In Security Magazine February 2020

Page 1

ISSUE 43 FEBRUARY 2020

Why CCTV has an image problem HOW THE INDUSTRY CAN HELP TACKLE THIS

8 INDUSTRY NEWS Latest developments in the industry

26 EYE OF THE BEHOLDER A look at campus biometrics

34 ETERNAL VIGILANCE

42 ADVANCED SURVEILLANCE

Edesix body worn cameras form part of the solution

Is a surveillance state the answer to terror?


Send or update keys

Revoke keys

Multiple keys

Collect door history

Openow™ is the intelligent mobile solution for access control Make your workplace mobile-ready with SMARTairŽ

Available for:

campaigns.assaabloyopeningsolutions.eu/openow

Experience a safer and more open world


26 Editor Chris Hewett editorial@mebmedia.co.uk Accounts Jay Kempisty accounts@mebmedia.co.uk Publisher Wayne Banks +44 (0)1622 201207 wayne.banks@mebmedia.co.uk

34

Website and Circulation Manager Kevin Villa website@mebmedia.co.uk Design and Production Charles David production2@mebmedia.co.uk In Security Magazine is published 5 times a year by MEB Media Publishing (UK) Ltd 13 Princes Street Maidstone Kent ME14 1UR United Kingdom Tel: +44 (0)1622 201207, info@mebmedia.co.uk www.mebmedia.co.uk Articles and art may not be reproduced or reprinted without the express written permission of the publisher. Exclusion of Liability Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions. Copyright Š MEB Media Publishing (UK) Ltd 2019, all rights reserved.

Contents 4 Cover Story - Why CCTV has an image problem How the industry can help change perceptions around CCTV 8 Product & Industry News Latest development from the security industry

38

30 Command, control & intelligence Traditional manned security with technology 34 Eternal vigilance Edesix body worn cameras form part of the solution

22 Year of opportunity Hanwha highlights major advances in technology

38 Flexibility is the name of the cloud game How cloud technology fits a range of access applications

26 Eye of the beholder A comprehensive look at campus biometrics

42 Advanced surveillance Is a surveillance state the answer to terror?

IN SECURITY | November 2019 | 3


COVER STORY

Why CCTV has an image problem Tim Raynor, Video Product Manager at ADT Fire & Security, explores how the industry can help change perceptions around CCTV

T

he theory of the panopticon is simple: a circular building of cells hosts a single tower in the middle enclosing a watchman. While the watchman, in theory, could always be watching, those in the cells cannot see if, or when, the watchman is observing them. To those in the cells, there is always a possibility of being under surveillance. While this theory was originally used as a method of control in prisons, the theory is one that has been adopted by governing powers for centuries.

4 | February 2020 | IN SECURITY

However, as technology has gotten better, surveillance and methods of crowd controlling have gotten smaller and more ingrained into infrastructure, nearly invisible – save for the obtrusive CCTV camera in the corner shop. The CCTV camera, both residential and in business, have replaced this 18th century idea as the modern alternative. From a neighbour’s CCTV camera outside their front door to those situated on street corners — this idea of panoptic power is still very present in these modern times, however, isn’t restricted to a

watchman’s tower. There has always been social commentary on surveillance, from 1984 to TV’s Big Brother. However, with the cultural pervasiveness Netflix’s Black Mirror and the like, the public are more wary in terms of technological security innovations, and rightly so. If all one knew about security surveillance is what they’ve seen fantastically portrayed on screen, it’s no wonder why there’s a level of mistrust at present. Paired with recent smart home hacks, the public's views on CCTV security have


been given real-world examples. Consumers are putting thought and consideration into the technology used to protect their homes and loved ones. While these breaches and hacks are things which come with the territory in our industry, especially in such an innovative time period, consumers expect — and deserve — perfection from the products and services they invest in. There is a general distrust among the public when it comes to CCTV. Big Brother-esque surveillance is perpetuated by pop culture phenomena like Netflix’s Black Mirror, which aren’t aided by recent hacks and scams proliferating within our industry. Through all of this, how can we as an industry tackle these misconceptions and help re-instil confidence in our products and services in both residential and business security? With an estimated 5.9 million cameras in existence across the country, it’s common knowledge that CCTV is likely running in most public spaces. However, it shouldn’t be taken for granted that the public are just naturally/inherently aware they are possibly being recorded on various CCTV devices. What devices are actually in operation? Who owns those devices? Who is viewing this footage and how long is it being stored? It’s not likely that those who frequent businesses are going to refuse to enter a shop until they have clear answers, however, in order to combat public misconceptions surrounding CCTV, it’s necessary for businesses to provide as much information and transparency surrounding CCTV operations as possible. While the security industry and lawmakers need to lead by example and offer honest, easy to understand explanations surrounding codes of conduct and advice, business owners should to be as clear as possible with the public to build trust. There are ample resources available for business owners surrounding CCTV regulations and laws, however, as experts in our craft, the security industry should be the first port of call for those with questions or concerns. Transparency around the residential use of CCTV is less clear and more at the discretion of the

customer. The Data Protection Act doesn’t apply to CCTV on personal property, however, if the footage captures someone passing by, not on the property of the owner, then the Act would apply. With recent examples of residential CCTV capturing occurrences at other residences or public spaces, it may be in the best interest of the homeowners to have a visible sign posted clarifying that CCTV is in operation, at the very least to legally cover them in the case any compromising footage is captured. There have also been discussions in various cities around the world calling residential CCTV cameras “the new neighbourhood watch” — pushing the boundaries even further by partnering with local law enforcement to cooperate with any investigations in which private residential CCTV footage would be useful. In these cases, it’s unclear whether the footage in question

would be given over by the security company, or rather, something the customer would need to opt in or out of participating in. Regardless, we as an industry should ensure that whoever employs our devices and services is aware of these situations and potential advancements. In order to correct misconceptions perpetuated by the media, the public should hear about any new security news from the industry first, and we need to be prepared to quickly comment on any breaking developments in an honest and compassionate manner. As well as being transparent about when CCTV is in operation, who is seeing the captured footage, and how long it will be stored, the public also should be educated on their rights surrounding CCTV, and additionally, the reasoning behind CCTV and facial recognition being used in public spaces. While it isn’t necessarily the responsibility of the

IN SECURITY | February 2020 | 5


security company to ensure every consumer understands the rules and regulations surrounding CCTV, if we as an industry are reliant on public support for upcoming innovations in security, i.e. facial recognition and AI advances, we need to do everything we can to make it as easy as possible and accessible for both consumers and non-consumers to understand CCTV. Whether this is on a one-to-one basis with new and existing customers or on a larger scale, our industry needs to be our own advocate and educate the public on how and why CCTV is beneficial to them personally, but also society as a whole. CCTV isn’t the only way people are surveyed in modern times — public wi-fi, mobile phone app location sharing, and tapping in and out on public transportation are all ways in which people are constantly being tracked and monitored. However, as CCTV is more or less the most visual way of tracking, it has become the beacon of anti-surveillance culture. In addition to transparency and a conscious effort to educate the public, the security industry needs to be in constant communication with our customers, and the greater public alike. Building trust between 6 | February 2020 | IN SECURITY

those who chose to use our products, as well as any potential customers, is key to navigating any misconceptions they may have from media about our motives. It can be as simple as using our communication methods to send out easily comprehensible information in an engaging way through videos, infographics, or fun quizzes. Our interactions with our customer-base should not largely be financially-motivated — we should be building value and making a concerted effort to provide information to the public which could only come from CCTV experts. By providing this type of information to both consumers and non-consumers, we as an industry can show our value as experts in our field. While we may not have the capacity to truly have an open door policy, it’s important that we show the public that we aren’t working against them to invade their privacy, but rather are working alongside them to provide them with technology to feel as safe as possible. While we can’t convince everyone that misconceptions surrounding CCTV should not be taken seriously, through transparency, education and constant communication, we can begin to bridge the gap between what the

public see portrayed in the media versus what our industry tries to accomplish. Our industry needs to come to terms with the fact that we have to advocate for ourselves. We need to take the responsibility to ensure we address the fears and concerns had by the public over very real issues like recent home CCTV hacks. These misconceptions won’t be corrected overnight, however, in this modern time of technological innovation, as well as societal uncertainty, the security industry needs to take it upon itself to do everything possible to help re-instil confidence in our products and services in both residential and business security. Tim Raynor has a career in the security industry spanning over 25 years, as a Video Surveillance Product Manager at ADT, Tim is responsible for the firm’s video surveillance products across the UK and Ireland. With a passion for innovation and technology, Tim is always looking at ways in which new technologies can improve the sector he works in. For further information please visit www.adt.co.uk


IN SECURITY | February 2020 | 7


PRODUCT & INDUSTRY NEWS

New levels of night visibility with the Panasonic Infra-Red Ptz security cameras Designed for clear night-time visibility, intelligent functionality and low total cost of ownership Panasonic’s latest i-PRO Extreme PTZ Infra-Red security cameras set a new benchmark in night-time visual quality and intelligent functionality, packaged in a device designed for reliability and low-level maintenance to deliver lower total cost of ownership. There are two models in the IR PTZ camera range: the WV-X6533LN model with a powerful 40x zoom and the WV-S6532LN with 22x zoom. Night-time visibility Capturing clear images for use as evidence in low level lighting and at long distances can be a challenge in any outdoor security environment. Able to capture low light evidence even at distances of up to 350 meters in a zero lux environment, the cameras improve visibility by mixing visible and IR LED lighting through a new auto focus with visible light cut filter. This means that multiple light sources in one frame are no longer an issue. To provide clarity even at long distances, the camera has an optional high-powered 40x optical zoom function combined with Intelligent Zoom Stabilisation to absorb vibrations and capture a stable image even at distance. A 30 degree elevation angle enables sloping roads, tall buildings and difficult areas such seating areas under stadium roofs to be easily covered by the cameras. Rain and dust can badly affect the quality of images and increase the need for expensive regular maintenance. To combat these challenges, the camera lens comes with a hydrophilic ClearSight lens coating which is resistant to the build-up of rainwater, stains, and dust accumulation. A new inbuilt defroster also ensures cystal clear images by preventing condensation or ice accumulating on the lens in extreme weather conditions.

8 | February 2020 | IN SECURITY

Cyber protection and bandwidth control To ensure CCTV footage is kept safe from unauthorised external access, the cameras are under vulnerability assessment and come with Digicert (Formerly Symantec) certification, which includes end-to-end data encryption and FIPS140-2 CAVP compliance without any built-in backdoor access. High resolution security camera systems can quickly have a negative impact on an organisation’s IT infrastructure with large network data and storage requirements. The Panasonic IR-LED PTZ cameras come with a range of smart compression functionality to reduce this business impact. The camera uses H.265 compression with Panasonic’s latest smart coding technology to reduce network bandwidth use and storage requirements. Auto VIQS automatically determines areas with and without motion and reduces the data volume of those without motion. The camera also has built in Smart Facial Coding, which detects and records faces in high quality. Smart Analytics included A security camera can act as a deterrant but its real potential can be achieved when combined with intelligent applications that free-up operator time by automating functions and notifying when pre-defined alerts are triggered or action required. A license for this Intelligent Video Motion Detection (i-VMD) functionality is available free-of-charge, enabling users to bring intelligence to their security cameras. i-VMD can be used to zone surveillance areas and scan for predefined or unexpected behaviours. This could include detecting and notifying if someone enters or loiters in an area, removes objects or, for example, if a vehicle drives the wrong way down a one-way street. For more information visit Panasonic


Gallagher wins cybersecurity award

Gallagher is pleased to announce their Security Health Check cyber security tool has received a Gold award for Vulnerability Management in the 2020 Cybersecurity Excellence Awards. The award recognizes companies, products, and individuals that demonstrate excellence, innovation, and leadership in information security. Gallagher’s Security Health Check is an industryfirst software utility, provided free of charge to all Gallagher customers. Security Health Check provides an automated method to identify vulnerabilities within a security system, assesses the severity of the threat, and provides specific recommendations to mitigate the risk. “We’re proud to receive industry recognition for

our Security Health Check tool,” says Steve Bell, Chief Technology Officer at Gallagher. “Cyber security is a major concern for organizations around the world. With Security Health Check, we hope to empower our customers with the tools and information they need to ensure their systems stay safe.” Securtty Health Check also received a platinum award at the 2019 Homeland Security ‘ASTORS’ Awards for Best Cyber Security Risk Management, and was announced the winner of the Cyber Defense category for Security Today’s New Product of the Year 2019 Awards. For further information please visit www.gallagher.eu

SALTO releases updated MyLock customization tool

SALTO Systems has upgraded MyLock, its online lock customization tool that allows users to choose and see potential door configurations before final architectural project and design definition. With MyLock, users can select a SALTO electronic lock model, door type, and choose from a broad range of colours, finishes, handles and functions. The new MyLock design has an improved user experience for

web as well as mobile access and adds important new capabilities, including configuring accessory products like wall readers. SALTO Space access-controlmanagement software and SALTO KS keys as a servicecompatible product ranges also are included. Whether it’s a change model, finish or door type texture, SALTO MyLock users can easily navigate through a menu to make their selection and customize the chosen model as much as possible. Users can choose between different door standards and technology platforms, like SALTO Space accessmanagement software or the SALTO KS cloud-based solution, and opening mode options like contactless smart card, mobile key or keypad. Once completed, a MyLock user can preview and download 3D and 2D files, including BIM files, in a variety of industry formats. To see what MyLock can do for you, visit https://mylock.saltosystems.com IN SECURITY | February 2020 | 9


STANLEY Security protects servers with biometric access control

STANLEY Security, one of the UK’s leading security providers, has installed a biometric access control system at beverage company Finlays’ Pontefract site to protect its server rooms. A company with over 265 years heritage, Finlays owns and operates tea estates, extraction facilities for tea, coffee and plant extracts, packing facilities and R&D laboratories across four continents. Finlays already had a PAC access control system in place for exterior doors, and number code locks were fitted to the doors of their server rooms but, reviewing security, Finlays wanted to improve the level of security for the latter. The key requirement was to ensure access to the server rooms be controlled by Finlays IT department only. IT staff work standard office hours so should access be required to the server rooms outside of this, the code for the locks would have to be shared with others or a member of the IT team would have to return to site. Finlays had ruled out a card/tag based access control system due to the inherent issues with lost, stolen or borrowed cards, and had decided a biometric system would be the right solution for them. A number of security companies were approached, including STANLEY Security, which were awarded the contract. “It’s a name we knew and we have a lot of STANLEY product on site,” states Stephen Firth, Finlay’s Group Senior IT Support Engineer. “We also have a PAC system which shares the same software that the STANLEY biometric system runs on, so it meant we could easily add to the existing system and view both 10 | February 2020 | IN SECURITY

using the same software, although they are run as stand alone systems for added security.” STANLEY Security installed ievo® biometric fingerprint readers to four server room doors at Finlays. The system features advanced image reading sensors that take a detailed scan of a finger from the surface and subsurface levels of the skin, to capture a highly accurate digital image whilst protecting against fake and spoof fingerprints. Specific data from the image is converted into a digital template used for fingerprint identification. Providing a user presents a finger that matches a stored user template, then access will be granted. ievo captures clear, clean images, even when surface features are absent or hard to distinguish due to age, dirt, finger pressure and skin or environmental conditions. Finlays are pleased with the new biometric access control system as it provides the company with the security required but also convenience, as Stephen comments: “now, IT has full control of who enters the server rooms and there is an audit trail. We don’t have to worry about who has keys to the IT office and who knows the code for the server rooms door locks. What’s more, IT can open any door on the system remotely should it be required, rather than having to return to site. With one of the racks on our server belonging to someone else, that’s an important consideration should they need to gain access out of office hours.” For more information on STANLEY Security, please go to www.stanleysecurity.co.uk


WOULD YOU TRUST TODAY’S SECURITY WITH YESTERDAY’S TECHNOLOGY?

Upgrade to Seos®: The Next Generation of Credential Technology Security needs have evolved, with technology maturing along the way to counter growing threats. But when it comes to physical security, most organizations continue to use legacy access control systems that leave them open to unnecessary vulnerabilities. Meet Seos, the next generation of credential technology from HID Global. Thanks to highly advanced encryption and a software-based infrastructure, Seos secures trusted identities on any form factor and can be extended for applications beyond physical access control. Upgrade to Seos and leave legacy technology behind. Powering Trusted Identities

|

Visit us at hidglobal.com/seos

© 2018 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks or registered trademarks of HID Global or its licensor(s)/ supplier(s) in the US and other countries and may not be used without permission.


5 ways access control matters in your coworking space unexpected occurs or their valuables go missing. An access control system helps you sort it out quickly and efficiently. Because everyone carries personalised credentials — and you can order instant audit trails using access system software — you quickly find out who went where and when. Investigation is easier.

Most likely, tenants and visitors to your coworking space value agile, modern solutions. In other words, pretty much the opposite of mechanical lock-and-key technology. Thankfully, there is an intelligent security alternative that won’t blow your budget or create renovation chaos. One forecast suggests flexible workspaces in the EMEA region will number around 17,000 by 2022*. Coworking provision is a dynamic market, with increasingly fierce competition for a user base that knows what it wants. The right access solution helps your space stand out from competitors and can deliver real benefits for users and the way they work. Smarter space use Many creative and tech-oriented coworkers demand round-the-clock access. Indeed, according to the Harvard Business Review, the sense of control this flexibility gives is one reason people thrive in coworking spaces**. If you have an access system you can manage remotely, from a PC or smartphone, staff need not be on-site to manage people coming and going 24/7. An intelligent access system can also feed back critical business data in real time. Who is using your space? And when? The more you know, the more likely you will make better business decisions. Safer belongings, slicker incident handling Open, collaborative coworking involves lots of expensive tech and personal items lying around. In the words of one report by commercial property experts JLL, “While coworking spaces are perhaps safer environments to leave equipment unattended than your typical coffee shop, companies still risk a loss of equipment.”*** You can maximise security and minimise space users’ risk with effective access control. Coworkers will not rent desks where intrusion is easy — and you do not want to operate a space with a reputation for petty theft. Imagine the worst happens to a tenant: something 12 | February 2020 | IN SECURITY

Cutting out cutting keys In any sizeable workspace, standard physical keys are difficult to track without a dedicated key management system. Some types of physical key are relatively straightforward to cut without permission. How much time do you waste when a key is lost or stolen? Changing a standard mechanical lock is time-consuming and expensive. When you install an access control system, one click cancels any “key”, key-card or smartphone credential. You can program and reprogram your door devices as many times as you like. You’ll never change a lock again. Room to grow — or change your mind Around two-thirds of coworking providers expect to expand their workspace in the future****. The good news is wireless access systems like ASSA ABLOY’s SMARTairÒ are almost infinitely flexible; you can bolt on new areas, easily move locks around, or add new sites as you grow. Wireless access control helps you change the security status of a door at any time — or expand your coworking area to another floor cost-effectively. Add a meeting space, connect two offices, no keys or cables needed. Image can be everything Modern workers prioritise convenience and user experience. The latest electronic access systems include an option for them to carry virtual keys on their smartphone, in place of a physical key or key-card. Savvy, smartphone-enabled access will set your space apart from local competitors. Could your coworking space find another revenue stream by hosting weekend or evening events? Because smartphone keys are so flexible, they make it easy for you to issue time-limited access for temporary staff or one-time attendees. When the event is over, their “keys” no longer unlock your doors. You do nothing — it’s all automatic. To learn more please visit Assa Abloy


It’s a hattrick! Paxton is named one of the best places to work for third year running

The market leader of access control and door entry solutions, Paxton, have made the Sunday Times 100 Best Companies to Work For list for the third year running, ranking at 75. “A company that puts in the time and effort to build a great company culture and office environment.” – Anonymous employee feedback Paxton pride themselves on their company culture, offering a modern working environment and an extensive benefits package including, free breakfast, subsidised lunches and gym membership, free yoga classes, monthly ‘Fun Fridays’ – giving employees a chance to have some fun together, six months maternity leave at full pay and four weeks full pay paternity leave. Adam Stroud, Paxton’s CEO, said: “All of us at Paxton are thrilled to appear in the prestigious Sunday Times Best Companies list for the third year running. A positive company culture is hard to achieve and is a result of a great many things.” Paxton’s Global Head Office is based in Brighton, East Sussex. For the third consecutive year Paxton are the only East Sussex based and manufacturing company to make the ranking. Adam continues: “To achieve this level of consistency is so important to us. In fact, we consider a great company culture to be a prerequisite for all our other company goals. My congratulations and thanks to the whole team here at Paxton.” Paxton have a high level of employee engagement. Of those who were asked, 88% completed the Sunday

Times survey, with one commenting: “Paxton continues to strive for greatness amongst its rivals. The ambition and attention to detail along with putting its staff at the heart of things will ensure the future is really bright.” Nicola O’Donnell, HR Director, said: “We are so excited to have made the list for the third year running, it’s a great achievement and all relates back to our amazing people. We continually look for feedback to improve and that’s really important for us at Paxton.” “We believe that our colleagues’ wellbeing is essential for Paxton to thrive and are truly passionate about becoming an employer of choice in the local area. We attract and grow talent, encouraging people to develop their skills to ensure we have the best people working with us.” Celebrating its 35th birthday this year, Paxton now have teams in 12 locations across the world. They are committed to investing in the local community, holding regular volunteering and charity days. Four years ago, they launched the Paxton Scholarship, which offers four university students a £10,000 scholarship and three-month paid work placement with Paxton. Paxton are very proud of their Sussex roots and have no intension of relocating, with plans to purchase additional premises over the next five years, to support their ambitious growth plan. To find out more please visit www.Paxton.Info/5600

IN SECURITY | February 2020 | 13


Data and security management at the casino Dallmeier at WGPC 2020: Simple cooperation with regulation authorities and risk mitigation for casinos Dallmeier electronic is “Exclusive Platinum Sponsor” of the WGPC 2020 (World Game Protection Conference) at the Tropicana Las Vegas (Las Vegas, NV) from 23 to 26 March 2020. There, the pioneer of video technology for casinos will showcase how casino managers can improve cooperation with regulation authorities, deal with criminal activities proactively, and make day-to-day operation much more productive. With over 20 years of experience in the field of video security and data management in casinos, Dallmeier and its solutions promote secure, smooth casino operations all over the world. In March 2020, the company now attends the 15th WGPC in Las Vegas as Exclusive Platinum Sponsor. The conference deals with current and future challenges of the casino industry, such as compliance with stricter requirements by the regulation authorities or handling criminal behaviour proactively. Dallmeier will present their “Smart Casino Solutions” for security, gaming automation and data management as part of the exhibition (24 and 25 March 2020). HEMISPHERE® SeMSy®: Efficient cooperation throughout the casino The HEMISPHERE® open software platform for security and business serves as the focus of the Dallmeier conference presence. In particular, casino operators can use the HEMISPHERE® SeMSy® solution suite as a “Casino Operating System”: It enables the integration of third-party systems (e.g., CMS, POS, access control) and the display and processing of many different data sources and interfaces. Employees in different departments can use the SeMSy® system, wherein individual widgets are enabled for them depending on their tasks to provide them with personalized, functionoptimized tools for completing their tasks. Sophisticated system components such as 2D and 3D maps with “Active Elements” or pre-defined standard operating procedures (SOPs) guarantee efficient processing and effective cooperation in the event of significant incidents and alarms. In addition, with just a few mouse clicks security personnel can create a “digital incident file” containing videos, notes, reports and other information. As a result, casinos will have no difficulty satisfying compliance requirements imposed both in-house and by external bodies (e.g., regulation authorities). Panomera® camera technology: Comply with regulations and AI process optimization Besides extensive requirements in terms of reporting, given the video security technology deployed more and more casinos are also being required to satisfy stricter 14 | February 2020 | IN SECURITY

regulations imposed by the regulation authorities. These include for example an ultra-high 4K resolution on the cameras in the area of the gaming tables, together with an efficient H.265 encoding technology. The Dallmeier “Panomera® W” camera series which was unveiled at the end of 2019 supports native H.265, and it also integrates up to eight 4K sensors in one camera system, thus offering operators an unrivalled, undistorted 360° view of all activity on the gaming floor. Dallmeier customers report enormous time savings for their surveillance tasks, such as locating a person of interest in less than three minutes instead of over 20 minutes. Moreover, the definable minimum resolution density of Panomera® combined with integrated neural networks enables AI-based video analysis applications. These can be used by marketing analysts, for example, to create heat maps using “crowd analyses”, analyse visitor streams and so make arrangements for more efficient capacity utilization in all areas of the casino. Casino Automation Technology (CAT): The next level for table games Visitors to the conference can also learn about Dallmeier CAT; this is the first automation system for table games (e.g., blackjack) in the world implemented by casinos in a production environment. CAT combines video technology with AI technologies, which enable it to detect chips and cards, provide real-time information about the position and value of bets, game pace, float value and many other analyses. Its benefits range from significantly increased game pace to substantially more effective protection from cheating, even up to precise player rating to improve customer loyalty programs and prevent expensive misjudgements. CAT has already been deployed at over 1,000 gaming tables in Macau and was honoured with the award for “Best New Product” at WGPC 2019. Find out more Dallmeier solutions for casinos



Dutch Company Siqura installs state-of-the-art camera technology in Czech motorway tunnels

Siqura, the leading Dutch supplier of traffic surveillance, management and control systems, has delivered bespoke cameras and software for an integrated security solution in three major tunnels in the Czech Republic. Three essential tunnels for traffic in the Czech Republic The Valík tunnel is a 380-meter-long two-way tunnel on the D5 motorway. This highway forms a detour around the city of Pilsen and was opened in 2006. The Klimkovice tunnel is located on the D1 motorway on the Bílovec-Ostrava-Rudná line near the town of Klimkovice and was commissioned in 2008. Traffic monitoring in the tunnel is controlled by the Highway Management and Maintenance Center in Ostrava. The Husovice tunnel has been in existence since 1998 and is a road tunnel in the city of Brno, part of the I / 42 road and the Brno City Ring (VMO) respectively. Since July 2019, the technology in this last tunnel has been fully modernized (security, lighting, air conditioning, control systems). Security and control have also been renewed in the first two tunnels. Dual thermal/optical and PTZ cameras For this project, Siqura proposed its XCU Fusion and TrafficPTZ cameras. The XCU Fusion is a rugged dual imaging (thermal/ optical) camera for demanding environments, with double protection against corrosion as it is entirely made of powder-coated stainless steel (316L). The 16 | February 2020 | IN SECURITY

housing is hermetically sealed against water and dust. The TrafficPTZ Ultimo (TPU) is a high-precision, fullfeatured network PTZ camera providing high-quality, high-definition images. The integrated 30x optical zoom in combination with the dual LED illuminators and its embedded image stabilization makes the camera ideal for traffic applications. The camera works day and night and is extremely easy to operate. A sudden stop leads to immediate action. Tight deadline The commissioning agency which awarded the tender as part of a major improvement project of the Valík, Klimkovice and Husovice motorway tunnels had communicated tight deadlines and strict no-delay policies to prospective suppliers. Despite the limited time frame, Siqura has delivered all three projects on time & supported its partner throughout the initial ordering, logistics & installation process, providing continuous commercial & technical assistance. Zara van Vliet, International Sales Manager at Siqura B.V., is responsible for implementing the project: “We were able to deliver the cameras and associated software and equipment within the requested limited deadline. After completion of the technical phase in September 2019, an extensive trial period was initiated which has now also been completed.” For further information please visit https://siqura.com


New Napco professional security solutions catalog available Napco Security Systems is pleased to introduce a brand new version of its Full Line Catalog of Professional Security Solutions, including the latest on its award-winning StarLink® Cellular Communications of AT&T and Verizon LTE networks, Gemini® & GEMC-Series® Residential & Commercial Systems, Firewolf® & FireLink Fire Alarms & Devices, iBridge® & iSecure® Connected Security Systems and new Tech, Video & Access Control Add-ons. Now available as a downloadable resource online, and in print, the all-new Napco Catalog features comprehensive content on our newest labor-saving, advanced technologies, on the growing Napco product lines, plus quick dealer insights and/or shared best practice tips, excerpted from actual Napco Dealer feedback. For easy product selection, several new model-bymodel matrices, Pak configuration comparisons & System-Builder tools are also featured. The Napco Catalog can be downloaded online from the Napco Website’s Marketing Library Resource

CDVI announces secure bluetooth reader & AES256) gives your entire system extra security” – Fiona Hotton, Senior Sales Manager. Top features of the ASDR®

CDVI, a leading access control manufacturer worldwide, announced a new secure Bluetooth reader compatible with ATRIUM Access Control. “The Bluetooth connectivity of the ASDR® allows a handsfree smartphone access to your ATRIUM Access Control system, while the advanced encryption (AES128

• Slim and attractive design • Multi-colour led feedback for door status controlled by ATRIUM • Communicating over RS-485 featuring OSDP (Open Supervised Device Protocol) • Secure connection (AES 128 / AES 256) • Bluetooth communication for handsfree smartphone access • Straightforward connection with only 4 wires • Max distance of 1 kilometre between the ATRIUM door controller and the ASDR® reader For more information visit our www.cdvi.co.uk

IN SECURITY | February 2020 | 17


Club Car takes to the streets

Club Car is now street legal in every country in the EU. Club Car’s electric utility vehicles offer an attractive alternative to traditional petrol-powered vehicles. For a start there’s no petrol costs – and zero emissions. Club Car’s vehicles have the power to perform numerous campus tasks, from mail delivery to security and maintenance. Want to know more? Contact your Club Car representative today.

STREET LEGAL www.clubcar.com info_esa@clubcar.com (+44) 777 180 5463


Meesons REV 190 revolving door first in the world to achieve LPS 1175 Meesons, the leading provider of anti-tailgating entrance control solutions, has introduced Rev 190, the world’s first revolving door to achieve certification to Loss Prevention Standard (LPS) 1175: Issue 8 up to C5 (SR3). By introducing the world’s first LPS 1175 approved Revolving Door, Meesons has raised the bar in terms of security for prestigious buildings and entrance ways where retaining aesthetics is a priority. LPCB certification of the Rev 190 Revolving Door to LPS 1175 provides independent verification that it will deliver the significant levels of resistance to forced entry by hostile actors, be they burglars, terrorists or protestors. The LPS 1175 standard reflects a broad range of threat scenarios including tool attacks by intruders acting without fear of attracting attention to their actions by using tools and entry techniques likely to generate sustained levels of noise. This is a threat that is not necessarily covered by other security standards, such as EN 1627, as explained in BRE’s Specifiers Guide to Façade Security Standards. Being independently tested to LPS 1175 in standard operation means that Meesons’ Rev 190 Security Revolving Door meets the highest standards against physical attack at all times, whilst providing specifiers with an entrance control solution that offers high architectural appeal. Meesons’ LPS 1175 Issue 8 Revolving Door is in a permanent state of attack-readiness, meaning it requires no user intervention, or secondary layer of defence, to stop criminals who are prepared to use

force. The Rev 190 Security Revolving Door is a high security, fully automatic 4-wing, bi-directional Revolving Door that remains as secure during the day is it does at night, preventing forced attack 24/7. At the same time, its sleek, stylish design creates a welcoming and non-intimidating aesthetic for legitimate building users. This makes it highly suitable for prestigious projects in the commercial, office, R&D and retail sectors. While other revolving doors may rely on a secondary barrier, such as a night shutter, to provide forced entry protection, the Rev 190 Revolving Door is a fully attack ready solution that combines functionality and forced entry protection into a single product. The Rev 190 features a range of transit modes that can be operational day/night. These allow building managers to choose between free-flow, single person authenticated access control or lock down modes, depending on their requirements. “Our new Rev 190 Security Revolving Door is a ground-breaking addition to the revolving door sector,” said Iain Entwistle, Product Marketing Manager at Meesons. “It makes a step change in terms of security by being the first to achieve LPS 1175 Issue 8 up to C5 (SR3) and is in a permanent attack-ready state 24/7. That gives architects and security specifiers an ability to achieve their aesthetic aspirations whilst providing their client with full controllability of who is entering the facility.” For more information on Meesons Rev 190 Security Revolving Door, visit: www.meesons.com IN SECURITY | February 2020 | 19


Comelit presents VIP security to Savoy Circus Comelit’s latest VIP door entry technology has been installed at the much anticipated redeveloped Savoy Circus accommodation, allowing students to receive video calls via their mobile phone. The site in the London Borough of Hammersmith and Fulham, vacant for almost 20 years, was previously home for the Savoy Circus and has been redeveloped in a conservation area. It now stands at 7-storeys and presents 306 studio apartments, complete with communal spaces including a café, student lounge, arcade and gym. Under construction company, Tide Construction, system integrators selected Comelit to create a bespoke door entry finish, using its innovative, VIP technology. With ease of install a major advantage, on completion, the system allows students to receive visual notifications to smart phones. Says Pat Blanche, M&E Manager at Tide Construction Limited: “The redevelopment at Savoy Circus has been designed sympathetically into the Old Oak and Wormholt conservation context, to provide local residents with the opportunity to remember the previous building. Every material used and detail has been explored with a particular emphasis placed on characterful and distinctive finishes. “At the same time, we are very conscious of the expectations of students coming to live here, who demand IOT and associated mobility, connectivity and ease of use services as standard. When it came to door entry, Abzorb recommended Comelit as one of the leading security brands in audio-video intercom, presenting a simple way for students to receive smart door entry notifications, even when they are not at home.” 20 | February 2020 | IN SECURITY

Abzorb installed Comelit’s latest VIP system on site, integrating with the building management system to enable a seamless door entry experience and maintenance through VIP’s dedicated management software. Cont/d… Operating via two multi-user gateway systems on-site, students can answer calls from the main door via their smartphone with full video communication using the dedicated Comelit app. Kevin Hall, Abzorb Director added: “Having a longestablished relationship with Comelit and installing security systems in student accommodation in general, we knew its VIP solution would meet the requirements for futureproof technology at Savoy Circus. By installing the advanced master license ‘virtual system’ we could reduce the amount of infrastructure, with no need to use additional cabling, reducing cost and labour. This meant we could upgrade to video rather than audio-only as is often found in student accommodation and offer the ability to respond to door entry requests via their mobile phone.” Stephen Wragg, Business Development Manager at Comelit UK concluded: “Comelit has made constantly looking to the future its mission, with a constant focus on improving the quality of everyday life, maximising simplicity and functionality. Savoy Circus is the perfect example as we worked closely with Abzorb to design and support simple installation of our powerful VIP system. The result enables all the benefits and convenience of smart visual door entry, controlled by students from a single application.” For further information visit www.comelitgroup.com


Ulisse Thermal ULISSE EVO THERMAL is the new high-performance PTZ thermal camera with radiometry functions, designed to provide a preventative 24/7 video surveillance system in critical infrastructures, transport, traffic, railways and fire detection applications.

IP66/IP67 IP68

TYPE 4X TYPE 6P

VIDEO SECURITY PRODUCTS www.videotec.com

M a d e in I t a ly


SURVEILLANCE

Year of opportunity Bob (H.Y.) Hwang Ph.D., Managing Director of Hanwha Techwin Europe, highlights how major advances in technology, such as Artificial Intelligence, IoT and Cybersecurity, are creating new opportunities for those involved in the video surveillance systems supply chain

T

his new year will, without doubt, bring many exciting opportunities for manufacturers, such as Hanwha Techwin, to help system integrators and our distribution partners grow their businesses. Over recent years, growth in the

22 | February 2020 | IN SECURITY

sales of security cameras, recording devices and video management software platforms has been fuelled by businesses and organisations recognising the need to take their security to a higher level. As IoT devices have become more popular over the years, managers responsible

for security all share the same goals of protecting property, people and assets against a context of increasingly sophisticated cyberattacks. It is therefore not surprising to learn that the global professional video surveillance equipment market


continues to dynamically grow with worldwide market revenue reaching $19.9 billion in 2019, up from $18.2 billion in 2018, according to the IHS Markit Video Surveillance Intelligence Service. New higher specification cameras which will be introduced during 2020, will provide end-users, including those with limited budgets, with the opportunity to upgrade their existing video surveillance systems and further enhance their security. Innovative solutions for 2020 and beyond Equally important, as end-users’ expectations rise as to what they can expect to achieve from their video surveillance systems, I predict we will see a surge in the deployment of cameras equipped with advanced forms of edge and Cloud based video analytics, AI or Deep Learning solutions. This predication is supported by a report produced by Gartner, a leading research and advisory company, which suggests the use of AI and advanced analytics will significantly increase over the next few years and by 2022 will have a global business value of approximately $3.9T. Artificial Intelligence (AI) and Deep Learning We may within the next few years see the introduction of AI applications

which enhance video surveillance systems to a level which at this time might not seem possible. Wisenet 7 Cameras During 2020, we will be launching a new range of cameras equipped with our next generation Wisenet 7 chipset which offers a new level of processing power and an extensive feature set that includes AI. As such, these new cameras have been designed to detect and classify people and vehicles in real-time and capture various characteristics of objects as well as people, such as license plates and facial attributes. In addition to offering greater accuracy and fewer false alarms to users who are looking to detect criminal activity, the cameras will also help businesses identify ways to improve productivity. Retailers in particular, will have access to an analysis of data which could include the age and gender of their customer. Advanced Cybersecurity With cyber attacks becoming more sophisticated, building a strong security system is no longer an option, but an imperative. We asked our design engineers to place cyber security at the top of the list of requirements for the new Wisenet 7 cameras. This is why from the moment one of the cameras is connected to the network, a secure boot block prevents unauthorised

attempts to gain access to the camera’s firmware New Technologies for 2020 In looking forward to the exciting opportunities that lay before us during 2020 and beyond, we are conscious of the increasing impact that Internet of Things (IoT) and 5G technology are likely to have on the video surveillance sector. In the short term, please watch out over the coming months for other new ground-breaking products and solutions which we will be introducing to help system integrators generate new business whilst delivering added value to their end-user clients. All have been designed to improve the system integrator’s experience and reduce operational costs. These include: • New feature-rich cameras multi-directional and panoramic cameras which negate the need for end-users to incur the cost of installing a higher number of standard cameras that would normally be needed to cover a wide area. In order to reduce the time an installer spends on site, we have equipped these cameras with a motorised PTRZ gimbal which enables the lens position to be easily changed in order to set the camera’s field of view. • Niche and vertical market applications, such as retail and transport, will be able to benefit

IN SECURITY | February 2020 | 23


Hanwha Techwin, system integrators and our business partners throughout Europe. Market led Our new products and solutions have come about by us listening to our partners in the supply chain, thinking outside the box and innovating. System integrators and their end-user clients can rest assured that with the support of our parent company, the Hanwha Group, Hanwha Techwin will continue to respond to evolving market requirements by driving the development of exciting new products and solutions which harness the very latest advances in technology. By doing so, we will help them grow and justify their trust in the Wisenet brand.

from a raft of new cameras and solutions, including thermal, explosion proof and ANPR models. • Among the many new cameras that we will be introducing during 2020 will be an 8K model which captures images of such superb quality that they need to be seen to be believed. Operators will be able to closely zoom in to a small section of an image without any pixilation occurring. • Total cost of ownership will be reduced by our new cost-effective appliance which will be supplied with embedded Wisenet WAVE Video Management Software (VMS), making it affordable even for budget conscious end-users.

24 | February 2020 | IN SECURITY

Hanwha Techwin Partner Programme - STEP The Hanwha Techwin STEP partner programme is proving to be hugely popular with system integrators who are able to take advantage of a range of benefits designed to give them a competitive advantage and help them increase their share of the video solutions market. It seems almost everyday on social media channels there are postings which announce a new STEP participant or a systems integrator being accredited to a high status level within the programme. 2020 will see a revamp of STEP which will make it even more relevant to the electronic security supply chain and to facilitate close working relationships, based on mutual respect and trust between

Creating demand During 2020, we will continue to expand our A&E, pre-sales and business development teams. We will be seeking to employ people of the highest calibre who share our passion for building partnerships with system integrators and other contributors to the supply chain. In doing so, we will bring our formidable product range to an even wider audience and create new sales opportunities for our partners. In conclusion, advancements in technologies will support new use cases to meet customers’ needs in various verticals, expanding the horizon of our industry. This new year will, without doubt, bring many exciting opportunities for us and our channel partners as we continue to respond to evolving market requirements. Hanwha Techwin Europe, formerly Samsung Techwin Europe, offers robust and reliable video surveillance products designed to meet the current and future needs of security professionals. Our cameras, video recorders and other IP network devices are built to exacting standards which reflect the heritage of precision engineering associated with the Samsung brand. For further information please visit www.hanwha-security.eu


HIGH-END CAMERA

X

TOP PERFORMANCE LENS

THE NEW FUJINON SX800. THE BEST OF BOTH. With the new SX800, Fujinon combines both in one for the first time: camera and lens. For long range surveillance at the highest level with 40x optical magnification and constantly sharp images. www.fujifilm.eu/fujinon. Fujinon. To see more is to know more.


BIOMETRICS

Eye of the beholder

The role of campus biometrics by Mohammed Murad, vice president global development and sales for Iris ID

B

iometrics are changing the way higher education campuses handle a variety of tasks, from securing buildings to making bookstore purchases. The results are increased convenience, lower costs and greater satisfaction among all campus stakeholders. But let’s first take a look at what biometrics are replacing. For decades, colleges and universities secured doors with mechanical locks

26 | February 2020 | IN SECURITY

and keys. Although they create an effective barrier, they have major flaws. Keys can be lost or stolen. They can be copied again and again. It is even possible to take a photograph of a high-security key on a police officer’s belt to produce a perfect copy using a 3-D printer. Once a lock’s security has been compromised, it must be rekeyed in an expensive and time-intensive process. And then new keys must be cut and distributed.

Key management can be a nightmare on a large campus with thousands of doors. Multiply that by tens of thousands of keys in the hands of students, faculty and staff and the margin for error grows exponentially. Within the last decade, campus administrators began trumpeting a one-card system. That uses plastic cards to replace keys and much more. The same cards that opened students’ dorm rooms could also be


used to purchase food in the campus commons, complete cashless bookstore transactions and gain access to the recreation center. Of course, that required replacing locks with card readers. However, like keys any card may be borrowed, lost or stolen. It’s much easier to replace a card than it is to cut new keys and rekey locks. However, administrators looking for a higher level of security add a second identifier – a biometric– as part of the access control system. The cost of cards – the plastic blanks, printers, ink – can add up quickly. The so-called “smart” cards include computer chips that make them up to five times more expensive than traditional proximity cards used on many campuses. Also, think of the costs to a university using any card-based system. Each year, administrators must create and issue thousands of new cards to incoming students and new employees. A newer technology replaces smart cards with smartphone-based credentials. Students (also staff and administrators) open an app to gain the benefits of a smart

card. There are several upsides to this technology. The costs of purchasing and printing new cards are eliminated. Most people will not lend their phones, loaded with personal information, even to friends. And smartphones are protected by a biometric or PIN, adding a valuable security layer. The downsides? Not everyone owns a smartphone – recent studies show about 80% of U.K. adults carry one. Mobile credentials don’t work if the phone battery is drained. The cost of maintaining separate access systems for the outliers would be very expensive. And current card readers would require at least the addition of Bluetooth technology to work with the smartphone credentials. Now, back to biometrics. A biometric is a measurement of one of a person’s many physical characteristics. The leading technologies include iris, facial and fingerprint recognition. Let’s take a look at how large campuses are using an iris-based system. Students typically enroll in the system during their initial orientation sessions. It takes only

seconds to take what amounts to a picture of both irises. The images are compressed into a small digital template that will be stored on a campus computer. These encrypted templates cannot be re-engineered or reconstituted to produce a visual image. There is no way a hacker could steal iris patterns. This system does require specialized iris readers, but students get all the benefits of a smart card. Within a second, students can enter their dorm rooms, pay for lunch in the commons, purchase a new computer cable in the bookstore, access the recreation center and so much more. There is no need to carry a card or remember a PIN. When a student approaches an iris reader in common areas, proximity sensors activate the scanning equipment. Mirror-assisted alignment and audio auto-positioning prompts assist students or staff unfamiliar with using the system. An iris-based recognition system is also contactless, posing no risk of passing germs and viruses. Faculty can enter classrooms and offices. Administrators can

IN SECURITY | February 2020 | 27


access critical locations such as a campus data center. Since a person’s iris can’t be lost, stolen or borrowed, there is no doubt about the identity of the person requesting authentication. Every iris has a unique pattern, including those of identical twins, and those patterns remain unchanged from birth. A system’s speed is important on a fast-moving higher education campus. An iris system is as fast or faster than other biometric methods. Iris-based systems also provide unmatched accuracy with a false acceptance rate of 1 in 1.2 million events. Other leading technologies may return templates representing “possible” matches — requiring a delay for human interpretation and less accuracy. Iris-based system are ideal for a college or university campus. Students can wear glasses or corrective lenses without compromising system accuracy. Safety goggles worn in a laboratory are not a problem. Iris recognition systems provide access control that goes far beyond dormitory room doors. The systems are being used to bridge the gap between physical and logical security. For example, a student or campus staff member working in a data center or an experimental laboratory may access a room using an iris reader. Once inside, another reader integrated with software on workstations ensure only an

authorized person may access that computer and its data. Lightweight, portable platforms for biometric enrollment and authentication are being used by campus police or security teams. These devices enable officers to verify the identity of students indoors or out virtually anywhere on campus. The units communicate with the campus computer network via Wi-Fi, 4G LTE and other protocols. Campus health centers are using portable iris readers to identify students seeking medical attention. By authenticating student identifies, center staff ensures they are treating the correct patient and prescribing the proper medications. Time and attendance is another compelling use of iris-based recognition systems. Iris readers integrate with existing time and attendance applications or customized apps to note when student workers and other part-time or permanent staff check in and out for each shift. Hours are reported directly to the campus’ payroll software. Another best-selling point of an iris system is its readers easily integrate with virtually any other campus system such as proximity or one-card solutions. That enables administrators to migrate to an irisbased system as time and budgets permit. Why iris recognition technology? Facial systems may be impacted by

the viewing angle, lighting, changing hairstyles, glasses, makeup and even facial expressions. Additionally, the technology has come under attack by civil libertarians for its ability to identify people in virtually any public setting without the subjects knowledge or approval. Fingerprint technology may be affected by injuries such as finger wounds and burns . Gloves can’t be worn during an authentication process. And unlike iris and facial recognition, fingerprint systems involve contact with a reader – potentially spreading communicable diseases. Overall, biometric systems can improve the security and convenience of any campus. A fully implemented system removed the dangers associated with borrowed, lost or stolen access control cards. Finally, here’s a benefit that may lead to more students on campus. Biometric systems, particularly irisbased, put a “wow” factor on display when parents join their children on campus visits. It’s indicative of a campus that puts a premium on technology. These solutions are no longer the stuff of spy movies or only for use at secret government facilities. They are being used daily on campuses throughout the U.K. For further information please visit www.irisid.com



SECURITY GUARDING

Command, control and intelligence The combining of traditional manned security with technology is revolutionising the security sector and, in turn, the command core

A

mulet, the specialist security business of the Churchill Group, is adapting to modern security challenges by establishing its new Command,

30 | February 2020 | IN SECURITY

Control and Intelligence Centre (CCIC). It is vital that a security solution – from risk assessment through to incident management – works flawlessly and effectively end-to-end.

The CCIC has physically brought together the relevant expertise to ensure this happens. The new centre more closely aligns Amulet with its intelligence partner, The Senate Group, by locating the CCIC


at the Senate’s NSI Gold accredited operations centre. The control room model of security is designed to bring together the physical and technological aspects of the industry and streamline communications between the two. Key features of the CCIC include intelligent monitoring and reporting, a 24/7 major incident response capability, lone worker protection and twin-layer back-up resilience. The security sector is becoming increasingly complex; traditional and technology-based security solutions are being combined in a plethora of ways, which increases the onus on security providers to identify tailored solutions for each client. Traditional iterations of security provisions are single-service offerings – manned security, CCTV, intelligence analysts, and threat assessments – which, when provided and managed separately, can lead to a disjointed experience for a client. As seen throughout the facilities management sector, managing a number of providers can quickly become a drain on resources; the CCIC ensures coherence by providing a single point of contact through integration. In doing so, it places the

client in a far more powerful position to find a solution personalised to their needs. The CCIC brings together expertise from every element of security provision, combining skills and knowledge to create a holistic view of the risks a client may face and craft a perfectly tailored solution – something which without true integration others are unable to offer. The face of manned security is changing as the cost of technology drops. Deployment is streamlined enhanced with technology. This integrated solution cannot work without a seamless route of communication, and an understanding from officers of the technological solutions they work with. The new CCIC provides a full end-to-end solution. The centre, while still fulfilling the traditional control room function, brings Amulet in direct contact with intelligence analysists, incident management, CCTV alerts and much more. In addition to easing internal communication, this creates a single point of contact for the client to access all aspects of their security solution. From the initial threat

assessment and solution implementation, through to intelligence analysis, threat alerts and incident management, a complete solution is provided in one place. Previously siloed teams are now working side-by-side. This facilitates the sharing of skills, knowledge, and insight, which in turn benefits each team. Each specialist area has a holistic understanding of the environment of the security sector and can be more proactive, adapt to changing threats, and offer new solutions. The seamless communication between teams and between specialists and customers is what places this new model for security ahead of the curve. In an age where communication is supposedly made easy through technology, the human side can be lost; 86 per cent of employees and executives cite lack of collaboration or ineffective communication for workplace failures. Working closely not only allows for more direct communication between teams, but also creates a greater understanding of one another’s work, so that specialists from different fields are better able to speak the same ‘language’.

IN SECURITY | February 2020 | 31


Amulet places great importance in continuous innovation to manage a changing world of threats. The CCIC is host to quarterly innovation forums where clients are introduced to new developments in products and processes. Not tied to a single supplier of technology, Amulet ensures clients are given access to whatever caters best to their needs and has the expertise to propose a combined manned and technological solution. Technological advances and data analytics make it easy to forget or dismiss how vital a role people play in the security sector. However, the nature of the sector requires it to protect from factors which often 32 | February 2020 | IN SECURITY

cannot be foreseen by technology. An experienced security officer can notice when a member of the public is acting strangely, or adapt to a situation which wasn’t predicted. Security officers do far more than patrol an area; they are the first responders at an incident, have to make rapid decisions, and maintain order when those around them may be distressed. Control centres are important for officers on clients’ sites as places to check into and report back to. A well run centre is vital to ensure officer safety and, when combined with intelligence and data, can provide better information to officers, making their work more productive.

By bringing together the people that make the sector work within the CCIC, we are concentrating intelligence and creating a space for interaction and creativity. Advances in technology are not enough for a security firm to stay ahead of the curve. It is the integration of all resources; people, technology and intelligence and the CCIC facilitates this seamless functionality of the fundamental parts of a security solution so Amulet can continually focus on service quality innovation. For further information please visit www.amulet.co.uk


Access controlled… Future secured. www.automatic-systems.com

meet us at intertraffic 2016

Go Mobile with Confidence

April 5-8, 2016 • Stand 108, Hall 02

50 years of performance and reliability serving the highway, parking and traffic management markets

HID Mobile Access®

Convenient, smart and secure

sales.asgroup@automatic-systems.com


SURVEILLANCE

Eternal vigilance Edesix body worn cameras form integral part of motorola solutions’ ecosystem of mission-technologies

U

rbanization is placing a huge strain on our emergency services and all public safety organisations, as keeping people secure is becoming increasingly demanding due to the complex environment we live in. Technology is playing a vital role in helping to address these complex security issues, with cutting-edge innovations now central to keeping citizens safe. Motorola Solutions’ new critical ecosystem of technologies has been designed to utilise new technology

34 | February 2020 | IN SECURITY

to enhance security for all public facing security services, including our over-utilised emergency services. Motorola Solutions’ cutting-edge innovations will enable government and enterprise customers to overcome their most complex challenges, streamline their critical processes and prepare for tomorrow’s requirements. Society, economy and public safety are undergoing a digital transformation. Motorola Solutions provide customers and public safety organizations with the right intelligence and solutions to help

them enhance their operational efficiency. Body Worn Cameras Edesix Body Worn Cameras (BWCs) now play a central role in Motorola Solutions’ ecosystem of mission-critical technology for security operations in a wide range of scenarios. The use of BWCs is revolutionising mission-critical operations around the globe, enhancing policing and public safety as well as commercial customers in retail and hospitality environments,


as well as in hospitals, airports and train stations. BWCs are now built for a connected world and are being used by officers on the front-line to help prevent both criminal and antisocial behaviour when out on patrol. Additionally, the captured footage not only provides greater transparency of interactions with the public, but also significantly increases early guilty pleas and saves officers valuable time as they often do not need to attend court. BWCs have been proven to help improve the safety of those in public facing roles, whilst producing compelling legal evidence when needed. BWC’s can provide two-fold protection to staff – firstly, members of the public naturally change and moderate their behaviour for the better when they realise they are being, or may be, recorded – but importantly those cameras can then be used, when needed, to alert colleagues to an incident, to obtain evidential quality footage to secure convictions, or to uphold the account of staff in the event of a complaint or incident. In recent years the developments in BWCs have been extensive, ranging from HD recording capabilities to dual band live Wi-Fi streaming of incidents allowing for faster decision making. With the launch of our new VB-400 this has moved on again, with BWCs now

having hands-free activation meaning incidents can be recorded, for example when weapons are drawn or when a car door is opened. Easy device location, when integrated with Tactical VideoManager, also means that the management of BWCs across large fleets is now greatly simplified. The new GPS capabilities is particularly important for policing, as it enables the control room to monitor live situations with the help of real-time footage, and if then the situation escalates it can make an informed decision, for example to call for back-up. Research has shown that the use of BWCs: • Created self-awareness during police interactions • Caused individuals to modify their behaviour in response to being recorded • Improved the quality of evidence gathered, and; • Had the potential to enable the wider Justice sector to deliver faster, fairer outcomes Seamless Body Worn Camera and CCTV Integration CCTV has long been relied upon for on-site security and is utilised to keep surveillance and monitoring at any location. However, limitations do exist as static CCTV cameras can only monitor a limited area, often without

audio. One of the most important recent innovations in this market has been the ability to integrate existing CCTV Video Management Systems (VMS) with wearable BWCs, enabling organisations to unify a site’s security and monitoring system, and create mobile and first-person viewpoints to add contextual detail to footage. Software, such as Edesix’s newly launched ONStream, integrates Body Worn Camera surveillance with existing Video Management Systems for fixed IP camera networks. This enables ONVIF compliant VMSs to be compatible with body cameras, streamlining live footage and audio of incidents as they unfold, for users to review in real time, or after the event. Cameras integrate seamlessly with leading CCTV VMSs, meaning captured footage can be instantly shared and viewed by security staff. Fixed security cameras connected to a VMS are a powerful tool for monitoring and securing many different environments, from retail floors to distribution centres. With BWCs which are worn on the uniform, staff need only press a button on the lightweight camera to activate recording, which in turn can send a live feed of the situation back to a centrally based control room, where the footage can be viewed and listened to by security staff, and action taken.

IN SECURITY | February 2020 | 35


Vigilant ANPR ANPR technology is used to help detect, deter and disrupt criminality. As a vehicle passes an ANPR camera, its registration number is read and instantly checked against database records of vehicles of interest. Police officers, and now Civil Enforcement Officers (CEOs), can intercept and stop a vehicle, check it for evidence and then take the necessary action.The use of ANPR in this way has proved to be important in the detection of many offences, including locating stolen vehicles, tackling uninsured vehicle use and solving cases of terrorism, major and organised crime. ANPR technology involves infrared cameras, which can be stationary, like CCTV, or mobile, like BWCs, that photograph number plates; timestamp the images with the date, time and location coordinates; and store the information in searchable databases for use by authorised agencies. This 36 | February 2020 | IN SECURITY

can create a bank of information regarding the locations and movements of vehicles of interest throughout a country. Using BWCs to protect users and capture footage whilst using ANPR for data-driven intelligence is a powerful combination. For example, ANPR could provide the whereabouts of a vehicle of interest for the Police. Police officers can then investigate the vehicle whilst wearing BWCs, their findings instantly shared with a HQ with a live view from the officer’s viewpoint to provide further information and evidence. Using ANPR to track vehicles of interest and having officers equipped with BWCs to follow up means there is a continuous intelligence stream created by these two forms of video technology. ANPR finds the target whilst BWCs record the interaction once it’s found. This interaction creates more incoming intelligence for authorities, protects officers on duty and provides an audit trail

of information from the vehicle of interest to court-ready footage taken by BWCs. Command Centre Software Solutions As businesses and public safety organisations invest in technologies to more effectively aid those in the field, multiple systems can overload control room operators with information. Motorola Solutions’ Command Center Software Suite helps to organize increasing data volumes from various sources, streamline workflows to keep public safety officers safe and to enhance operational efficiency. Command Central Community allows members of the public to anonymously provide information and includes an easy-touse interface that helps public safety agencies to quickly respond to and manage the submitted information. For further information please visit www.edesix.com


Designed by the industry for the industry

THE UK’S NO.1 COMMERCIAL & RESIDENTIAL SECURITY EVENT > Attend practical session in 4 free-to-attend Seminar Theatres

> Source 150+ of the most innovative products on the market > PLUS don’t miss: Discover the latest police techniques to reduce crime and keep local communities safe

FREE VISITOR PASSES – REGISTER NOW

WWW.THESECURITYEVENT.CO.UK

Founding partners:


ACCESS CONTROL

Flexibility is the name of the cloud game How cloud technology fits a wide range of access control applications by Steve Connor, Sr. Product Manager, Identiv PACS

F

lexibility — as the concept applies to security systems like access control — can mean different things to different organizations. Many business owners demand a flexible system that can scale up or down as needs change, allowing for natural growth, regardless of where business trajectory leads them. Or, in other cases, an administrator may want the ability to start with one access control setup, then add or subtract features as they determine what works best for their business practices. The great news is that all of these features are available through the

38 | February 2020 | IN SECURITY

use of the cloud, making the myriad aspects of access control simpler for businesses of all shapes and sizes. The cloud brings several new concepts to reality for the access control industry, making it easier to ensure secure access for a diverse set of applications. Access Control as a Service The cloud facilitates access controlas-a-service (ACaaS), which enables users to take advantage of the latest technologies in access control with lower upfront and infrastructural costs. Instead of purchasing the wide array of infrastructure and technologies needed to support

an access control system, they can leverage off-site storage and processing capabilities and pay a provider for the amount that they need as a subscription style, operational expenditure. Additionally, because of the software-defined architecture, users gain the added flexibility of being able to control, manage, maintain and update their solution at any time and from any location through a web-based interface. Leveraging ACaaS means that users can benefit from a comprehensive access control system with less direct maintenance on their part. Administrators no


longer need to fret about updates; they instead occur automatically, keeping the system up-to-date with the latest software and firmware. This key function of cloud-based access control also ensures users that their system is staying as secure as possible, as software upgrades frequently address various vulnerabilities or necessary patches. Affordability While the latest trend is that access control is becoming increasingly more affordable as technology advances, the measures that a user might need could be out of their budget with a system that relies on traditional, on-premise infrastructure. The cloud provides lower up-front costs, allowing users to have a more flexible range of access control options while not requiring a large capital expense. Lower costs and less hardware to install both factor into an additional benefit of cloud-based systems: ease of installation. The affordability factor also plays a role as cloud-based systems typically are able to integrate seamlessly with existing access control readers, which means organizations save significantly on new investments in hardware.

Remote Workers, Remote Security Business leaders require the ability to manage their operations from any location. The option of remote management is no longer a luxury; for some businesses, it is a necessity. This is a function that is easily provided through cloud-based architectures. Administrators that work remotely reap benefits through the cloud, with the ability to manage and alter the system as needed through a web-based portal. The cloud can offer peace of mind by allowing security personnel to monitor the system health and be informed of any errors or problems while away from the office. An issue that is detected early can prevent downtime and save an institution the time and money required for more costly repairs — not to mention the exponential benefit of being able to mitigate any issues faster from off-site. For example, an access control system that incorporates analytics may cause an alert if someone accesses the building late at night, but if the system administrator can see that it’s a verified individual and can manage that alarm remotely, it eliminates the cost and hassle of an on-site response or calling

authorities to investigate further. Customization Access control features are not onesize-fits-all. A government building will utilize one feature set for access control, such as FICAM-compliant solutions, while a university campus may utilize another, such as selecting different access control permissions based on the time of day. Many secure environments also need a variety of choices for access management, defining different parameters for separate areas of their facilities. The cloud gives users the ability to choose the elements they need to bring into their system, creating a customized solution that best fits their needs while maintaining the flexibility to change those elements over time. Scalability One of the biggest needs for flexibility is within the ongoing growth and changes an organization experiences. For example, if a campus administrator adds on a new building with 38 doors that need to be secured, or decides to renovate the wing of an existing facility with drastically increased access protocols, they will want to be able

IN SECURITY | February 2020 | 39


to add these functions on to their existing platform seamlessly. Cloud-based access control grants organizations this ease through the ability to effortlessly change when needed. Users can begin by defining their current demands and leverage the cloud to meet such needs, instead of investing in high-expense servers and technologies of traditional systems that may become obsolete or need to be expanded in the future at further expense to the organization. Businesses can work with cloudsmart companies to continually redefine their needs and establish a price that fits their specific use. Security When anything is added to the network, such as a cloud-based access control service, the IT department must have a high level of involvement. Convergence of IT 40 | February 2020 | IN SECURITY

and physical security is an ongoing trend that continues to transform the traditional way that security is handled. However, flexibility in a cloud-based system is achieved when the IT department can trust the solution to be updated with software patches automatically, as well as controlled remotely. This cuts down on the ongoing myth that the cloud is not secure. With proper protocols in place, such as built-in encryption, the cloud can offer a multitude of benefits for enhancing the security of data being transmitted (which is like music to an IT director’s ears). With this level of encryption in place, paired with robust data insight, IT directors gain a clearer picture of the facility they are protecting, better enabling them to appropriately respond as events occur. With no hardware on-site to be hacked, they can focus their efforts elsewhere — such as improving the

current system infrastructure, or adding new features, such as multifactor authentication, to high-volume entry points. This level of oversight is unmatched by other services, providing end users with the flexibility to pursue other important initiatives, such as increasing cybersecurity or trying out new and emerging credentials options. Security is a fast-moving arena, with new access control features developed each year. Oftentimes, users may find a desire for advanced technology or pricing may change to allow them access to wider device options. A cloud-based system is designed in such a way that it can grow with end users and the industry — providing valuable solutions now as well as into the future. For further information please visit www.identiv.com


LET’S WORK TOGETHER FOR A SAFER TOMORROW Most people dream of a safer society. People like you work on creating one. Skydd, the largest trade fair for Security, Fire & Rescue in the Nordic region, is the meeting place for you and your company. Here you’ll take part of exciting news, interesting lectures and the latest technology in cooperation with all of the industry´s major players. One thing is for sure: to be a part of a safer tomorrow, this is where your company should exhibit.

OCT 20–22 2020 IN SECURITY | February 2020 | 41


COUNTER TERROR

Advanced surveillance Is a surveillance state the answer to terror?

O

n the 29th of November 2019, the whole of the UK was shocked and saddened by a brutal act of terror in the capital, reminding us all that the threat of terrorism is not an exaggeration of the media, but a very real danger. The atrocious acts of murderer Usman Khan, a known terror threat who was jailed for his part in an al-Qaida-inspired plot and released from prison early, has raised urgent questions concerning public safety and security and the adequacy of the supervision of offenders released on licence. Adrian Timberlake, chief technical director of Seven Technologies Group and specialist in developing technology that uses artificial

42 | February 2020 | IN SECURITY

intelligence and facial recognition for police and counter-terror operations, examines the potential of new technologies as an ally in combatting terror and ethical considerations in increasing security in public places. Advanced surveillance and security solutions that use new technologies, including automated facial recognition (AFR), artificial intelligence (AI) and intelligent algorithms, have received public scrutiny and have often been criticised as a step closer to a ‘surveillance state’. AFR, in particular, has been under the microscope after the unpopular trials on London’s King’s Cross estate.1 However, the recent tragic event in London and the uncertainty it

has raised around public safety, especially after it was revealed that 74 people convicted of terrorism offences had been released early2, as Khan was, has raised an extremely pressing question. Should these people be more closely watched? Usman Khan was given an indeterminate public protection sentence (IPP) in 2012, which ends only when the Parole Board is satisfied that an offender no longer poses a risk to the public, after being convicted of plotting acts of terror which included a plans to “bomb high-profile locations and build a terrorist training camp in Pakistan”3, and was told that he would serve at least eight years in prison. However, this sentence was


overturned by the Court of Appeal in 2013. At the time, many politicians and penal reform campaigners were of the opinion that such sentences could result “in prisoners unjustly spending too long in jail” and IPPs were being abolished.3 Khan was subsequently handed a 16-year determinate sentence, which he had served less than seven years of when he was freed on licence in December 2018. While he was ordered to wear a tag as a condition of his release, the unaccompanied and unsupervised Khan soon murdered two innocent people and wounded three others before he was fatally shot by armed police.4 The Mayor of London, Sadiq Khan, has speculated on whether the Ministry of Justice or the probation service had the resources to properly supervise people whom, like Usman Khan, had been released on licence.3 It seems the Mayor’s suspicion was warranted. Following an urgent review of terrorists released from prison, launched by the Ministry of Justice, a man was arrested by West Midlands Counter Terrorism Unit on “suspicion of preparation of terrorist acts after a search of his home”. The report suggests that the suspect in this case was a convicted terrorism offender who had been released under licence conditions.5 The evidence points to these people being, as the Mayor of London

suggests, “clearly dangerous.”3 Who will watch them? Budget cuts to police forces across England and Wales, and a reduction of police officers, means that local forces may be too stretched to cope with additional long-term surveillance assignments within the communities they police. The National Audit Office (NAO) stated that the real-terms reduction in total funding to police and crime commissioners, between the financial year of 2010-11 to 2018-19 was 19%6, while the number of police officers in English and Welsh forces fell by 14% between September 2010 and September 20177, leading to increasing workloads and pressure on officers. If officers are tasked with the surveillance of early-released offenders, then other areas of police work, such as responding to emergency calls, may suffer as a result. It was reported early in 2019 that response times for emergency calls to the police have doubled8 in some forces, with the admission that delays in response times reduce the chance of solving crimes such as burglaries and robberies and give criminals more time to escape. However, we urgently need a solution to monitor people convicted of terrorism offences and released on licence to ensure that this tragedy won’t happen again.

Sets of digital eyes that scan for known offenders on a police ‘watch list’ 24-hours a day, and keep authorities informed with the offender’s location, may be the spies Britain needs to keep communities safe. These ‘digital eyes’ are, of course, surveillance cameras that use targeted facial recognition. How can facial recognition keep communities safe? Targeted facial recognition was designed with declining numbers of police officers, and the rising rate of crime, in mind. The technology works by scanning faces in a crowd to find a match to a face in its ‘watch list’ database, with the information that makes up its database obtained from existing police records. This means that while the camera ‘sees’ lawabiding members of the public, it only stores images and raises the alert to police when it sees a ‘target’, which would be anyone on the ‘watch list’. Any person who has been convicted of plotting terror should certainly be on this list. Wider positive impact of using facial recognition technology within communities could include raising alerts to police when known sex offenders come near a school and pin-pointing the location of people reported missing. Additionally, facial recognition technology may reduce the likelihood of criminals who

IN SECURITY | February 2020 | 43


to avoid being caught on CCTV, escaping justice, as facial recognition technology doesn’t only rely on images of faces but builds a profile of a face based on measurements of its features and bone structure.9 Surveillance with facial recognition capabilities could aid police in the fight against terror, alerting counter-terror units when a person convicted of terror-related offences is within the proximity of a high-profile building, or an event with large numbers of people such as a sports stadium or concert, for example. Police forces could then send back-up or alert higher authorities but, more importantly, any security staff present would be made aware of a potential threat. Currently, more than 70 people convicted of terror-related offences are on early release, but their identities will not be known to every police officer and certainly not to every security guard. Identifying these people, and the potential of a terror threat, will be key in acting swiftly to prevent an 44 | February 2020 | IN SECURITY

could achieve this. Ethical considerations in increasing surveillance and security It’s hard to find that fine line of acceptance between protecting the public and respecting privacy and freedom. This is why so many discussions concerning facial recognition concern ethical use and protection of human rights. Facial recognition technology has raised concerns over privacy and data storage and retention, not only in an ethical sense, but a security sense. Hackers are becoming ever more sophisticated and savvy at using new technologies, coupled with the fact that breaches of large organisations in the UK are highly publicised, and it’s easy to see how mistrust arises. The key to mitigating these concerns is education and transparency. People fear what they do not understand; fully informing the public of how facial recognition technology works, how it will be used and information on the data it collects – how it will

retained for – could encourage the public to trust in the technology. Developments in facial recognition should go hand in hand with efforts to develop cybersecurity, to protect any sensitive data collected from a potential breach. Some might say that the increased use of surveillance technology, that the mere idea of having security cameras lining our streets and guarding the entrance to every building, workplace and train station may turn Britain into a ‘surveillance state’. While it’s true that being under the constant watchful eyes of security cameras may affect a sense of privacy in public spaces, the presence of the cameras would also make it more difficult to commit crime and could potentially aid the fight against terror. For further information please visit www.7techgroup.com


Cologne Cathedral Square

Single sensor

PanomeraÂŽ

DallmeierPanomera_allgemein_186x129_EN.indd 1

Total costs over a time horizon of 5 years

28.08.2018 12:00:42

Hands-off!

Code HandleÂŽ: The convenient way to protect sensitive stuff in public spaces campaigns.assaabloyopeningsolutions.eu/codehandle

aa_CodeHandle_advert_generic_halfpage_186x129.indd 1

17.04.19 09:59


PRODUCT LISTINGS

Astute Electronics

DSX manufactures integrated

Barco

Falken At Falken, we are a fully

Astute Electronics promises to deliver customers the best Quality, Service and Reliability. Astute is both an Electronic Components distributor and a global and UK parts supplier. The company’s highly-qualified team is experienced in procurement, engineering, logistics, finance, program management and QA. www.astute.co.uk

BUSINESS DATA SURVEILLANCE CAMERA

Barco designs and develops visualization solutions for the security market. With its own facilities for Sales & Marketing, Customer Support, R&D and Manufacturing in Europe, North America and Asia Pacific, Barco is active in more than 90 countries with 4,000 employees worldwide. Barco posted sales of 1.158 billion euro in 2013. www.barco.com/references

TRAFFIC CAMERA

REMOTE INTERACTION REMOTE NETWORK

Smarter visualization Networked visualization leading to smarter decision making

solutions for the access control and security industries. Based in Dallas, DSX designs all software and hardware in house. The company motto is: ‘Integrated Solutions and real world applications are what we do best.’ DSX products are sold worldwide through a network of factory-trained dealers. Dealers are located in the US, Canada, Mexico, Latin and South America, Europe, Middle East, Australia and the Pacific Rim, and Nigeria amongst others. www.dsxinc.com

licensed, registered, and insured professional service, equipment, manufacturing and retail supply firm. Founded and staffed by former law enforcement officers and retired military personnel, we have grown to become a trusted and secure global provider. www.falken.us

A reliable networked visualization solution is indispensable to monitor, analyze, and share an ever increasing number of video and data sources all over the world. That is why Barco designed its networked visualization solution, the simplest and most flexible way to securely distribute any information to any location. The result: faster and smarter decision-making.

Bosch Security Systems

Learn more about networked visualization at www.barco.com/netviz

14090.BARCO.resize.ad.in security.netviz.indd 1

24/04/14 15:43

Offer an extensive portfolio of innovative, high-quality, ergonomic products and systems for security, safety and communication. Our product range includes video surveillance systems with state-of-the-art IP-solutions, access control systems, intrusion detection systems, fire detection and evacuation systems, security management systems, paging and personal security systems and public address and conference solutions. www.boschsecuritysystems.com

FLIR FLIR Systems, Inc. is the global leader in Infrared cameras, night vision and thermal imaging systems. Our products play pivotal roles in a wide range of industrial, commercial and government activities in more than 60 countries. www.flir.com

ept

Dallmeier One of the world

leading providers of products for network-based video surveillance solutions, already has more than 30 years experience in the development and manufacture of high quality components and complete solutions for the CCTV/IP sector. www.dallmeier-electronic.com

egrated

s

1 mm

hall 4, stand D80

06.02.2012 11:05:55

46 | IN40 SECURITY | November 2019 I September 2019 I IN SecurIty

Hitachi Hitachi’s 3D LiDAR “Time-of-Flight” (TOF) sensor adds an enhanced layer of security / marketing data to existing systems using advanced infrared motion technology. Hide.Hayashi@hitachi-eu.com


To have your company included in this listing contact Wayne Banks on +44 (0) 1622 201207

Honeywell Security Group

Paxton Access Ltd is a leading manufacturer of electronic access control systems. From its inception Paxton has aimed for engineering excellence. This means designing and manufacturing intelligent and innovative products that are fit for their purpose. We have become a market leader through our constant efforts to exceed the expectations of installers and system users. www.paxton.co.uk

Keytracker Ltd

Samsung Security

delivers the newest innovations, technologies and products. Honeywell is driven to maintain its position as an innovator and leading manufacturer, and invests continuously in R&D. Each of the product ranges regularly delivers new features and technological advancements, while maintaining a familiar user interface and backwards compatibility for ease of installation. Honeywell is a world leading security business. www.security.honeywell.com

Secure Storage & Management for all Keys & Equipment Mechanical & electronic tracking to suit all budgets & applications, low spec to high tech – the world’s largest range of tracking systems for keys & equipment. Keytracker Ltd, Keyper House, Unit 3, Station Road, Rowley Regis, West Midlands, B65 0JY sales@keytracker.co.uk www.keytracker.com

Samsung Techwin is one of the fastest growing professional security brands in Europe. Providing a complete range of security solutions that are suitable for a wide range of applications, the company is dedicated to developing technology and products that its clients demand. www.samsungsecurity.com

The leading global M2M managed services provider

It’s good to be well connected.

Dual vision, Real time. Keysure

ULISSE COMPACT THERMAL The positioning unit offers an integrated solution for total darkness, fog, rain or smoke.

KEYSURE’s patented Key Control container is a pilfer proof, tamper evident key safe. This is the only non-electronic security device that will control and audit the use of a key, password or any other content. Once an item is secured inside the Key Control, it must be physically broken to access the contents. www.keysure.net CCTV PRODUCTS

Your M2M solution is more than just data connectivity. We understand that.

Videotec Dual vision, Real time.

So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers.in-house Videotec manufactures

ULISSE COMPACT THERMAL a wide CCTV products That’s why Wyless is the trusted M2Mrange partnerof of Fortune 500 companies

The positioning unit offalike. ers an integrated and startups We’re the easiest company to work with. We listen to our solution for total darkness, fog, rain or smoke. customers and take pride in every connection.

recognized for high performances, flexibility and style. Our mission to Wyless offers truly uncompromising M2M solutions, delivering worldwide lead the field in the development wireless connectivity via the most secure and resilient network infrastructure. We provide unrivaled management tools and empower with end-to-end of robust, reliable andyou high managed services, technical expertise and dedicated support. performances mechanical and So connect with the experts and together we’ll take your to the electronic products forapplications surveillance next level. You have found your true M2M partner. applications is the driving force We can’t wait to discuss the possibilities. behind our success. www.videotec.com

www.videotec.com

CCTV PRODUCTS www.videotec.com

Wyless Systems

Luminite Luminite have been designing and manufacturing PIR detection systems for 35 years and have extensive expertise in the security market. Their flagship Genesis wireless security range provides rapid, flexible and robust solutions to minimise installation costs and maximise profits. www.luminite.co.uk

+1 617 949 8900

Our award-winning M2M platform, delivered in partnership with the world’s largest mobile network operators, provides secure, reliable wireless connectivity to mobile and fixed devices in nearly every country in the world. Our unique products and services help our customers deploy robust, scalable and secure applications. +44 1895M2M 454 699 info@wyless.com www.wyless.com www.wyless.com

The leading global M2M managed services provider

It’s good to be well connected. IN SECURITY | November 2019 | 47

Your M2M solution is more than just data connectivity. We understand that. So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers.

That’s why Wyless is the trusted M2M partner of Fortune 500 companies and startups alike. We’re the easiest company to work with. We listen to our


Audio made smart & easy.

AXIS C1004-E Network Cabinet Speaker

AXIS C3003-E Network Horn Speaker

AXIS C2005 Network Ceiling Speaker

Axis network speakers are complete high-quality audio systems in a single unit. And because they’re based on open standards, they’re easy to integrate with other systems. Our ceiling and cabinet speakers are perfect for public address system and background music in stores and other settings, such as schools. And with our horn speaker you have a cost-efficient way to deter crime by complementing your video surveillance solution in outdoor settings.

Learn more about our network audio systems at www.axis.com/products/audio


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.