-effective perimeter solution With up to 200m radius/400m diameter constant surveillance capability, this provides a highly effective solution The 360 Vision Predator Radar camera unit deployed integrates radar technology with a Predator 1080p HD camera, to offer a cost-effective perimeter and wide area surveillance solution. With up to 200m radius/400m diameter constant surveillance capability, this provides a highly effective solution with which to secure the solar farm site, while minimizing costs compared to traditional CCTV camera solutions, with only one radar/camera unit being required. Surveillance cameras installation “The site’s remote countryside location, coupled with its significant slope and numerous access points along its perimeter, presented many challenges,” says Craig Vardy, Managing Director of VARTEC. “Lowther Renewables required coverage of the entire solar farm and it would normally have required several traditional security cameras to provide adequate surveillance coverage which would have been prohibitively expensive. However, we were able to negate the need to install several surveillance cameras by specifying just one 360 Vision Predator Radar camera unit to cover the same area.” Object detection Predator Radar works in all-weather scenarios (rain, fog, snow, mist) providing uninterrupted protection Designed for applications where wide area detection and tracking of moving objects is required, Predator Radar works in all-weather scenarios (rain, fog, snow, mist) providing uninterrupted protection by scanning 360° twice every second, to detect and automatically track up to 40 simultaneous objects. “At the site, on detection of an object by the Predator Radar camera, an alarm activation is sent to the NX Witness VMS via an I/O module." Live and recorded video and audio "NX Witness sends this alarm onwards to the Sentinel alarm management platform at the Doncaster Security Operations Centre (DSOC), where alarms are prioritised and evidence for the events is retrieved. This provides the operators with live and recorded video and audio, allowing them to make a quick and accurate decision as to the cause of the alarm." "Operators are guided through pre-defined manual and automated actions, based on the cause, to ensure a rapid response to the situation. The whole alarm handling process is fully audited allowing further analysis and reporting post alarm handling.” Real-time activation At DSOC, any Predator Radar camera alarm activations are overlaid on the screen to notify the operator DSOC detects, responds, and reports any threat activation in real time, meaning the solar farm is protected and immediately aware of any security issues. At DSOC, any Predator Radar camera alarm activations are overlaid on screen to notify the operator that an intruder has been detected, and tracking images are automatically sent to the operator’s screen for visual confirmation, all while the object is continuously and automatically tracked, whatever its path onsite. Dispersing threats On verification of an alarm threat, DSOC operators analyse the video data to make an informed decision; to either contact the police, a keyholder, or OCTAGA, Hereford (a key-holder/physical patrol guarding service who responds in the event of an incident needing attendance). Providing an additional deterrent and avoiding the requirement for a physical attendance to the site for every activation, the Predator Radar camera carries integrated LED white light capability, to help confirm and disperse threats in the hours of darkness. Cloud-based NX Witness VMS In addition to DSOC, monitoring of the site and events can also be performed via a cloud-based NX Witness VMS “Since its installation, the VARTEC installed radar-based camera system has run trouble-free and there have been no false alarms, thanks to visual verification from DSOC,” says Anthony Lowther, of Lowther Renewables. In addition to DSOC, monitoring of the site and events can also be performed via a cloud-based NX Witness VMS, where the transmitted video and data can be accessed remotely and a live insight viewed via a graphically rich desktop interface. Error-free security surveillance solution Craig Vardy adds, “Using the unique capabilities of the 360 Vision Technology Predator Radar camera, we were able to provide an error-free security surveillance solution while also saving the customer money on capital outlay by using just one radar unit, versus the several traditional video cameras that would have been otherwise required to secure this large solar farm site.” “We are very happy to have been able to support VARTEC and Lowther Renewables to secure an effective solution for their challenging wide area surveillance challenge at the solar farm site,” says Craig Carton of 360 Vision Technology. Radar camera solutions “Across the globe, our innovative radar camera solutions are supporting high-security, safety, and site management applications, from the protection of national borders to protecting utility and commercial sites." "This 5-acre solar farm project underlines the highly effective surveillance capability of the Predator Radar camera range.”
Yalova Terminal is a roll-on roll-off (“ro-ro”) port, meaning it is designed to carry wheeled cargo. It is Turkey’s 63rd border gate and began operations in 2017. It covers 80,000 square metres with a 500-trailer capacity and 16,000 square metres of storage, which includes an ADR warehouse for the storage of hazardous goods. On-site there are X-ray facilities, a laboratory for customs, offices, and break rooms for drivers. All of these facilities require continuous monitoring to protect staff, drivers, and the stock contained within the trailers at the port. Monitoring 24/7 The Yalova Ro-Ro Terminal team was looking for a way to intelligently monitor activities at the port and quickly search footage for investigations if needed. Because of the size of the port, an efficient way to store and deliver video footage back to the control room and server rooms was also sought. AI-enabled cameras reduce false alarms Cameras provide the on-site Yalova Ro-Ro Terminal security team with alerts only to events that require their attention The team turned to installer Arte Teknoloji and Hanwha Vision to provide a robust and AI-enabled video surveillance solution comprising 48 PNO-A9081R cameras, 17 XNO-C7083Rcameras, and 7 XNP-6400RW cameras. With AI analytics carried out on the device, the cameras provide the on-site Yalova Ro-Ro Terminal security team with alerts only to events that require their attention. This frees them up to focus on other responsibilities, while the cameras constantly scan for relevant objects or possible incidents that require human input. Potential false alarms from video noise, waving trees, moving clouds, and animals are ignored by the cameras, helping to reduce operator fatigue and frustration. Effective perimetre protection In particular, the XNP-6400RW PTZ Plus camera provides a feature-rich PTZ camera that is designed for perimetre protection. With AI-based object auto-tracking, operators can efficiently monitor the movement of objects while remaining hands-free to control other cameras. This analytics feature is supported by leading AI algorithms unique to Hanwha Vision. The camera captures evidence-grade images of objects up to a distance of 200 metres in all lighting conditions, with the help of adaptive IR technology which adjusts the angle of the camera’s IR LEDs to match the level of zoom. Object detection and classification for accurate responses Object classification based on attributes can also support quick forensic searches for future investigations The PNO-A9081R is a 4K bullet AI camera that can detect people, faces, vehicles, licence plates, plus their attributes. This allows operators to understand who, and what vehicles, are entering and exiting the site, particularly around the perimetre or rolling on and off ships docked at the port. They can quickly respond to possible intrusion or unusual behaviour, reducing the risk of stock, equipment, or vehicle theft. Object classification based on attributes can also support quick forensic searches for future investigations. BestShot feature The cameras also detect loitering, audio such as shouting or screaming, tampering with the camera itself, and shock detection. The BestShot feature automatically chooses the best images of an object, helping with bandwidth and storage efficiency as well as delivering high-quality, detailed images back to the control room. Robust video system Having the best security, that’s intuitive to use and easy to install, was essential" Eyup Tetik, Corporate Sales Manager at ENTPA ELEKTRONİK A.Ş. explains, “It was important to the Yılport Ro-Ro team that they had a robust video system that improved situational awareness and response times, especially after the devastating earthquake in Kahramanmaraş." "As a busy international Ro-Ro Port with millions of dollars of stock and equipment, having the best security, that’s intuitive to use and easy to install, was essential.” Steering ahead The installation is part of the new port area and the security team looks forward to reaping the benefits of the efficiency gains, greater awareness, more detailed investigations, and faster response times as a result of the AI-powered video system.
Sandwell Aquatics Centre in Smethwick is a state-of-the-art leisure centre that originated as a purpose-built arena for the 2022 Commonwealth Games in Birmingham. The facility played host to the highest number of medal events compared to any other, showcasing both swimming and diving competitions. The newly constructed complex included a competition pool for swimming and diving, a temporary pool for swimming and para-swimming warm-up, and an area dedicated to dry-dive training. Reclaiming the space Following its key role in the games, the original structure was reconfigured so it could be used by the local community from the summer of 2023 onwards. The 4000 temporary seats have been removed and fresh facilities tailored for community use have replaced them. The leisure hub boasts a gym with over 100 stations, a specialised ladies-only gym with 25+ stations, along with amenities such as a sauna, steam room, football pitch, two 4-court sports halls, three exercise studios, an indoor cycling studio, and a trio of swimming pools. Plant noise assessment The anticipated noise levels generated by various mechanical components within the plant room In the proposal documents, Mach Acoustics included two detailed acoustic reports – one addressing operational noise and the other focusing on plant noise. The plant noise assessment specifically outlined the anticipated noise levels generated by various mechanical components within the plant room, which includes several pumps and air handling units. Acoustic barrier with integrated louvre The acoustician's initial recommendation proposed an acoustic barrier with integrated louvre features to ensure adequate airflow while mitigating noise. However, a subsequent design amendment specified a solid acoustic barrier with slatted top sections to maintain airflow and enhance aesthetics. Additionally, steel louvre doors were specified for access. Absorptive acoustic barriers These barriers effectively reduce noise pollution originating from mechanical plant areas It has become standard practice to install absorptive acoustic barriers around new and renovated leisure centres. These barriers effectively reduce noise pollution originating from mechanical plant areas and operational compounds. It's not uncommon for heat pumps and air conditioning units to produce a continuous low-level hum or buzzing noise, which can disrupt neighbouring properties and create an unpleasant auditory environment for facility members and visitors alike. Game-changing solutions With prior experience in similar acoustic installations for aquatic and leisure centres, Jacksons Fencing successfully secured a subcontractor contract with Wates. They designed, manufactured, and installed customised acoustic fencing and gates across three elevations: The first elevation covered 16.5m and featured 2.8m high Jakoustic Reflective panels with 2.1m high timber slats above. The second elevation spanned 11m, incorporating 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above, 9.64m of 5.3m high panels, and 11.3m of 3.2m high panels with 2.1m high timber slats. The third elevation extended 16.5m and used 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above. Benefits of solid acoustic barriers These barriers offer an appealing noise reduction solution that conceals machinery and serves as a robust security barrier The different heights of the solid acoustic barriers were strategically chosen to benefit noise reduction, with timber slats enhancing aesthetics and airflow. The project also included matching double-leaf acoustic gates for access. In the first elevation, two apertures were left for steel louvre panels. The acoustic barriers, mounted on galvanised steel posts, were constructed from tongue and groove boards with a deep V profile, tightly slotting together to reflect noise by up to 28dB. These barriers not only offer an appealing noise reduction solution that conceals machinery but also serve as a robust security barrier, devoid of footholds and challenging to scale. Tailored security solutions Peter Jackson, Managing Director, of Jacksons Fencing says, “The Sandwell Aquatics Centre serves as a remarkable example of how facilities can undergo effective reconfiguration to align with their new objectives to ensure they are being utilised effectively." "This project showcases our team's dedication to tailoring security solutions precisely to the task at hand, achieved through the customisation of acoustic fencing. The outcome not only exudes a sleek and sophisticated appearance but also fulfils its vital function. Coupled with a reliable 25-year guarantee, this acoustic fencing ensures enduring noise reduction, cost efficiency, and sustainability.”
Round table discussion
When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillance systems to RFID tags used to avoid shoplifting, today’s retail and loss prevention strategies are more effective than ever. Beyond security, the newer technologies can also provide benefits related to merchandising, inventory control, customer service, and the list goes on. The combination of abundant data and artificial intelligence (AI) is a powerful one-two punch that is on the verge of reshaping the retail industry. We asked this week's Expert Panel Roundtable: How are new technologies transforming the retail and loss prevention markets?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products
Videos
Audio surveillance: Manufacturers & Suppliers
Maximising security and performance
DownloadThe truth behind 9 mobile access myths
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
Download