Hybrid surveillance systems
Secutech Thailand opens at the Bangkok International Trade & Exhibition Centre (BITEC), showcasing the latest advancements in security and fire safety and building solutions. The event features a concurrent Fire & Safety event and co-located Building and Architect Thailand, enhancing the exploration of integrated safety and design innovations. Adoption of approaches Visitors have extensive networking opportunities at and beyond exhibitors’ booths With 200 exhibitors from 14 cou...
Axis Communications, a pioneer in network video, has launched two new developments within the AXIS Camera Station (ACS) ecosystem: AXIS Camera Station Edge (ACS Edge) and AXIS Camera Station Cloud Storage. Both are designed to transform network video management through cutting-edge cloud capabilities. From now, these new solutions will join the AXIS Camera Station suite of products, reinforcing Axis’s commitment to delivering secure, scalable, and flexible solutions. Solution with ACS Ed...
The new IDIS Lite Series, including ruggedised IP67 and IK10-rated NDAA-compliant cameras—turrets, domes, and bullets—is a cost-effective video surveillance option for small to mid-size applications. The IDIS Lite Series includes a range of 2MP and 5MP cameras equipped with lenses that enable clear identification right from the centre to the edge of every scene. Value surveillance solution IDIS is offering the new range as a value surveillance solution that benefits systems...
Anviz, together with its key partner Solotec, participated in the 30th ESS+ International Security Fair, the most international and comprehensive security fair in Latin America, Central & South America, and the Caribbean, with exhibitors from 20 countries and regions around the world, attracting nearly 20,000 professionals from all sectors of the industry. In this exhibition, Anviz focused on the popular and innovative products of smart biometric access control and time & attendance so...
ThinCats, the alternative finance provider to mid-sized SMEs has supported Ranger Fire and Security with their latest acquisition of fire door business, Fire Door Specialists Ltd (FDS). First acquisition Ranger, which launched in February 2024, has already acquired four other businesses following Transitional Capital from ThinCats and private equity backing from Hyperion Capital – all in the active fire space – AFIL Ltd, Ignis Fire Protection Ltd, Syncro Group Ltd and IPH Fire Solu...
Digital Projection is debuting an all-new video wall designed exclusively for residential applications at CEDIA Expo 2024. Systems integrators can now offer their high-end clientele an exciting imaging solution that brings large-scale visuals to life. Featuring 4K resolution, HDR support, REC 2020 colour space, high contrast, Wi-Fi connectivity, and seamless integration with third-party control systems, Digital Projection’s groundbreaking Radiance Home LED Video Wall delivers exceptional...
News
Integrating 3xLOGIC’s INFINIAS Access Control and VIGIL Video Management solutions allows them to easily monitor security events in real-time. This combination offers a comprehensive security system and allows them to monitor and manage access seamlessly. Real-time monitoring One of the standout benefits of integrating VIGIL Video with INFINIAS access control is the real-time monitoring of events. Security personnel can view video footage from any door event or alarm as it happens, allowing for swift and effective responses to any incidents. View Live Video: Keep an eye on ongoing activities directly from the mobile app or browser. Instant Event Playback: Easily review and analyse incidents by playing back clips from past events. Push Notifications: Get instant alerts on the mobile device for access events or security breaches. Email Alerts: Receive images captured by the door camera via email from any event trigger. Security management with INFINIAS Cloud + VIGIL The INFINIAS Cloud platform, when paired with VIGIL Video integration, takes security management to the next level. It offers automatic software updates and provides remote access to the system, adding significant value to the security infrastructure. Automatic Software Updates: They handle updates for them, ensuring the system is always current without the hassle of on-site server maintenance. Additional Features at No Extra Cost: Unlock new software features without additional charges. RMR Revenue: Enable Recurring Monthly Revenue through continuous service agreements. Remote Access: Manage the system from anywhere, providing flexibility for them and their customers. Mobile app benefits Integrating VIGIL Video into INFINIAS mobile apps significantly enhances functionality and user experience, making security management more accessible and efficient. Live or Playback Video: Instantly access live feeds or review recorded footage. Unlock/Lock Doors: Control door access directly from the app. User Management: Easily add or remove users on the go. Push Notifications: Stay updated with real-time notifications about security events. Comprehensive solutions for various industries INFINIAS and VIGIL provide versatile security solutions suitable for multiple industries, ensuring that a wide variety of businesses can benefit from advanced access control and video monitoring. Integrating INFINIAS access control with VIGIL Video offers a robust, user-friendly, and cost-effective security solution. This integration provides real-time monitoring, simplified management, and enhanced functionality, ensuring flexibility and peace of mind for them and their customers. Embrace the future of security with this powerful combination and experience the ultimate in access control and video integration.
As the anticipation builds for the 2024 Paris Olympics, security concerns are heightened. While this long-awaited event will showcase the world’s most accomplished athletes, the safety of all participants and spectators is paramount. Extensive preparations have been underway to achieve this crucial goal. Security challenges The threat landscape in the historical context The security challenges facing the Paris Olympics are underscored by ongoing global conflict, an ever-evolving threat spectrum and a broad concern over the vulnerability of large gatherings to potential risks. Throughout history, the Olympic Games have unfortunately been a prime target for hostile actors. Throughout history, the Olympic Games have unfortunately been a prime target for hostile actors One of the most notable incidents occurred during the Munich Olympics in 1972, where the Israeli team suffered a tragic terrorist attack, resulting in the deaths of 11 athletes and coaches. The Atlanta Olympics in 1996 was the target of a bombing attack that claimed two lives and injured more than 100 people. This incident prompted a reassessment of security protocols and the adoption of stricter measures to protect athletes, spectators and infrastructure. The Rio Olympics in 2016 faced challenges related to crime and civil unrest in the host city, requiring extensive security measures to ensure the safety of participants and visitors. Few key areas These global, centre-stage incidents are a stark reminder that when it comes to venue security, nothing is more important than a comprehensive and layered risk mitigation program. Let’s look more closely at a few key areas to consider. Comprehensive Training: Many organisations fail to recognise the importance of ongoing training for personnel. From security officers to venue staff to volunteers, thousands of individuals involved in event operations must be trained in awareness, escalation, and response. Depending on the role, training might include emergency response procedures, crowd management techniques, or surveillance systems. Security Camera Monitoring: In the 2017 suicide bombing at the U.K.’s Manchester Arena, the attacker hid in a CCTV blind spot after carefully identifying the location from repeated reconnaissance trips. When planning large venue attacks, terrorists frequently conduct pre-operational surveillance to locate areas of security weakness and vulnerability. Thorough and diligent reviews of security camera footage are essential in the months leading up to high-profile events. Checkpoint Explosive Screening: Large-scale public events require many access points to ease guest entry and exit. Unfortunately, this creates access opportunities for hostile actors. X-ray screening at venue checkpoints is critical for the deterrence and detection of improvised explosive devices (IED), firearms and weapons. Rigorous screening very often dissuades a perpetrator from attempting to enter areas with a greater concentration of people and a detonation would have a larger impact. Explosive Detection Canines: Detection canines offer an effective, efficient and flexible solution for explosive and weapons detection at high-volume facilities. Canine teams sweep large areas and crowds for trace amounts of these odours in a short time with little to no operational or public disruption. Their presence alone serves as a strong prevention measure. Challenges and contingency planning These are just four of the many layers recommended for an effective security plan. While significant enhancements have been made in security preparations for large-scale public events over the decades, challenges persist. Security professionals must respond to the dynamic nature of the threat with flexibility. They must merge the lessons learned from past incidents with innovative solutions to protect people, property and brands. As the world eagerly anticipates the Paris Olympics, the organisers' steadfast commitment to safety ensures that athletes, spectators and staff can focus on the thrill of competition in a secure environment. To learn more about event security, speak with an Allied Universal subject matter expert.
Ajax Systems is proud to announce its victory at the PSI Premier Awards 2024. The company's KeyPad TouchScreen Jeweller device has been named the winner in the Access Control Product of the Year category. The PSI Premier Awards, organised annually by PSI Magazine, a top professional security media outlet in the UK, celebrate the pioneering technologies and businesses in the security sector. Winners are selected by security installers and systems integrators through votes on the PSI website. DESFire® technology and BLE support Device offers intuitive group management, a familiar Ajax app-like interface, and top-of-the-line security powers “We are excited to be named the winner of the PSI Premier Awards once again! The UK is one of our biggest markets, where Ajax company is making significant progress. The knowledge and expertise of UK security specialists have been invaluable to us, and we are immensely grateful to them for their support and today’s victory,” Valentine Hrytsenko, CMO at Ajax Systems. KeyPad TouchScreen Jeweller is a wireless keypad with a touch screen that seamlessly merges security and smart home device management. Its high-resolution display features all necessary controls, providing users with a visually stunning and high-quality image. The device offers intuitive group management, a familiar Ajax app-like interface, and top-of-the-line security capabilities, such as DESFire® technology and BLE support, which make it possible to control the keypad via smartphone using the Ajax app. PSI Magazine readers This is the fourth award that Ajax Systems has received from the British professional security community. Last year, the Ajax Academy project was recognised at the PSI Premier Awards as the “Manufacturer Training Programme of the Year.” In 2020, PSI Magazine readers selected MotionCam, Ajax’s indoor motion detector with photo verification, as the “Intruder Product of the Year.” Prior to that, in 2017, Ajax was named “Intruder Alarm of the Year” at IFSEC International, a pioneering integrated security event in London.
SailPoint Technologies, Inc., a pioneer in unified identity security for enterprises, unveiled a series of new features and capabilities in its Data Access Security and Non-Employee Risk Management offerings within SailPoint Identity Security Cloud. Updates to these add-on capabilities offer customers increased visibility and security across all varieties of identity types and their access to critical data, enabling a strong enterprise-class identity security programme. Data Access Security Designed as a cloud-native solution on the Atlas platform, SailPoint Data Access Security provides customers with holistic visibility of access to unstructured data such as text files, presentations, IOT logs, PDFs, and more. SailPoint continues to expand its Data Access Security capabilities with integrated data access certification, activity monitoring, and sensitive and regulated data classification. With new resources at their fingertips, customers gain improved visibility and deeper context on critical data to help secure sensitive information as a core component of their identity security programme. Updates include Organisations can review and certify access to sensitive, regulated, and critical data. These expanded certification capabilities help organisations easily identify over-provisioned access, meet complex compliance requirements and regulations, and ensure that only authorised users can access critical data – all while proactively managing secure access. Activity Monitoring: New activity monitoring capabilities enable organisations to track and analyse activities taking place on data assets in real-time, giving security teams improved visibility along with the tools they need to identify anomalous activity. Organisations can monitor activities and better inform governance decisions to minimise risky access and holistically reduce their attack surface. Sensitive and Regulated Data Classification: Customers can leverage out-of-the-box data classification policies and predefined classification rules within their environment to automatically classify and catalog regulated and sensitive data. This includes personally identifiable information (PII), payment card information (PCI), medical records regulated under HIPAA, and information covered under data protection laws like GDPR. Organisations can also catalog content based on internal identifiers and dynamic policies to secure intellectual property, parented information, and classified restricted content. Non-Employee Risk Management Non-Employee Risk Management enables customers to better manage identities and access for third-party non-employees SailPoint Non-Employee Risk Management enables customers to better manage identities and access for third-party non-employees, an emerging threat vector for enterprises. New updates drive better time-to-value and productivity for customers, helping to rapidly establish configurations for common non-employee identity types. Updates include Non-Employee Risk Management QuickStart Templates: Customers can use QuickStart templates, pre-configured setups, to address their non-employee onboarding, modifying, and offboarding identity requirements to drive efficiencies. Enterprises can instantly focus on managing non-employee identities effectively, enabling enterprises to reallocate critical IT resources. New Language Expansion: Non-Employee Risk Management offers additional language support for Traditional Chinese, Brazilian Portuguese, and Korean, providing additional global support for the non-employee identity solution. Improving security “SailPoint’s Non-Employee Risk Management solution has given us a single source of truth for a range of identities, from fixed-term contractors to machines,” said Evan Fraser, Enterprise Architect, Absa Bank Limited. “This complements our identity management processes for employees, streamlining onboarding and provisioning while also improving security.” Additional enhancements to SailPoint Identity Security Cloud Recent updates to SailPoint Identity Security Cloud help customers better manage and secure identities, with a keen focus on strengthening inactive identity management. New features include Management of Inactive Identities: Users can classify and define inactive identities via designated identity states within SailPoint Identity Security Cloud to better mitigate the risk of delivering access to the wrong identities. The new feature allows customers to designate identities “inactive” from select functionality in the product, improving user experience and performance. SailPoint expects customers will benefit by having an increasingly accurate view of their managed identities and better security in their solution. Account User Interface (UI) Improvements: SailPoint has a redesigned Identity UI to give users a scalable and comprehensive way to manage and access items through a single pane of glass. This compact and configurable new experience offers added capabilities, such as the attribute-copy tool, and is auditor-friendly, delivering an enhanced identity management experience to all customers. Enterprise-class solution “Enterprises need a holistic view into their vast and varied identity landscape and their complex access needs across every application, and the data within those apps,” said Grady Summers, EVP, Product, SailPoint. "These new Data Access Security and Non-Employee Risk Management updates further underscore our continued commitment to supporting our customers with an accelerated, enterprise-class solution, driven by the strong and dynamic governance needed to help safeguard every type of enterprise identity.” Availability All capabilities will be available to current customers this month (June 2024).
Educational institutions are witnessing an ever-growing technology integration, be it interactive whiteboards or online learning platforms. Technology is reshaping how we teach and how students learn. Let’s zoom in on a different branch of technology used in education - video analytics. Imagine a tool that captures video and analyses captured footage using artificial intelligence (AI). Video analytics in K-12 education Video analytics in K-12 education can gain insights and identify patterns that could help school safety, security, and operations. By utilising AI, education video analytics systems can detect anomalies, monitor campus activities, and aid in incident investigations. This technology goes beyond watching recorded footage, it’s about leveraging technology to create safer, more efficient learning environments for students. This article dives deeper into AI video analytics in school security so users can decide whether it’s right for them. Understanding AI video analytics It’s like having an intelligent security assistant who watches over the school campus 24/7 Video analytics monitors, analyses, and manages massive amounts of video using modern algorithms and machine learning (ML). It’s like having an intelligent security assistant who watches over the school campus 24/7. Let’s look at the critical components of a video analytics system. Users have cameras which are the eyes of the operation, capturing all the action. Recognise, identify and understand Then, some sensors pick up additional data, such as motion or sound. But the real magic happens with AI-powered analytical software. Video analytics is the brain behind the cameras, helping them do more than record footage. With AI in the mix, video analytics becomes even more powerful. AI adds a layer of brain power by teaching the system to recognise patterns, identify objects, and understand human behaviour. Applications in K-12 Education The use of AI in education in conjunction with video analytics can create safer learning environments where students can thrive and succeed. Here is how AI video analytics can be used in K-12 education: Enhancing school security AI video analytics constantly monitor the school’s activities to ensure the safety of its students and staff AI video analytics constantly monitor the school’s activities to ensure the safety of its students and staff. It can flag anything out of the ordinary. For instance, someone lingering in a restricted area or a sudden change in lighting. It can even recognise faces or license plates, helping to track down missing students or identify unauthorised visitors. By constantly scanning the premises, AI video analytics is a proactive measure against potential threats. This approach helps maintain a secure environment for teaching and learning. Facilitating incident investigation In the unfortunate event of an incident, such as bullying, theft, or vandalism, AI-based video analytics can expedite and streamline the investigation process. Analysing video footage can provide vital insights into events, assisting authorities in resolving conflicts and responding to situations quickly. For example, AI video analytics can provide valuable insights into a physical altercation. It can help identify the participants, trace their activities, and give critical evidence for disciplinary action or legal procedures. AI video analytics speeds up the investigative process by quickly analysing large volumes of data, ensuring a thorough and correct reaction to accidents. Supporting conflict resolution AI video analytics offers objective, evidence-based insights into interpersonal disputes or disciplinary issues. By analysing video evidence, it is possible to uncover the root causes of conflicts. Video footage can also estimate the severity of situations and support constructive solutions. AI video analytics can detect patterns of behaviour, monitor interactions, and provide useful evidence For example, in cases of bullying or harassment, AI video analytics can detect patterns of behaviour, monitor interactions, and provide useful evidence for intervention or counseling. With their ability to recognise subtle cues and behaviours, these systems help institutions efficiently manage problems. As a result, it can promote a secure and inclusive learning environment for all students. Enabling emergency response AI video analytics ensures a timely and coordinated response during crises, such as fire drills or lockdowns. Monitoring crowd behaviour and identifying potential threats or bottlenecks enables authorities to assess the situation and apply relevant safety measures. For example, during a lockdown, AI video analytics may follow individual movements, detect security breaches, and offer real-time information to first responders. AI video analytics improves the effectiveness of emergency response systems by analysing complicated circumstances and providing actionable insights. 5 benefits for educators and administrators Video analytics in K-12 education benefits students, educators, and administrators alike. Here are five advantages to remember: Enhanced safety and security AI-powered security solutions add an extra layer of protection by continuously monitoring activity and detecting potential threats in real time. These systems operate as vigilant watchdogs, identifying unauthorised individuals and detecting aberrant behaviour patterns to prevent situations from escalating. Efficient resource allocation Administrators can make better resource allocation, scheduling, and facility management decisions AI video analytics optimises resource allocation by giving helpful information on campus operations and utilisation. Administrators can make better resource allocation, scheduling, and facility management decisions based on various metrics. These metrics include student movement, facility usage, and traffic patterns. This results in more efficient resource use, better logistical planning, and increased productivity. Data-driven decision-making AI video analytics helps institutions make data-driven decisions by analysing large volumes of data quickly and accurately. For instance, these systems can help customise instructional tactics, identify growth areas, and personalise student learning experiences. This is made possible by video analytics’ actionable insights into student behaviour, academic performance, and campus dynamics. Similarly, admins can utilise data analytics to evaluate policy efficacy, monitor key performance indicators (KPIs), and promote continuous improvement throughout the school ecosystem. Proactive intervention and support Educators can help children achieve academically and emotionally. Video analytics can help monitor student behaviour patterns, spot symptoms of discomfort or disengagement, and highlight possible problems early on. This proactive approach to student support creates a positive learning environment where all students feel appreciated and encouraged to achieve their full potential. Streamlined operations and workflow AI-powered security tools can automate routine tasks like visitor access and tracking school attendance AI video analytics improves operations by automating regular tasks and optimising workflow processes. AI-powered security tools can automate routine tasks like visitor access and tracking school attendance. Automation allows educational institutions to focus on more strategic objectives. As a result, it can lead to smoother operations and higher employee morale. Challenges and considerations Implementing AI video analytics in K-12 education comes with its challenges. Here are the potential hurdles and considerations of education video analytics: Privacy concerns: Schools must establish policies and procedures for data collection, storage, and usage. They must comply with relevant regulations such as the Family Educational Rights and Privacy Act (FERPA). Also, implementing data encryption and access controls can safeguard sensitive information. Resource constraints: Limited budgets and resources can pose challenges when adopting AI video analytics. Schools can overcome this by exploring cost-effective security technology solutions. They can also leverage open-source software and seek partnerships with technology providers. Training staff and educators on using AI tools effectively may also help. Technical limitations: Schools should conduct thorough testing and pilot programmes to identify and address technical hurdles early Technical challenges may arise, such as compatibility issues and system integration complexities. Schools should conduct thorough testing and pilot programmes to identify and address technical hurdles early. Work with experienced vendors or seek expert guidance to help mitigate these technical risks. Ethical use of AI: Schools must prioritise transparency, fairness, and accountability when implementing AI video analytics. Educating stakeholders on the ethical implications of AI technology and cultivating an ethical decision-making culture are critical steps in promoting responsible AI use in education. Unlocking school’s potential with AI solutions by BCD With its capabilities, AI video analytics can transform K-12 education. Unlock the school’s potential with BCD’s AI-ready solutions tailored to the unique needs of educational institutions. Since 1999, BCD has been at the forefront of purpose-built video storage solutions. It partners with globally known security pioneers to provide AI video surveillance systems. With their security technology and commitment to customer satisfaction, schools can create safer, more engaging learning environments for their students.
Oakdoor, a pioneer in hardware-enforced security solutions, which is part of PA Consulting (PA), and Nexor, the pioneering specialist in Secure Information Exchange, have announced a strategic partnership to advance a high assurance cross-domain solution for secure data sharing. The partnership will start to create highly integrated software guarding and hardware verification solutions – with the aim of making access to data more secure and manageable for customers using multiple security domains worldwide. Oakdoor's UK CAPS-approved data Oakdoor has revolutionised data diodes in recent years, raising security standards and diode performance whilst reducing their complexity and cost. Meanwhile, Nexor has over 30 years of experience in delivering secure information exchange at the highest level. By working together and sharing their expertise, the two companies will work to make the most secure cross-domain solutions available to a wider range of customers. Nexor has over 30 years of venture in delivering secure facts exchange at the highest level The partnership will enable Nexor's GuarDiode to be combined with Oakdoor's cutting-edge data diodes to form a powerful cross-domain solution, which will deliver unparalleled protection and resilience against evolving cyber threats. This is because Nexor's software detects and removes malicious content by validating data against comprehensive information management policies. This allows controlled filtering of sensitive information assets into and out of critical systems. Meanwhile, Oakdoor's UK CAPS-approved data diodes are a critical hardware component for eliminating infiltration or exfiltration attack vectors within the cross-domain solution. Nexor's advanced software Tim Lunn, Founder and Head of Product at Oakdoor, said: "We are excited to announce our partnership with Nexor, which aims to bring this high assurance cross-domain solution to the market. By integrating Oakdoor's National Cyber Security Centre-approved diodes with Nexor's proven protocol and management software system, we are creating a more holistic solution for customers who are working at the highest classification levels." Tim Thompson, Managing Director at Nexor, said: "We are thrilled to partner with Oakdoor, part of PA Consulting, combining Nexor's advanced software with robust hardware to enhance market support and innovation. By harnessing exceptional engineering prowess alongside advanced software and hardware development, this strategic alliance positions both companies to pioneer more cohesive and impactful solutions, steadfastly advancing our pledge to excellence and customer satisfaction."
Expert commentary
The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximise your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that burglaries are most common at night, with 58% of burglaries occurring between 6 p.m. and 6 a.m. Taking steps to optimise your home’s security before the clocks go back this year will provide reassurance that your property is as secure as possible.” Five ways to secure your property: Get a monitored alarm installed: A visible alarm system is a strong deterrent to potential burglars, as criminals are less likely to target a home that is protected. In the event of a break-in, a monitored alarm will alert you, your keyholders and depending on the package you take out, the police, ensuring a swift response to an alarm activation. Light up the dark: Well-lit exteriors make your home less appealing to potential intruders. Install motion-activated lights around any entry points, particularly porches and gardens, which alert you to movement on your property. This will also prevent burglars from operating under the cloak of darkness and increase the chance of a passerby spotting suspicious activity. Trim your garden landscape: Thieves look for escape routes and hiding spots when deciding which homes to break into, making gardens with high, overgrown hedges more likely to be targeted. This is especially true in the darker evenings, so be sure to give your garden a thorough tidy-up to make your property less likely to be targeted. It’s also advisable to ensure any tools are locked away in sheds and garages that could assist a burglar such as ladders, or a garden spade to force entry. Be smart with your lights: Using smart plugs allows you to turn on a few well-appointed lights and radios or televisions from any location from your phone. Used in conjunction with an outdoor camera or video doorbell, you can have lamps plugged into smart plugs come on when motion is detected. Programming lights to come on at different times throughout the night will help to deter burglars by making your property look occupied. Purchase a smart doorbell or outdoor camera: Smart doorbells are an effective way to deter burglars as they provide evidence in the event of a break-in, package theft, or other suspicious activity around your home. They also notify you when someone is at your door reducing the chance of you being caught out by a late evening or early morning robbery. Further encroachment Smart doorbells also act as a deterrent to unscrupulous door-to-door sellers and con artists, as video footage is recorded. In the event of a late-night door knock, you can see and speak to whoever is at your front door, without having to open the door. ADT’s new outdoor camera also has two-way audio and a high-pitch deterrent siren so you can warn off anyone from your property to deter any further encroachment.
GSX 2023 marks a poignant moment for the security industry as an increasingly complex risk landscape converges with the acceleration of technology innovation. Emerging from this environment are three key trends that will dominate the conference and the future of the security industry: (i) the adoption of AI, (ii) the use of predictive analytics, and (iii) a hybrid global and local risk management approach. As Chief Security Officer of Crisis24, a GardaWorld company, I regularly advise clients on how these trends are evolving and impacting their security and risk management approach. Here’s how we can expect to see them discussed at the show next month: Trend 1: Artificial intelligence is the new industry standard. AI is this year's buzzword. While AI is not new to the industry, this year it has become a standard to operate with AI being adopted or expanded more ubiquitously. Legacy AI-enhanced security offerings that have been years in the making are becoming more advanced and are being integrated into expert analyst teams to leverage the best of both man and machine. Limitations AI augments the data processing ability; however, human-led intelligence is still necessary AI can generate unparalleled levels of data and insights, but it also has its limitations. AI does not have the emotional intelligence that can influence decision-making. For instance, our Crisis24 analyst teams know that every one of the intelligence alerts they provide to leadership may save a life or protect a business. AI augments the data processing ability; however, human-led intelligence is still necessary to effectively elevate knowledge of those threats through an organisation to incite action. Trend 2: Predictive analytics powered by AI will transform security operations. Predictive analytics enabled by AI will allow for more precise planning and execution of true emergency management. Those living or operating in conflict zones must be ready to spring into action and predictive analytics can help better evaluate risks, threat levels, and the probability of certain events. When I served in Iraq in 2003, our greatest challenge was operating in an unpredictable environment and navigating the many unknown threats. With these large-scale threats, it was difficult to account for the vast array of variables involved and ensure that all parties were protected. Broad and instant visibility Predictive analytics provides broad and instant visibility into numerous potential outcomes, impacts, and mitigation strategies for a wide variety of threats. When dealing with risks that are constantly evolving and quickly accelerating, the insights from predictive analytics can have a direct impact on risk management, mitigation strategies, and preparedness levels. Predictive analytics can anticipate the ripple effect that threats can have on organisations, their people, and their assets and enable security teams to plan. Trend 3: Risk mitigation is increasingly both global and hyper-local. A company’s workforce is often scattered across the country or the world, working from home or on the go Remote work and a flood of 24/7 data sources have driven demand for timely, accurate, and hyper-local intelligence. Where before an organisation may have had a handful of facilities around the world where its employees gathered, now a company’s workforce is often scattered across the country or the world, working from home or on the go. Preventive mitigation steps To keep their people and assets safe, business pioneers need to know what’s happening in all corners of the globe, while also easily accessing details on what is happening at the street corner level. How a business takes care of its people, including anticipating risks and taking preventive mitigation steps as well as responding quickly in the face of threats, can directly affect its reputation. Every company is in the business of safety and security when it comes to looking after its people on a global, national, and increasingly hyper-local scale.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security beat
IFSEC International took place over three days at the ExCel in London, presented alongside shows covering fire safety, intelligent buildings, facilities management, and safety and health. While perhaps not on the same scale as pre-pandemic events, the atmosphere was convivial and spirits high, everyone glad to be back amongst their peers in the industry. Predictably, the trending topics were steered by issues in the wider world: sustainability, moving services to a subscription-based model, and new ways of working inspired by COVID-19 safety measures. A place for cutting-edge innovation After a challenging couple of years, companies were keen to meet customers, showcase their products and reveal the latest innovations. Integrated Design Limited displayed their new Glassgate 400 Plus turnstile, a sleek design for the corporate market. Tony Smith, Major Accounts and Marketing Manager, Entrance Control and Turnstile Security, told SourceSecurity.com, “I feel trade shows are a very important part of IDL’s marketing effort. We are more than pleased to display alongside our peers and have customers make direct comparisons with our products and theirs.” Biometric access reader Biometrics, as ever, generated a lot of interest, including the European launch of RealNetworks’ new SAFR SCAN biometric access reader, which combines facial recognition, computer vision, and image capture technologies for a range of applications. “Overall, there was a really good footfall, and we met an excellent mixture of end-customers, system integrators, distributors, and consultants from both Europe and the Middle East who are exactly the types of people we were hoping to demonstrate SAFR SCAN to,” commented Charlie Bennett, Vice President UK & Europe – SAFR, RealNetworks. Access control systems going green HID Global is one company leading the way in the move away from plastics to focus on mobile access The eco-friendly trend and the need to be more sustainable is becoming a real force in the security industry, particularly in access control where there is considerable pressure to ditch the plastic. HID Global is one company leading the way in the move away from plastics to focus on mobile access. Gerald Grattoni, Physical Access Control Solutions Regional Business Unit Vice President at HID Global (part of the ASSA ABLOY Group), explained in a press briefing, “Making buildings smarter and more eco-conscious is high on the corporate responsibility agenda of many companies as the sustainability credentials of new buildings are now very important. With digitalised mobile identities there is less plastic waste and lower emissions.” Flexible, remote, and contactless Innovation in smart buildings is also being led by changes to how we work, live, and play, inspired in part by the recent pandemic. New technology is required to meet the needs of the hybrid workspace, as employers adopt more flexible working models and demand for contactless access control increases. Now, the most technologically sophisticated buildings are controlled by an app on a mobile phone, giving ease of access and full control without the need for plastic cards. Remote monitoring Advances in remote monitoring have escalated due to COVID-19, particularly in high demand in the health and education markets. Connecting via industrial standard network protocols allows for remote communication Ian Bridgewater, Director, Technical Sales Manager, TOA Corporation (UK) Ltd, explained further, “Connecting via industrial standard network protocols allows for remote communication. Working with specialist software developers has expanded this, giving greater flexibility to monitor and maintain systems remotely from a central hub.” AI-based autonomous access solution AI also has a role to play in this new high-tech, touchless world and various companies are utilising this technology. Alcatraz AI found IFSEC the perfect opportunity to exhibit their new Rock autonomous access solution. "We now live in a time in which AI can make precise real-time decisions at the door to authenticate or deny access using your face as a credential,” said Greg Sarrail, Senior Vice President of Sales at Alcatraz AI. “IFSEC 2022 allowed Alcatraz AI to demonstrate the speed and accuracy of autonomous access control. The number of qualified partners and end-users representing a broad international scope in attendance at IFSEC was encouraging.” Meanwhile, the Eagle Eye Networks stand attracted a lot of visitors keen for a demo of their new Eagle Eye Smart Video Search, which allows users to search for people, vehicles, or objects, and immediately find the exact video across all cameras in all sites. "AI and cloud are two trends that Eagle Eye, the media, and the security business community have been talking about for a while. We were excited to showcase Eagle Eye's new AI-powered technologies at IFSEC 2022," added Rishi Lodhia, Eagle Eye Networks Vice President and Manager Director EMEA. "Our stand was buzzing with activity and AI was the main topic of discussion for all three days. All in all, a great show." Investing in a secure future Engineers of Tomorrow gave apprentice finalists the chance to show off their skills in front of thousands of peers and professionals from the security sectors live on the show floor. The winners will go on to the WorldSkills UK (WSUK) LIVE competition – the nation’s premier skills, apprenticeships, and careers event. Although the products on display at IFSEC promised a contactless, digital future, this was a good reminder of the importance of the people who install and maintain these systems and the vital role of engineering apprenticeships in the industry.
The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal and long-term reliability, monitors the bulk power system through system awareness, operates the Electricity Information Sharing and Analysis Center (E-ISAC) and educates, trains and certifies industry personnel. Normal everyday operations of the system are the responsibility of utility owners and operators. Protecting critical infrastructure An attack by a disgruntled former employee, ideologically motivated activist, or a criminal could inflict significant damage Currently, a significant reliability threat to the U.S. grid is associated with squirrels and balloons, and not religiously inspired terrorists. However – and more applicable to grid operators – we have recently seen noteworthy interest in disabling or destroying critical infrastructure. Coordinated attacks can target the grid, and an attack by a disgruntled former employee, ideologically motivated activist, or a criminal stumbling across a “soft target,” could inflict significant damage. With an interconnected grid of over 450,000 miles of high voltage transmission lines (100 kV and higher) and over 55,000 substations (100 kV and larger), the targets of opportunity are endless. Data capture form to appear here! According to the Department of Energy, the number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year in lost output and wages, spoiled inventory, delayed production and damage to grid infrastructure. The number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year Large power transformers A large power transformer (LPT) is an enormous, custom-built piece of equipment tailored to customers’ specifications. They usually are not interchangeable with each other, and they are not produced for spare-part inventories; so if one blows, a lot of companies and homes could be without power for more than six months. They are not cheap, either. According to EEP (Electrical Engineering Portal), $10 million is a fairly average cost, but that doesn’t include transporting the gargantuan piece of equipment or installing it, which usually adds an additional 35 percent to the bill. Protecting power grids is essential to deliver electricity that serves millions of consumers. Transmission substations are a component of the power infrastructure that presents unique security challenges. These important facilities often sit out in the open, in remote locations, and were historically protected by little more than cameras or chain-link fences. According to EEP, $10 million is a fairly average cost for a large power transformer NERC/CIP guidelines The North American Electric Reliability Corporation’s Critical Infrastructure Protection (NERC/CIP) guidelines address security needs of electrical substations. Every facility has a baseline requirement for perimeter security protection around the site, although medium- and high-impact sites will have more stringent requirements. The geography surrounding sites – Is it an urban area or rural? Does the surrounding elevation provide additional lines of sight? – also impacts the types of systems they require. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities The U.S. power grid is divided into three sections: The Eastern Interconnection for states east of the Rocky Mountains, The Western Interconnection for states from the Pacific Ocean to the Rocky Mountains, and the smallest—the Texas Interconnected system—covering most of Texas. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities and they distribute power to homes and businesses, to millions of personal devices, lights, refrigeration, computers, and to other “loads,” that tap it. Inherited challenges According to the American Society of Civil Engineers (ASCE), the nation’s electric infrastructure is “nothing but a patchwork system” that has evolved wildly since the first substation was erected by Thomas Edison in 1882, on New York City’s Pearl Street. Contributing to the challenges of securing the grid are the crazily disparate ages and capacities of the grid’s equipment. There are many possible targets, too. Approximately 300 control centres around the country monitor voltage and watch the data from SCADA (supervisory control and data acquisition) systems, which are placed at transformers, generators and other critical areas. Ideally, this allows engineers to monitor the data for signs of trouble and then communicate with each other to deal with whatever is happening to the grid, but SCADA has cybersecurity issues.
Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organisations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command centre technologies, fusing critical data input from emergency calls and responder activity to enhance situational awareness. Electrical substations are particularly vulnerable (and in need of extra security) due to their role in power distribution and the nature of their equipment. The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. Data capture form to appear here! U.S. regulations In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-014 identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address CIP-104 specifically calls for implemented security plans that include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Manufacturers of video and other systems are designing products to serve the critical infrastructure market. For example, Dahua Technology offers explosion-proof cameras with a combination of rugged reliability and superior optics that is a fit for surveillance of explosive and corrosive environments, including chemical plants, refineries, and other facilities in the oil and gas industry. This explosion-proof series of cameras are housed in enclosures that are certified to the ATEX and IECEx standards for equipment in explosive atmospheres. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time. They are IP68-rated to prevent water and dust ingress. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time Video footage in extreme temperatures Another manufacturer, Videotec, offers a range of cameras and housings that provide video footage regardless of aggressive external factors, such as ice cold, scorching heat, desert sand, the force of sea or wind, total darkness, pollution, corrosion and even explosive agents. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sitesSightLogix smart thermal camera systems have been deployed to protect substations for electric utilities and other critical infrastructure facilities. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sites, ranging from copper theft to vandalism while also meeting regulatory compliance. At each substation facility, Thermal SightSensors are positioned along the perimeter, and are paired with a high-resolution pan-tilt-zoom camera for alarm assessment. When a Thermal SightSensor detects an intruder, the target’s location information is sent over the network to a SightTracker PTZ controller, which automatically zooms and steers PTZ cameras to follow the intruder. The target’s location is also displayed on a topology site map to provide real-time situational awareness. Alarms are sent to the utility’s 24-hour security operations centre, which will contact law enforcement in real time when unauthorised intrusions are detected. Integrated intrusion detection and lighting systems The Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system is simplifying security at one U.S. electrical utility company. For years, the utility company had integrated its perimeter intrusion detection and lighting systems. The company has now installed the Senstar LM100 which provides detection and lighting in one product and saves them over $80,000 per site. The savings are a result of the reduction of electrical requirements, conduit, grounding, and associated labor, as well as the removal of certain equipment from project scope that are required for the two-system integration. The Senstar LM100’s perimeter LED-based lighting acts as an initial deterrent. If an intruder persists and an attempt to cut, climb or otherwise break through the fence is detected, the closest luminaire begins to strobe, and an alert is sent via a security management system. The intruder knows immediately they have been detected and that their exact location is known by security and others in the vicinity.
Case studies
The university in rural Maharashtra is committed to providing a holistic and inclusive education that focuses on character building, intellectual growth, and community service. Its mission is to develop knowledgeable, compassionate citizens. With an emphasis on interdisciplinary studies, experiential learning, and cultural heritage preservation, the institution aims to foster creativity, innovation, leadership, and responsible global citizenship. Featuring one of the largest campuses in Mumbai, the university offers a diverse range of programs across nine different disciplines. Challenge/requirements The client faced considerable difficulties with their current communication system. The wired configuration demanded frequent maintenance, and ongoing problems with voice communication quality persisted. The primary challenges they encountered included: Problems with wired communication: The wired system experienced issues like corrosion, pioneering to a decline in communication quality. Call Quality: The communication system faced problems like dropped calls and interruptions during active conversations. Multi-location and Unified Communication Solution: Upgrading the infrastructure was essential to connect and unify various sites across the campus. Integration with Existing Infrastructure: The new solution had to be compatible with their current setup to bring modernisation. Redundancy: To guarantee minimal or no downtime, especially in emergencies, incorporating redundancy was essential. Solution Matrix, in partnership with Shreeji Comsec, designed a solution that greatly improved the university's communication capabilities. The key aspects of this solution are summarised below: The current infrastructure relied on copper PRI lines, which needed to be upgraded to IP. To support this transition, two Matrix VoIP-PRI gateways, the SETU VTEP2P and SETU VTEP4P, were utilised. The VoIP-PRI gateways are now compatible with two Matrix IP Phones: the SPARSH VP510 and SPARSH VP210. The IP connection can now be routed through SIP (TATA) trunks via the Matrix server-based PBX, ANANT. The server-based PBX, ANANT, provided seamless communication with integrated redundancy, effectively eliminating downtime. Results The solution enabled the university to consolidate multiple sites into a single communication network. Legacy systems were smoothly integrated with modern VoIP technology, optimising existing investments and enhancing the overall communication infrastructure. This upgrade notably increased operational efficiency. Here is a detailed overview of the solution: Multi-location Solution: Multiple sites were integrated into a unified, comprehensive communication system. Unified Communication Solution: Integrating with the server-based PBX, ANANT, facilitated seamless collaboration and ensured uninterrupted information transfer and reception. Investment Optimisation: The integration of SIP with the Matrix Solution, seamlessly incorporated into the existing network infrastructure. This approach maximised the use of existing resources and avoided the need for additional investments. Operational Efficiency: The redundancy built into ANANT ensured minimal or no downtime, facilitating a continuous flow of information and significantly enhancing workflow efficiency. This feature was crucial for maintaining critical communications and handling emergencies effectively. Modern Features: The office now benefits from advanced functionalities provided by Matrix Standard SIP desk phones, including the SPARSH VP510. These features, such as call-back and auto-answer over secure SIP communication, greatly enhance the university’s communication capabilities. The Matrix communication solution allowed the university to both enhance and modernise its communication capabilities, equipping them with advanced, state-of-the-art call features.
Athena Security’s Concealed Weapons Detection System was selected by Champions Club Texas to protect patrons, members and staff at a first-of-its-kind hospitality destination in Houston that features a full-service hotel, lounge and bar with Southern-inspired cuisine and private-membership poker. Located in Houston’s expanding Westchase community, Champions Club Texas is celebrating its grand opening as a destination offering something for everyone, from business travellers seeking comfortable accommodations with well-appointed amenities to locals looking for a unique night out. Weapons detection system Athena's Concealed Weapons Detection System (WDS)/Walk Through Metal Detector is engineered to detect a wide range of mass casualty threats like handguns, shotguns, and rifles without requiring individuals to stop as they pass through the detector. There is no need to have individuals remove phones, wallets, or other extraneous items from their pockets due to the proprietary multiple-sensor detection method. The system adheres to Federal Standards while allowing both auditory and visual alert options, as seen in the best practices of Homeland Security for WDS. The concealed weapons detection system is designed to scan walking at an average speed of one person per second. Unintimidating approach Athena Security is a solution that detects weapons upon entry and is one of the many layers of security “At Champions we are raising the bar in hospitality and gaming, and that includes ensuring the most comfortable and safe atmosphere for our valued customers,” said Trent Touchstone, Director of Security, Champions Club Texas. “Athena Security is a solution that detects weapons upon entry and is one of the many layers of security protocols in place at Champions that improves operational efficiency of our security team as a workforce multiplier.” Athena Security’s low profile, unintimidating approach is a welcome differentiator from historic metal detector tech by eliminating the need to check cell phones and keys, allowing for a better flow into the venue. Modest-full time security team Advanced analytics and management protocols allow for deep visibility and flexibility to maintain staffing levels providing the highest level of safety. Touchstone, a 28-year veteran of the United States Marshals Service Chief with a long history of threat analysis, notes that given the hotel and membership club will require 24/7 attention with a modest-full time security team, he appreciates Athena Security’s ability to provide a feature-rich entryway security experience with the ability to automate and accomplish so much remotely.
Like most stadiums worldwide, the Alsancak Mustafa Denizli Stadium suffers from vandalism and riots by individual fans. To be able to better identify and track perpetrators and thus reduce financial and non-material damage, the operator opted for a video security solution from the German manufacturer Dallmeier. The Alsancak Mustafa DenizIi Stadium in Izmir–named after former Turkish football player and current football coach Mustafa Denizli–is a multipurpose stadium that mainly hosts football matches. With over 15,000 seats, it is one of the medium-sized stadiums in Türkiye. Originally built in 1929, it was demolished in 2015 and reopened after reconstruction in November 2021. Up to 15% fewer spectators due to riots Outcomes have been painful, ranging from classic fines to the closure of an entire block of viewers In Türkiye, stadiums are usually owned by the Ministry of Sport, which then grants the rights of use to an operator. In the case of the Alsancak stadium, the operator is “Altay Izmir”, an Izmir-based football club that currently plays in Türkiye’s top professional league. The club, like so many other football stadiums, has had its fair share of repeated incidents and threats to spectators and players. These have included verbal abuse and even the throwing of objects onto the pitch. In addition to the intangible damage to the image, the consequences have been painful, ranging from traditional fines to the closure of an entire block of spectators–a loss of 1,000 to 2,000 spectators per home game, and that on a regular basis. How is image quality defined to recognise perpetrators? Under these conditions, the operators were looking for a solution that would allow them to reliably detect and track potential offenders. The tender specified a minimum resolution density of 144 pixels per metre (px/m), which is also required by law. This means that there must be at least 144 pixels in the camera image to represent every metre of “reality” in the stands. This value is between the “recognition” (125 px/m) and “identification” (250 px/m) qualities specified in the IEC EN 62676-4 standard for video surveillance systems. Only ten cameras to monitor the stands The Ministry of Sports decided to invite various manufacturers to a comparative test To find the most suitable solution for the Alsancak Stadium, the Ministry of Sports decided to invite various manufacturers to a comparative test. After receiving the proofs of concept (PoCs) of several companies, the owner chose a solution from the German manufacturer Dallmeier Electronic. In addition to around 140 single-sensor cameras for corridors, outdoor areas and entrances, only ten “Panomera®” multifocal sensor systems are required for the particularly critical grandstand surveillance. 39% more resolution than required The low number of camera systems required for grandstand surveillance is due to the patented multifocal sensor technology: Panomera® cameras combine the images from up to seven detail sensors and one overview sensor in a single camera system. This provides the user with a high-resolution overview of the entire area to be monitored, which acts as a single image of a vast environment. Within this overall picture, system operators can now open any number of detail views at the same time, while the overall scene is always available in high resolution–even during recording, which is essential for possible prosecution. This provides an optimal overview of the situation and ensures that all events can be followed in real-time, in high resolution and in detail. Thanks to this technology, a minimum of 200 px/m is now available throughout the Alsancak stadium instead of the required 144 px/m – 39 percent more than originally required. No surprises: Remote “FAT” and training from Dallmeier Türkiye Due to the COVID-19 pandemic, the stadium's technicians were unable to travel to Dallmeier's headquarters in Regensburg, Germany, to commission the system and attend classroom training. For this reason, the so-called Dallmeier Factory Acceptance Test (FAT) took place online. The entire system was set up, configured and remotely accepted in the FAT centre in Regensburg. The training of the technicians and operators was carried out by Dallmeier Türkiye experts on-site The training of the technicians and operators was carried out by Dallmeier Türkiye experts on site. Serkan Atalar, CEO of RESA Construction Electromechanical Inc. Co, the installer company that implemented the project, is very pleased: “Dallmeier's sincere and collaborative approach, as well as the high-tech products and after-sale support they offered were very impressive. We thank Dallmeier Türkiye for the great cooperation.” Author's quote “The customer is very satisfied with the Panomera® systems. The benefits are equivalent to combining a powerful megapixel camera with any number of high-resolution 'virtual' PTZ cameras. At the same time, the systems reduce the total cost of ownership for infrastructure, cables, masts, screens, workstations, etc.,” Serkan Atalar summarises. “Alsancak Stadium only needs three system operators with one monitor each. They also have two workstations for the police and management. The solution always gives them 100% control of the security situation in the stadium, allowing them to react immediately and reliably track down perpetrators. And all this at a low total cost of ownership and with minimal manpower thanks to the unique multifocal sensor technology.”
Located in Kerala, India, the Somatheeram Ayurveda Hospital with a Resort Ambiance is the best place for not only visual rejuvenation but also physical and mental rejuvenation. Through Ayurveda, Somatheeram provides a means to shed all worries, anxieties, and illnesses. With the objective of combining Ayurveda and Tourism, the Somatheeram Research Institute & Ayurveda Hospital was founded in the year 1985, thus making it the world’s first-ever Ayurvedic Hospital in a Resort Ambiance. The Somatheeram Group of Companies came into being with the efforts of the Founder Managing Director, and Architect Mr. Baby Mathew. Challenges Multi-location transmission proves to be an expensive affair if devices are not chosen wisely Somatheeram has multiple resorts, located at different locations. Multi-location communication can prove to be an expensive affair if communication devices are not chosen wisely. Their dependence on public service providers for communication added to their woes of communication between their resorts. To elaborate: Feasibility of existing telephony: Existing telephony became impracticable considering the frequent communication between multi-located properties. Managing different protocols: Interface with different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Absence of modern phone features: The lack of advanced features like abbreviated dialing, call pick up, and internal call restriction, prevented them from becoming efficient in day-to-day operations. Transition to modern communication with existing infrastructure: Their investment in existing infrastructure needed protection while also a provision had to be made to modernise the communication using existing infrastructure. Solution The solution offered was based on the fundamentals of multi-location communication solutions Matrix analysed the challenges of communications for Somatheeram, and crafted a solution that was the best fit. The solution offered was based on the fundamentals of multi-location communication solutions. This included the Matrix range of IP-PBX (ETERNITY GENX12S) and GSM Gateway (SIMADO GFX11 and SIMADO GFX11 4G) that optimised the feasibility of communication and helped the firm become more efficient. Solution includes: The Hybrid IP-PBX included ETERNITY GENX12SAC, which enabled them up to 240 Analogue users with 64 CO Ports. Another Hybrid IP-PBX included ETERNITY PENX, which allowed them access to 100 IP Users, onboard IP User Support, LDAP Client support, support of 4G VoLTE ports, COSEC Door Integration, and much more. The GSM gateway included SIMADO GFX11 and SIMADO GFX11 4G which enabled them to make and receive calls from analogue extensions. The capability to integrate with almost all industry-pioneering PBXs enabled them a smooth transition to modern communication while maintaining existing infrastructure. Results The solution so implemented enabled all properties to work as a single communication platform and proved to be beneficial for Somatheeram and its properties in more than one way. The Hybrid IP-PBX enabled them, unified communication facilities like Email to SMS, audio/video calling, unified messaging facilities, and multi-location collaboration features like UC client integration, one-number reach, etc. The Hybrid IP-PBX also enabled, investment optimisation through universal network connectivity, easy and centralised phonebook management through LDAP client support, mobility convenience through 4G VoLTE support, and much more. The GSM/4G gateway enabled them, GSM/4G connectivity to existing infrastructure, hotline extension dialing, emergency number dialing even in the absence of a sim card, etc. through secure network bridging.
Quanergy Solutions, Inc., a pioneering provider of 3D LiDAR (Light Detection and Ranging) security solutions, was chosen by a large municipality in California, USA, in order to bolster pedestrian safety in the city's underground railways where fatality risks and costly liability issues were of growing concern. Traditional video surveillance The California city’s management had been grappling with a substantial number of missed alarms within its underground railroad system due to the intricate terrain and challenging lighting conditions. The absence of alarms when individuals trespassed onto train tracks posed a significant liability issue, endangering lives and increasing operating expenses. Traditional video surveillance systems had further proven ineffective in these environments due to inconsistent lighting and various obstructions that made it difficult to maintain a consistent field of view. Quanergy’s comprehensive solution Quanergy hyper-accurate detection and tracking of individuals in the city’s railroad system By deploying Q-track, a seamlessly integrated solution that combines long-range 3D LiDAR sensors with advanced perception software, Quanergy enables hyper-accurate detection and tracking of individuals in the city’s underground railroad system, most importantly those individuals who find their way onto dangerous railroad tracks. Quanergy’s comprehensive solution also effectively eliminates alarm fatigue by significantly reducing false alarms. This enables operators to focus on real threats and receive actionable insights with hyper-accuracy, ensuring that no urgent alarms are missed, averting possible injuries or even fatalities. Quanergy LiDAR security solutions Thanks to Quanergy's solution, the city now reports that they have 100% accurate detection when pedestrians are on train tracks. Quanergy LiDAR security solutions are currently deployed at hundreds of critical infrastructure sites around the world, addressing a wide spectrum of mission-critical applications including perimeter intrusion detection, server rack and cabinet security, mobile security towers, mantrap/vestibule access controls, rooftop security, and more.
The Public Security Department is the law enforcement agency responsible for maintaining public safety, preventing crime, and upholding the law in the region. Established in 1873, the force has been instrumental in maintaining peace and stability in the area, particularly in counter-insurgency operations. In addition to its core operations, the department conducts community service activities to bridge the gap between the department and the public. The force works closely with other law enforcement agencies to ensure effective coordination and cooperation. Dedicated to upholding the rule of law and protecting the rights of every citizen, it is committed to building a safe and secure environment in the region. Business scenario The lack of centralised monitoring capabilities at the head of the department's office The department is divided into multiple zones, ranges, and districts, with each district housing several branch offices. However, monitoring these dispersed stations posed a challenge. The lack of centralised monitoring capabilities at the head of the department's office and inadequate infrastructure at the department branches could have helped with real-time updates and efficient communication. To address this, the department aimed to enhance surveillance infrastructure, enable streaming access to all stations, and establish a centralised monitoring system. These efforts would improve coordination, data management, and security services for the people of the state. Challenges Monitoring challenge: The stations are dispersed across multiple locations Lack of centralised monitoring capabilities at the head of department’s office Inadequate infrastructure at the stations for local data recording Hindered real-time updates and efficient communication across the network Solution A total of 70 cameras were installed with varying focal lengths and capabilities to cover 20 branches in the jurisdiction. Based on their requirement the experts suggested high-resolution 5MP bullet cameras with audio support to capture clearer images and for playback and investigation. The motorised varifocal lens and PTZ cameras can be manoeuvered remotely for better control over the cameras. Motorised varifocal lens and PTZ cameras can be handled remotely for better control To enable the streaming and recording of footage for a longer duration, eight-channel network video recorders (NVRs) with 1 SATA port (each SATA port supports 10TB storage support) were installed across 20 locations. These NVRs were connected to television screens using HDMI cables, enabling the streaming of live footage at local offices. Matrix SATATYA SAMAS For centralised surveillance, all NVRs related to Matrix SATATYA SAMAS use static public IP. The video management system was connected to the desktop for monitoring purposes and provided Matrix SATATYA VISION 24×7 surveillance on the go. The Matrix team also provided training to the officials on how to use the video surveillance infrastructure effectively. They were taught to leverage the system's full potential, including best practices for monitoring, managing, and analysing data captured by the system. Products offered SATATYA CIBR50FL40CWP: 15 Nos. 5 MP Project Series IR Bullet Camera with 4 mm Fixed Lens and Audio Support SATATYACIBR50MVL12CWP: 40 Nos. 5 MP Project Series IR Bullet Camera with Motorised Varifocal Lens and Audio Support SATATYA PZCR20ML25CWP: 10 Nos. 2 MP Pan-Tilt-Zoom Camera with 25× Optical Zoom and Audio Support Matrix SATATYA NVR0801X: 20 Nos. Eight-channel NVR with 1SATA Port Support Matrix SATATYA SAMAS Video Management System with 70IP Camera Licences and three Concurrent User Licences Benefits Matrix's video surveillance solution has empowered the department with real-time updates. The robust infrastructure enables centralised monitoring, enhancing public safety and quick response to incidents. Matrix's expertise and technical capabilities have significantly contributed to maintaining law and order in the region.
Round table discussion
Migrating to the Cloud can be a cultural shift for some organisations, especially when it comes to physical security systems. Challenges such as concerns about data security and compliance, cost management, and a skills gap can make adopting the Cloud seem onerous. But the benefits are there, aren't they? We asked this week's Expert Panel Roundtable: Will the impact of the Cloud on physical security integrators be net-positive or net-negative?
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are also being more closely examined, including the environmental impact of using plastics and other chemicals. We asked this week's Expert Panel Roundtable: How can the security industry contribute to protecting the environment?
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
Products
White papers
Access and security in the age of hybrid working
DownloadSecuring unmanned infrastructure at the network edge
DownloadCloud video and smart cities
DownloadSinaloa, Mexico: Connected cities are safer cities
DownloadHybrid hyperconverged systems benefit growing storage and retention needs
DownloadVideos
Hybrid surveillance systems: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download