Home Articles posted by a&s Adria (Page 112)

Fire Alarm & Detection Market Set to See $56 Billion by 2030

The global fire alarm and detection market size is expected to reach USD 56.07 billion by 2030, registering a CAGR of 7.2% from 2023 to 2030, according to a new study by Grand View Research Inc.

The deployment of fire safety systems in homes and businesses more frequently is anticipated to have an impact on the expansion of the market. The market for fire alarms and detection is also anticipated to develop as a result of factors like an increase in the deployment of fire safety systems in educational institutions and rising awareness of fire detection among the residential and commercial sectors. Analysts also suggest that the market development will be fuelled by technological advancements, increased fire safety awareness, rapid urbanisation, and industrialisation. The commercial and industrial sectors are expanding, and people are becoming more conscious of fire safety, which has a good effect on the business environment.

To preserve lives and prevent injuries, it is vital to install fire alarm and detection systems in everything from homes to buses. Government initiatives to implement fire protection systems in the commercial and residential sectors are anticipated to drive the growth of the market. The market’s growth are anticipated to be constrained by the high initial costs of the systems as well as worries about false alarms and detection failures.

As stated in the new report, government support and initiatives are becoming more prevalent. Various businesses are increasing fire-related expenditures, but death tolls and property losses have also increased. The demand for advanced fire safety systems in fire-prone industrial settings, such as automotive, power & utility, mining, petrochemical, and oil & gas exploration, will drive the market growth over the years.

Asia Pacific region is expected to be the fastest-growing regional market during the forecast period.

Some of the more prominent players in the fire and detection market and mentioned in the report are companies such as, Eaton, Gentex, Halma, Hochiki, Honeywell, Johnson Controls, Napco, Nittan, Bosch, Siemens, Space Age Electronics, and United Technologies.

Seagate to Pay $300 Million Penalty for Shipping Huawei 7 Million Hard Drives

Seagate Technology Holdings has agreed to pay a $300 million penalty in a settlement with U.S. authorities for shipping over $1.1 billion worth of hard disk drives to China’s Huawei in violation of U.S. export control laws.

Seagate sold the drives to Huawei between August 2020 and September 2021 despite

an August 2020 rule that restricted sales of certain foreign items made with U.S. technology to the company. Huawei was placed on the Entity List, a U.S. trade blacklist, in 2019 to reduce the sale of U.S. goods to the company amid national security and foreign policy concerns.

The penalty represents the latest in a string of actions by Washington to keep sophisticated technology from China that may support its military, enable human rights abuses or otherwise threaten U.S. security.

Seagate shipped 7.4 million drives to Huawei for about a year after the 2020 rule took effect and became Huawei’s sole supplier of hard drives, the Commerce Department said.

Even after “its competitors had stopped selling to them … Seagate continued sending hard disk drives to Huawei,” Matthew Axelrod, assistant secretary for export enforcement at the Commerce Department’s Bureau of Industry and Security said in a statement. “Today’s action is the consequence.”

What’s next for access control and facilities management?

Connectivity and convenience are key priorities across multiple business functions and capacities — access control very much included.

 They also emerge as key themes in the latest edition of a key market report. Using new data collected from a survey of 400 security, facilities management and IT professionals around the world, the Wireless Access Control Report 2023 identifies trends set to influence this market over the coming years.

The new Report includes contributions from professionals at Omdia and Digital Access Solutions experts at ASSA ABLOY Opening Solutions.

“A particular focus of the 2023 Report is access control’s potential impact on the wider business — as an enabler for business intelligence, cost efficiency and of course better sustainability performance,” explains Richard Sharp, Director, Product Line Management, Digital Access Solutions at ASSA ABLOY Opening Solutions EMEIA.

“The Report also highlights ways for security departments and consultants to contribute directly to strategic business performance.”

Drivers for boosting convenience and efficiency

Convenience — effectively just another way of saying “operational efficiency” — has triumphed. Technology end-users prize flexible, scalable technologies which are easy to use and to integrate with companion systems. In the Report survey, 93% of respondents agreed that compatible, integratable standards are important when choosing or recommending access control.

“Security is often assumed these days,” adds Sharp. “The role of access control is now to help businesses work smarter, saving time and costs in the process.”

The most important technology for convenience is the smartphone. Data from the 2023 Report highlights the growing deployment of mobile credentials in organizations of almost every size and type.

Among the organizations surveyed, 29% said they had already rolled out mobile credentials, in place of or (more often) alongside traditional cards, badges and the like. A further 40% expected to issue smartphone credentials within the next 2 years. According to Omdia research, “no other equipment type in the Physical Access Control (PACS) market is expected to experience a comparable growth rate.”

In most cases, the main motivation is convenience. Survey respondents placed convenience above both cost and security, when asked to list the benefits of mobile credentials. Even in cases where a rollout of mobile is not yet imminent, there is good reason to invest in mobile-ready solutions.

“Future-proofing every investment you make in access control technology, to ensure it offers the option of a future rollout of mobile credentials, is now essential,” says Sharp.

Are security teams ready for holistic cyber/physical security practice?

A growing number of businesses already adopt a holistic approach to security, combining cyber and physical under one internal roof. “It’s not enough to have an efficient, convenient and secure access control system if it doesn’t have the right digital (cyber) protection,” notes the Report. “If the digital part is insecure or flawed, the system is vulnerable, and the same goes for the mechanical part.”

For this reason, cyber-security compliance will soon be a condition of sale for any digital product launched within the EU — and therefore, given the size of the European market, relevant for manufacturers from all over the world.

Yet many ‘traditional’ security staff remain uncertain about relevant regulations, including the European Cybersecurity Act and NIS2, which hits its compliance deadline in 2024.

Indeed, presented with 4 important regional laws and directives which are (or soon will be) critical to cyber- and physical security, 55% of Report survey respondents did not recognize any of them.

Only 12% said they were fully prepared for the implications of cyber-security legislation.

“There is cause for optimism: this is at least a ‘known unknown’,” says Sharp. “It’s now the job of industry leaders like ASSA ABLOY to help customers and partners calculate their next steps in filling this important gap. Now is a good time to upgrade both systems and knowledge.”

How security managers can influence wider business strategy

Who are the main influencers for important decisions around security and access control technology, including budgets? According to Report data, all too often it is not the people who will commission and manage these systems.

However, a deepening focus on cost and workflow efficiency presents an opportunity for security managers and directors to show how their function can contribute to business success.

“Data gathered from security systems can be used in many other areas of the business, such as managing the hybrid working patterns of the staff and improving energy efficiency by only heating and/or lighting areas of the building which are occupied,” notes the Report.

Integration across building systems is critical. The flexible, scalable, interoperable system is about more than just convenience. According to Deloitte*: “The value of integration has long been ignored and those early adopters who have embraced advanced integration have seen those benefits, the reduced risk, and cost savings integrations create.”

Sustainability is another important area where access control decisions make a rapid impact. Wireless locking solutions are faster and less intrusive to install. They use much less energy during usage than wired solutions and usually require very little maintenance. Choosing wireless access control can be an important element in an organization’s sustainability strategy: 89% of survey respondents said their access control technology decisions would be influenced by sustainability concerns.

“Security can escape its silo,” Sharp adds. “Indeed, it must, if organizations are to thrive in the challenging economic climate ahead.”

The 24-page Wireless Access Control Report 2023 includes wider trends coverage and exclusive expert analysis. To download your free copy, visit https://www.assaabloy.com/group/emeia/campaigns/wireless-access-control-report-2023

City of London Police to Deploy Motorola Body Worn Cameras

The City of London Police force is set to roll out the Motorola VB400 body-worn cameras to its entire police force.

“City of London Police is dedicated to ensuring London is a safe and attractive destination, and the body-worn camera roll out will help our officers continue to serve and protect those who live in, work in and visit the city,” said Superintendent Neal Donohoe, City of London Police. “The new video technology will capture valuable incident footage that provides an objective record to promote transparency and accountability while also helping to keep our officers and communities safe.”

Known for its modern approach to policing, the City’s police force relies on advanced technologies to maintain safety and security throughout London’s bustling Square Mile which hosts around 8,000 residents and 513,000 transient commuters who travel in and out of the City each day. The new VB400 body-worn cameras will integrate seamlessly with the police force’s existing ecosystem of technologies to maximize end-to-end safety, security and productivity. Collaboration with the Pronto mobile digital policing platform will align video footage with other incident report information and connectivity with a wide range of sensors will automate recording when critical events occur, such as an officer pressing the emergency button on their MXP600 Tetra portable radio.

Designed to streamline an officer’s workflow, after a shift, officers simply place the VB400 into its dock where it will automatically upload footage of the day’s events into Videomanager evidence management software. Videomanager will store the data in-country and organize it with time, date and location details along with supporting incident data reported by officers.

“We’re proud to support City of London Police with an ecosystem of public safety technologies that help officers form a more complete picture of everything that’s happening around them,” said Fergus Mayne, country manager for U.K. and Ireland at Motorola Solutions. “Ultimately, clear and timely information helps them to work more efficiently and make better-informed decisions, leading to better safety and security outcomes for all.”

This is the latest in a series of Motorola Solutions’ body-worn camera deployments both within law enforcement and enterprises globally, including French Gendarmerie and National Police, London Ambulance Services, Malta Police, U.K.’s National Highways and rail operators, Metro Rio and Swedish Rail.

Interview: Leo Levit, Chairman, ONVIF

In an exclusive interview with a&s Middle East, Chairman Leo Levit charts the course of the ONVIF’s paradigm-shifting role in promoting interconnectivity, metadata processing, and IoT for the needs of the next-gen security industry

a&s Middle East

Mr. Levit, thank you very much for your time. At the very beginning, we would appreciate it if you could introduce yourself to our readership.

I am Leo Levit, Chairman of the Steering Committee of ONVIF. I am also the Director of Systems Integration for Axis Communications, a company I have been with for nearly 8 years. I am based in Lund, Sweden at the global headquarters of Axis. My background also includes positions at Ericsson and Sony where I also contributed to product portfolio and business growth.

What does ONVIF conformance mean, and how it works?

ONVIF develops and publishes interface specifications that manufacturers can implement into their products. Product conformance is based on at least one of the seven profiles developed by ONVIF. Manufacturers test the products using the ONVIF profile-specific test tools to ensure that the products meet the mandatory specifications of the profile. Only companies that are members of ONVIF at the full, contributing (including registered affiliates), and user levels are eligible to submit their products for conformance and have their products listed in the ONVIF conformant products database at onvif.org.

For system integrators and end users, the ONVIF conformance process provides a level of out-of-the-box interoperability between products that conform to the same profile. Today we have a database of more than 26,000 conformant products that the market can select from to build a security system from components of their choosing, regardless of manufacturer.

What are the mandatory features of a product to be conformant to the profile?

Each profile has its own set of mandatory features, and there are also different requirements for devices and clients for that profile, as the capabilities of software clients and hardware are different. For example, in Profile T, it is mandatory for both clients and devices to have media streaming ready out of the box, but PTZ control is mandatory only for clients such as a VMS, as not all devices will be PTZ cameras. The only mandatory requirement across all profiles is the ability for both clients and devices to perform queries to understand which features devices and clients support.

What is ONVIF’s role in deepening relationships between analytics, IoT, AI, and other technologies?

We have actually made great strides in this area in the last few years, with the introduction of Profile M, which address almost all of these technologies at a foundational level in terms of standardizing the handling of metadata and analytics events, providing access to IoT environments, and enabling cloud-based solutions. Bringing these basic capabilities into the ONVIF conformance process expands the choice of and accessibility to products and services for system integrators and end users. As the industry continues to adopt these types of solutions and as these technologies advance, I would expect future ONVIF profiles to address the needs in these areas.

Are you encountering inappropriate competition in this area or products claiming a non-existing ONVIF certificate?

ONVIF has been the de facto standard for IP interoperability for physical security for many years so it’s only natural that we have seen some false claims of conformance. This is fairly common among certification and conformance-based organizations. However, we take these very seriously and consistently monitor for false claims as well as enable the public to report false claims directly to ONVIF, through a reporting tool on our website. We are continually refining our processes to be as robust and reliable as possible.

How is the security industry using meta-data today, and are you satisfied with that direction?

I think the security industry and the greater technology sector are at the beginning of understanding how to truly harness the possibilities of metadata. Our industry’s video devices are some of the most powerful sensors, capable of collecting massive amounts of metadata. So right now we are very good at collecting metadata, but the need to analyze and interpret this information is in its infancy. This is where standardization comes into the picture, as this will allow for greater innovation in this area and the ability to scale the solutions that are developed.

Two years ago ONVIF adopted the GitHub open-source development platform. How has that strategic step been reflected in your operations since then?

The primary driver of moving specification development to GitHub was to reduce the administrative burdens on our volunteer members who oversee this process as well as to provide increased transparency to the ONVIF Core Specification development, which has always been publicly available on our website. Anyone with a GitHub account can now make suggestions on these specifications, including contributions from software engineers and developers from other disciplines, such as cloud services, AI, and IoT. This move to open source will enable us to bring new developments to market more quickly with increased accessibility to ONVIF specifications and because of the automation available via GitHub for the detailed, process-oriented work required to produce technical specifications.

Do you plan any upgrades to the existing profile-based model to improve interconnectivity?

Profiles are developed based on a set of features from the ONVIF Core Specifications that enable companies to develop a functional product solely on the profile specification. This profile concept will not change. What we have done is introduce a concept called an Add-on, which is centered on addressing a specific use case. An add-on, by itself, is not comprehensive enough to qualify as a profile. These add-ons can be developed more quickly and allow member companies more flexibility when bringing new features to market that increase interoperability and fall under the ONVIF conformance process. As an example, we expect our first add-on to support TLS configuration, which is scheduled to be released this year.

How do you deliver the full benefits to cloud-based ecosystems at the time of their surge in popularity?

The ONVIF value proposition is to expand interoperability between different technologies and accessibility to those technologies to market players of all sizes, using our standards. With the cloud, our mission here is the same. It is important that we address what is specifically needed to help the industry expand into this area and diversify from the traditional device-to-client scenario that is keeping things on-premise. Determining the most suitable way to standardize the method of communication within different cloud components will be key.

Will the meteoric rise of AI have any short-term impact on the way you approach your goals, or is it still too early to predict the outcome?

I would say that it is definitely too early to predict the outcome, but there is no doubt that the growth rate in AI and the need to address the impacts with standards have accelerated our pace and refined our direction in this area. We see this as a natural progression of our support for the industry and also an opportunity to grow the scope of ONVIF outside of the traditional physical security realm into cloud and metadata. This includes how this information is communicated and received, stored and analyzed, and how the cloud aspects of this integrate with other components as part of a hybrid system.

Your position sounds like a very unique one. You have a genuine overview of thousands of products available in the market. What is the big picture you see? Where is this industry of meta-data processing devices and IoT as a whole heading?

Technology is developing at warp speed, much faster than the industry can adapt to on both the manufacturer and end-user levels. This includes AI technology and the shift from moving boxes to selling services and everything in between. From an ONVIF perspective, this will only continue as systems gradually migrate to the cloud, offering increased computing power for metadata and analytics and growing accessibility to larger IoT environments.

We have already set the stage for this transition in Profile M in two key areas.  Profile M conformant “devices” can now be physical hardware or a cloud- or server-based service or software, moving away from the traditional hardware device-to-software client paradigm. And because Profile M leverages MQTT, a common communications protocol in the IoT space, this opens up possibilities for new integrated applications and the ability to connect to different entities in an loT or automation ecosystem.

What will the main focus of ONVIF be in the following five years?

It is likely that working in the areas of metadata, IoT, cloud, and analytics will be at the forefront for the next five years, and probably many more after that. However, the work of ONVIF is driven solely by its members, and it is up to the members to determine new profiles, add-ons, or other similar initiatives. As these technology areas will be major drivers of the physical security industry, we can see areas of potential work, such as standardizing measures that ensure video integrity, as well as further support for metadata and cloud connectivity. One thing that is certain is that we will continue with our mission, which is to provide standardized interfaces for the interoperability of IP physical security products. This has guided us since our founding in 2008 and has led to the increasing number of conformant products that the industry can select from to build systems with components of their choice, regardless of manufacturer.

 

The Impact of ONVIF Conformance

ONVIF’s conformance process allows system integrators and end users to select from over 26,000 conformant products to build a security system tailored to their needs, regardless of manufacturer.

Out-of-the-box interoperability between products that conform to the same profile provides ease of integration and seamless functionality.

The ONVIF conformance process ensures adherence to mandatory specifications, promoting reliable and standardized communication between devices and clients.

 

Embracing Cloud and IoT with ONVIF

ONVIF’s adoption of the GitHub open-source development platform enables increased collaboration and transparency, fostering innovation and development in cloud-based solutions.

Profile M opens up possibilities for leveraging metadata, analytics, and IoT technologies, enabling the integration of cloud- and server-based services in addition to traditional hardware devices.

Standardization in communication methods within cloud components is a key focus area to enhance interoperability and drive the growth of cloud-based ecosystems.

 

Can Your Fire System Do This?

Fire detection and alarm systems are increasingly complex and sophisticated, benefiting from cutting-edge digital technology. As a fire alarm engineer working with these systems, it can be hard to keep on top of your electrical skills and the latest regulations/installation standards, let alone the many different features available.

Vladimir Zrnic, Regional Sales Manager for Europe at Advanced explains the diagnostic features of fire panels that can save you time, money, and hassle.

Despite many engineers being highly trained, without the right tools undertaking routine tasks can be challenging and time-consuming. Thankfully, the features of today’s fire panels offer tangible benefits, delivering versatility, ease of use, and time-saving capabilities that were previously unavailable.

 Standard logging versus trace logging

One of the first things to do to troubleshoot a suspected system fault is refer to the fire panel’s log. A high-quality system can quickly flag any system faults – within seconds in some cases. Although useful, standard logging gives only one part of the picture and provides minimal help in cases where the cause of the problem is not straightforward.

Trace logging is a feature of some modern fire panels that offers a more complete log of a fire system’s events covering the standard fire, faults, alarms, and pre-alarms as well as advanced diagnostic reports on corrupt data and device interrupts. This detailed view of a system’s faults can radically reduce the time it takes to establish the true cause of the problem, allowing you to implement a quick, effective remedy.

The process of fault-finding can be significantly more difficult when working with a fire alarm control panel that doesn’t feature a diagnostic logging mode. These panels may register a number of intermittent faults, without offering further traceability to these events. Commonly where a fire panel has a limited ability to trace a fault, issues within a system can go unresolved for long periods of time, placing the safety of occupants within a building or a site at risk.

Some fire systems give you the ability to transfer the panel’s event log to a PC where you can then use software, such as the Service Tool on Advanced’s Axis EN control panels, to drill down into specific events and information. Integrated software allows you to easily identify particular devices that are returning corrupt messages, and even lets you predict when faults are likely to occur. Once a problematic device or area has been identified, you are then able to investigate.

The oscilloscope

In cases where you are working across large sites, identifying disturbances on a loop can prove labour-intensive and time-consuming.

An oscilloscope built into the fire alarm control panel will not only relieve you of having to carry around additional equipment but also provides a graphical representation of the signalling voltages/currents and waveforms on the display. This gives a detailed view of the loop operational conditions which can’t be seen using multi-meters or volt meters.

As the only intelligent addressable fire alarm control panel in the world to offer an onboard oscilloscope, Advanced’s Axis EN panel provides readings from any loop, making it easy to identify forms of noise that may be causing faults. The oscilloscope also lets you easily use trigger addresses from the loop to identify issues and investigate. This is a particularly useful feature on large sites with multiple panel networks, such as high-rise buildings, shopping malls, hotels, or college campuses.

The multi-meter

A high-performance fire panel will provide you with powerful tools that enable you to quickly and efficiently access information in order to make key decisions. A multimeter is an instrument designed to take precise measurements of electric current, voltage, and usually resistance across the system.

In a well-designed system, all devices have the optimum voltage in order to be able to communicate back to the panel. However, if that voltage drops below a certain level, devices can drop off the system or report intermittent faults.

Uniquely, Advanced’s Axis EN fire alarm control panels come with an in-built multi-meter designed to measure all voltages and currents across the fire alarm system. For engineers, a multi-meter within the fire panel makes it easy to identify voltage/current levels in real-time without needing to set up a portable multi-meter or probing circuits, which speeds up the commissioning process.

What is next for diagnostics?

As technology evolves and the fire industry moves increasingly towards cloud communications and data analytics, we will continue to see a trend toward more digital-driven products and remote services. This evolution towards smarter systems will provide an even deeper insight into modern fire systems, ultimately improving safety as well as saving time and money for engineers and end users alike.

How Much Does a Security System Actually Cost?

When buying a security system, decisions often come down to the price tag of cameras, storage, and installation, yet taking this approach can leave the end user with major challenges ahead. Surveillance systems last anywhere from five to 20+ years, so condensing all cost considerations down to the initial expense fails to consider the bigger picture.

By: Ricardo Marranita, Product Growth Manager, Axis Communications; E-mail: ricardo.marranita@axis.com

The initial costs to purchase and set up a security system tend to account for just 30% of the total costs experienced during the lifetime of the system – also known as the total cost of ownership. Despite this, many end users may even make their decision based on the price of cameras alone. In effect, they are making their choice with just a 10-15% view of the total security system costs. The reality is that roughly 70% of expenses come after the system has been installed. Sadly, these can come as a nasty surprise for those end users who have not considered the indirect security system costs.

Taking some time to think about how the system will be used and the costs associated with that use can create significant savings in the long run. Initial choices – such as the type of device to deploy –impact future expenses, from power consumption to monitoring and maintenance. While we’ll focus on cameras specifically here, this principle applies to any device within a surveillance system. Considering the total cost of ownership will help you to identify the questions to ask as you make your decision on which new security system to purchase.

Look Beyond the Cameras’ Price Tag

Filtering is an important step in the purchase process: setting out your surveillance requirements and the available budget is key to narrowing down your choices. Unfortunately, too many initial conversations around requirements focus on the cameras alone, without considering the broader requirements of the system as a whole – from energy use to storage needs.

It might be tempting to focus the budget conversation on cameras, rather than where money will need to be spent to operate and maintain those cameras. Yet the security system will need to support your needs for the foreseeable future. It’s worth remembering that the costs to operate, monitor and maintain certain cameras often exceed the devices themselves and must therefore be weighed up before the purchase is made.

Forecasting Storage Costs

If you’re in the market for a new surveillance system, it’s very likely that you’ll need to consider how to store footage once recorded. On average, legislation requires potential evidence to be stored for a month. Yet in some regions or use cases, this is extended to 180 days – making storage a considerable factor in overall security system costs.

To avoid being caught out with significant server and electricity expenses after cameras are installed, it’s critical to consider the different storage costs associated with each camera model you’re considering. It can be a false economy to purchase cheaper cameras to cut down the initial outlay if they come with vast storage requirements, forcing you to spend more on servers and energy costs in the long run.

Equally, if you plan to reduce storage costs by shrinking the size of the video stored, you will need to carefully choose the right devices to ensure that compressing the video doesn’t compromise evidence quality by pixelating or blurring images to the point that it’s no longer possible to identify a suspect. Ending up with poor-quality footage that cannot act as useful evidence can defeat your objective of installing the security system in the first place. Some cameras come with sophisticated technology that can reserve all the important forensic detail you need while lowering bandwidth and storage requirements, and therefore long-term costs. It’s worth checking any claims of high-quality footage with low storage requirements before you install the system to ensure it meets your expectations.

Each set of requirements is unique. For example, you may require high-quality images even in the dark. While some cameras might compensate for low light levels by increasing the gain and therefore, storage requirements and costs, other options use alternative light-optimizing technologies that do not have the same large-scale impact on storage costs. They might even help you to save your budget by removing the need for additional external lighting.

Anticipating All Indirect Costs

The type of device you choose will influence costs far beyond storage. To forecast the full security system cost, monitoring, maintenance, and electricity use must also be considered.

Once you crunch the numbers, the costs can start to build up quite quickly but crucially, the devices you choose will have a knock-on impact on the extent of these figures. Opting for more economical cameras and devices at the start can result in staggering indirect costs. By contrast, choosing higher-quality cameras and devices at the outset can enable you to cut those indirect security system costs in the long term, introducing savings that you can use to reinvest in and grow your business faster.

As one example, owners of surveillance systems installed in tough environmental conditions, such as a maritime port or chemical plant, may face significant maintenance bills to clean salt water and dust off cameras. By upgrading to more sophisticated cameras that offer remote cleaning functions, or have been designed with self-cleaning materials and components, such as a hydrophilic dome, they can reduce the maintenance – and therefore costs – required.

Turning a Purchase Into an Investment

By considering how your initial decision on which type of camera to buy can impact the chain of future costs, you can shift the purchasing decision into an investment. Achieving this can be as simple as asking yourself just a few questions.

The first concerns the features you want to get with the camera, as well as the need for storage space that getting such a camera entails. Another question concerns the projected costs of powering such a system in the long run. It is important to get a picture of the role of supporting technologies in the camera in the formation of total costs. Finally, it is worth looking at their share in general costs.

The question ‘How much does a security system cost?’ goes far beyond the initial purchase. Making the right choice for you based on the bigger picture can mean a slightly higher initial outlay, but it pays itself back in the long run.

In short, taking the time to ask the right questions at the outset – and finding partners who are open to answering those questions and helping you calculate the long-term costs – allows you to avoid any nasty surprises in future electricity, storage, operational, or maintenance costs. Importantly, it will also ensure that you end up with the security system that is right for your specific requirements.

Five Steps to Optimize Your Investment

Deciding which security system to purchase demands careful consideration. After all, security systems can last for five years or more, so weighing up all relevant factors at the start can lead to significant cost savings and an improved return on your investment (ROI) in the long run. While it may feel daunting, there are five straightforward steps you can follow to ensure you are making the most of your investment. Following these steps enables you to decide on the right security system for your organization, while also optimizing your investment.

Choose the Camera According to the Value It Adds

It may seem obvious but as an initial step, ask yourself “Why are you buying cameras?” Device price and features are important considerations, but it’s vital to understand what your organization needs the cameras to do before you start to weigh up the value of the different functions on offer in each.

Clarity here is vital to figuring out if the cameras on your shortlist will perform in the way you need or provide the evidence you require. For example, are you installing a security system to protect profits in a retail environment by tackling theft and fraud? Are you aiming to optimize production and avoid downtime in a factory? Or are you looking to ensure the safety and security of your employees and passengers in a public transport setting?

There are many different ways in which security systems can be deployed to help your organization – from improving security to creating business value. Narrowing down why exactly you are purchasing the system is a key first step to ensuring you are set up to optimize your investment.

Calculate How the Device Influences the Rest of the System

Next, you will need to figure out how your camera choice affects the rest of the system. Storage is an obvious factor in this calculation. More inexpensive cameras may seem appealing but if their compression technology is limited to reducing bitrate to lower bandwidth and storage requirements, that saving comes at the cost of quality footage – jeopardizing the very reason you’re installing the system in the first place. On the other hand, more sophisticated cameras may have a higher initial cost but come equipped with intelligent algorithms that preserve relevant forensic information in full resolution and at a full frame rate while requiring a lot less storage space. As a result, you can recoup the initial price through lower storage costs in the years to come.

Yet storage requirements and costs are only one piece of the calculation to consider at this point. What about ease of installation? Or how fast it will be to configure the devices and add everything to your system?

It’s also worth thinking about what accessories you will require to ensure the security system meets your objectives if you choose certain camera models. For example, if the cameras you have chosen require extra accessories to mount, this will have a knock-on impact on installation – making it slower and more costly than initially predicted. If you realize this on the day of installation, there is a significant risk of delays to the whole project. To optimize a security system investment, the full picture of all costs – not just the devices themselves – is important.

Estimate the Cost of Using and Running the System

It’s also important to ask, ‘What happens once the system is up and running?’ This step is often overlooked: some may accept the system’s operational costs as the natural cost of doing business, while others may not put too much thought into it if it ends up under another department’s budget. Yet spending some time to think about the costs required to keep the system up and running is important for all decision-makers involved in purchasing a security system: it’s where the bigger losses creep in. While it might not affect you or your department directly, it impacts your organization. And if your company loses money through the system’s high running costs, it could eventually impact your budget too.

This means that it is worth thinking about the electricity usage, required maintenance and the costs of monitoring the system. But how can the different cameras in your shortlist affect these costs? You can assess this by writing down a few key questions.

First, you need to consider how much power your cameras use and how this might affect your electricity bill? On a related note, how much storage do you need for specific cameras and how does that affect your electricity costs in the long run? Finally, you need to know if the cameras offer any smart functionality to reduce the overall cost. For example, do they offer superior analytics performance such as deep learning and edge analytics, reducing false alarms and speeding up forensic search to reduce operational costs? The devices you choose will ultimately impact all the costs to come throughout the security system’s lifecycle.

Predict the Impact the System Will Have on the Business

Once you have mapped out the bigger picture cost implications for the cameras on your shortlist, consider the end result: how will the system help your business? Will it drive greater efficiency, reduce theft, improve the service you provide to customers, and improve employee retention by creating a safer workplace?

Ultimately, the correct security system for your organization can create business value, which translates to improving the bottom line. It’s important to quantify how the security system will impact your business so you can weigh those benefits up against the total costs when making your decision.

Thinking this through often involves collaboration across departments, ensuring the bigger picture of the system’s impact on the business as a whole is considered. As an added benefit, cross-departmental cooperation also opens up the possibility of tapping into bigger budgets and getting additional buy-in on the surveillance system as well as the advantages it can bring to the business.

Make the Best Decision for Your Organization

This final step is about evaluating the information you have uncovered in the previous stages and factoring all of those insights into your final decision. As long as you are taking some new insight from this process, whether considering the value added of the device you are choosing or calculating its associated running costs, you are taking a step in the right direction – moving from purchasing a security system to making an investment that can reap better rewards for your organization.

Completing this exercise of working through the various scenarios attached to purchasing different security devices will set you up to optimize the system you buy to your company’s benefit. Rather than making a choice based on upfront cost, you are making a decision with the long-term view in mind and reducing the risk of unpleasant surprise costs cropping up in the years to come.

Working with the right partner to select the right system

Importantly, you don’t need to do this alone. The process of asking these questions helps you identify which partners are invested in your organization’s long-term success. It’s critical to find the right partner who will work through these scenarios with you to find the system that works in your best interest – both in terms of a total cost of ownership that works for you and a system that meets your requirements to drive long-term value.

Video surveillance in the warehouse: detailed review

Statistics show that most thefts in warehouses are carried out by… the staff themselves. Therefore, surveillance cameras at such facilities perform two important functions at once: they help to reveal crimes that have already been committed and keep workers from doing bad deeds.

And in general, video surveillance brings discipline. And in case of emergency situations or accidents, CCTV cameras allow you to quickly learn about the event and react to it.

Where is the best place to install CCTV cameras in the warehouse?

It is important to carefully consider the location of the equipment in order to cover all important “risk zones”. As a rule, they include:

  • Entrances and exits
  • Places of unloading/loading
  • Places for storing goods
  • Sorting zones
  • Perimeter fencing

Pay attention! High-resolution CCTV cameras are recommended at entrances/exits and sorting areas. After all, it is important here to distinguish people’s faces, car license plates, and even product labels.

If you deal with small products, it is worth installing additional CCTV cameras that will be directed to the shelves with the goods. Place CCTV cameras in unloading/loading areas so that the view is not obstructed by traffic.

Also, CCTV cameras should be mounted at a sufficient height. So they will not be damaged during loading and unloading operations. And thanks to this, no one will be able to get to them to deliberately blind or change the viewing angle.

Do not forget also about the critical rule of good installation: all wires must be in corrugations or into special channels in the walls; CCTV cameras — on mounting bases.

Important moment! Warehouses are usually not well-lit. Therefore, you should choose surveillance cameras with high sensitivity and good infrared illumination. To protect the perimeter, you should pay attention to full-color CCTV cameras that can work in Full Colour 24/7 mode. For example, it can be .

In addition to IR illumination, this CCTV camera has powerful white LEDs that can work either constantly or when a person is detected in the frame. It is effective — it works both as additional illumination and as a “deterrent” of a potential intruder.

Special video recorders are usually used to record video data, but you can use an even more functional solution: Partizan Cloud Storage service. It’s simple, innovative and completely safe. So no one will be able to steal, damage or delete the video. And you will always have access to it even from your smartphone thanks to Partizan mobile application.

Security at the warehouse is easy! Don’t neglect it!

ASSA ABLOY Wins Red Dot Award for Hotel Door Lock

ASSA ABLOY’s electronic hotel door lock Vingcard Novel has been named Product Design winner at the Red Dot Awards for its stylish appearance, robust range of advanced functionalities and future-proof technology design.

In fierce competition with approximately 20,000 entries from more than 60 countries, the Vingcard Novel came in first and significantly gained praise for its ability to blend in seamlessly with any property’s style and for its unique modular design approach to components.

The Red Dot Design Award is one of the world’s largest design competitions and The Red Dot Label has become established internationally as one of the most sought-after marks of quality for good design. The award breaks down into three disciplines, of which product design is one, and winners are selected by an international jury.

”Vingcard Novel is a fantastic product and a true confirmation that we are focusing on the right aspects of product design,” says Perla Munhoz, the Global Head of Product Design at ASSA ABLOY. “Since it was first presented, it has been loved by our customers, especially architects and interior designers. Our focus has been to offer a product for indoor and outdoor use that meets all requirements and regulations while also providing a service and experience that’s truly outstanding.”