Home Articles posted by a&s Adria (Page 205)

Raising Resolution… in a Future-proof Solution

Large industrial units often have a large area containing quite disparate security needs. Hikvision has a wide range of technologies to cater for every need, as was recently seen by a rubber producer in Poland. Kabat Tyre, in Budzyń, produces of rubber products for industry and agriculture, including rubber mats, machine tires, and inner tubes. When it came to developing a new security system to cover its 30,000 m2 production plant, Kabat turned to system integrator Tel-Kom Serwis, which used Hikvision products to deliver a hi-res fit-for-purpose solution that was also scalable for any future development.

Old systems with no flexibility

Kabat Tyre needed to overhaul their security system which was smaller and using lower resolution devices from different manufacturers. They needed to provide hi-res observation for their production halls, warehouse, office building and outdoor areas, particularly to allay their fear of theft from the plant and to provide peace of mind and operational support in case of accidents.

In some areas, image quality in difficult lighting conditions was a particular concern. Not every part of the large area is well lit. Landfills for black rubber products (for example tires) do not reflect well the light, making them difficult to observe with cameras of lower sensitivity.

In addition to this, they needed reliable motion detection and the ability to combine independent recorders into one system. The system needed to provide all of this in scaleable way, as this would be a system that will be expanded in the future.

They wanted to be able to add new features at an affordable price, without a nasty surprise when the bill came in. This was particularly challenging since they could not know what functions they will need.

Sharper images… even in the dark

Tel-Kom Serwis built a solution for Kabat based around five Embedded 4K NVRs (DS-9632NI-I8 and DS-7716NI-I4). These provided a strong core for the solution, also using iVMS 4200 software to manage all of the cameras, all operating within one LAN.

For the outdoor placements, numerous Ultra Low-light Smart Bullet Cameras (DS-2CD4B26FWD-IZS) were used. These use Hikvision’s DarkFighter technology to provide bright, colorful images even in very low light conditions. To cover the internal areas of the production hall and corridors, the EasyIP 2.0 plus fixed cameras (DS-2CD2T42WD-IS) were installed, and IR fixed cameras (DS-2CD2142FWD-I) monitored the office.

The tire testing points needed a slightly different device, since temperature exceptions needed to be monitored to protect against potential fires. So here, a Thermometric Bullet Camera (DS-2TD2136T-15) was used. With hi-res images, even in the darkest areas, security operators have a much better view of what’s happening across the whole 3.5 hectare site.

Arkadiusz Wierzbicki, from Tel-Kom Serwis, says: “A Hikvision solution made perfect sense to deliver this solution for Kabat Tyre as it provides easy installation, reliability, intuitive operation and good image quality. There are also no hidden costs, which was important for the ongoing development of their system.”

So Kabat Tyre now has a high resolution solution that brings all of its security needs together in a system that can be expanded to meet their changing needs in the future.

The future also looks rosy, as Kabat’s investor was so satisfied with the quality of the system, that it is already in talks with Tel-Kom Serwis about expanding it further. It is planned to build more halls increasing the production potential, in which CCTV systems and Access Control will be installed by Tel-Kom Serwis.

New Highly Integrated Long-Range Surveillance System from FUJIFILM

FUJIFILM presents the new long-range camera module FUJINON SX800 to the surveillance systems market. With a full HD camera and an optically stabilized, 40x zoom lens from FUJINON, two high-performance components are integrated into one system. This innovation is the result of years of experience in digital cameras and a dedication to the highest optical quality. Thanks to its powerful 1/1.8″ image sensor, the long focal length range of 20 mm to 800 mm and state-of-the-art image processing technology, the FUJINON SX800 is ideally suited for aerial surveillance.

In modern society, the security needs of citizens are constantly increasing. Surveillance cameras with long focal lengths are not only used to address sensitive issues such as border security but are increasingly being incorporated into public infrastructure such as airports, seaports and motorways.

Long range surveillance systems must cope with special challenges. For optics with long focal lengths, the smallest vibrations are sufficient to compromise the image information. Heat haze or fog in the air also impair image quality. And, a focus drive that is too slow leads to safety-relevant information loss. However, with the development of the new FUJINON SX800, FUJIFILM has found a way to minimize the impact of these challenges. Instead of developing a surveillance camera and a separate matching lens, the concept of a fully integrated system consisting of camera and lens has been realized.

In addition to the high-quality zoom optics, the FUJINON SX800 has a powerful combined optical and electronic image stabilization mechanism that provides angle correction of up to ±0.22 degrees. The integrated high-speed autofocus provides a sharply focused image in less than a second, while a fog filter and heat haze reduction technology helps prevent weather interference.

The system provides consistently sharp images – even of objects several kilometers away. In addition, the integrated design of the new FUJINON SX800 reduces the high adjustment effort normally required for camera installation.

As of Q3 2019, the FUJINON SX800 will be available as both a mobile stand-alone device and as a system that can be integrated into a pan-tilt head.

Interview: Shengfu Cheng, Director of Marketing and Product Development Division, VIVOTEK

a&s Adria: Despite the strong growth of Chinese companies and the sharp decline of Taiwanese ones, Vivotek continues to progress, gradually strengthening its position in the market. The latest Security 50 survey tells us that you took 14th place in the global security arena, which is a move forward since you were 17th last year. What are the reasons for this success, how do you resist growing competition, what do you offer to your customers to continue being recognized as a brand-worthy investment?

Cheng: This positive result came from three strategies we implemented in 2018, which were AI plus cybersecurity, vertical market penetration and globalization.

1. AI + cybersecurity
To think out of the box and stay in competitive edge, VIVOTEK developed its new edge-computing network cameras with deep-learning technology. These smart cameras are able to reduce false alarm and analyze the video proactively, and transferring video data to useful user insights. We also built up a new AI R&D center in Taiwan and continued to expand talent recruitment.

Moreover, IDC market research predicts an overall volume of 30 billion devices connected via internet by 2020. This trend also applies to more and more IP surveillance network cameras are exposed to the internet, and therefore cybersecurity has become an emerging challenge in IP surveillance industry. Hence, VIVOTEK announced the strategic partnership with Trend Micro Incorporated, a global leader in cybersecurity solutions in the early of 2018 and rolled out the world first IP surveillance camera embedded with Trend Micro anti-intrusion software. The debut of our cybersecurity-defense solution has shown VIVOTEK’s commitment of providing our valued customers with the highest quality and most reliable products.

2. Vertical market penetration
VIVOTEK focused on three vertical markets, including retail, transportation, and building automation. VIVOTEK introduced intelligent IP cameras that can generate data of people counting, when combined with software on the backend, provide detailed analysis of data to help users achieve better security and business optimization. In transportation, We provide onboard, wayside and station surveillance systems. For instance, in road monitoring, we have partnered with many third parties to develop various smart functions for license plate recognition that can be configured to read license plates in many different countries. In building automation, VIVOTEK collaborated with Delta Electronics to integrate VIVOTEK’s cameras in LOYTEC building management system.

3. Globalization
VIVOTEK established 6 branches and offices in United States, Netherlands, India, Dubai, Mexico and Japan around the world. We will continue to establish overseas operations and hire local business development managers to expedite local service and respond to local needs more quickly. It will also hold various events in local markets to deepen relations with customers and promote the VIVOTEK brand value.

a&s Adria: The artificial intelligence (AI) marked the past year in the security industry and many companies have begun to work intensively on this segment. But Owen Chen, CEO of VIVOTEK, said that “most people misunderstood that AI refers only to face recognition and the ability to identify a person in some type of environment. However, technology is not in the focus of VIVOTEK. we make people confident using artificial intelligence by creating something that will respond to the real needs of users and protecting privacy.” What, in fact, these words mean and what is your company’s stand on AI technology?

Cheng: Artificial intelligence (AI) has become a must-have for most video surveillance system providers. Many companies boast of its superb recognition and analytic functions, especially when it comes to face recognition. However, many end users still have some concerns with AI due to privacy issues.

VIVOTEK established an AI lab to concentrate on developing AI applications in 2018.We focused on developing AI technology and deep learning on the edge (camera). Our focus has always been on how we can reduce false alarms and enhance business or operational intelligence. That is why besides face recognition, we are focused on developing advanced VCA functionalities that can recognize people and vehicles as well as perform smart searches.

The most important challenge is to think out of box and know the real demands of users. To work closely with our customers is able to allow VIVOTEK to receive up-to-date market insights, enabling us to transfer information in terms of product development and technological advancements.

a&s Adria: One of the biggest concerns that affects this industry is cyber security. Vivotek is one of only a few companies in this market that has implemented comprehensive cyber security protocols. What does that mean?

Cheng: Cybersecurity for IoT devices has been a hot topic in the past few years, and IP surveillance cameras are the hackers’ top target because of the relatively high computing power and good internet traffic throughput. At the end of 2016, a Linux-based malware “Mirai”iraices h to initiate a DDoS attack which created a record-high 1.2Tbps Internet traffic. The huge traffic was triggered by remote commands and the victim devices were mainly IP surveillance cameras. Not only is Mirai source code made available on the Internet, multiple variants of Mirai-like malware are surfacing. Cybersecurity now becomes another focal point for IP surveillance devices and multiple governments are making regulations to raise the bar for cybersecurity implementation. It is becoming the next decisive factor in the competition of the IP surveillance industry.

VIVOTEK is one of the few physical security companies that has implemented comprehensive cybersecurity protocols, from its product design to aftersales service. We followed the Open Web Application Security Project (OWASP) Top 10 Guideline for IoT device, mobile, and website codes to develop our products. Moreover, we conduct penetration tests by the third-party security advisors, for review and recommendations.

Moreover, we joined force with Trend Micro Incorporated, a global leader in cybersecurity solutions to introduce the world’s first IP cameras embedded with Trend Micro’s anti-intrusion software in 2018 under the campaign of „Security Within Security“. In 2019, we extend this protection to the latest end to end Cybersecurity Management Solution from the front-end network camera, to the network video recorder, and to the back-end video management software. The advanced management in its self-developed video management software, VAST 2 includes Instant Alert Notifications, allowing users to receive notifications either automatically or manually, and real-time Cyber Risk Dashboard to easily identify common types of cyber-attacks. Last but not least, users can take a further step to filter attack logs through different criteria, making it quicker to find abnormal events in a large number of records. Cybersecurity will become a crucial factor that can help VIVOTEK earn its partners and users’ trust, differentiating it from other competitors in the market.

a&s Adria: What will you change in you marketing strategies for the next year, how will you try to reach for new customers and keep the current one?

Cheng: By the rising trend of IoT, VIVOTEK aspires to become the Eye in IOT. Cameras provides the “vision” to create irreplaceable value for many connected business solutions. Moreover, with ongoing technological advancements in artificial intelligence and machine learning, cameras are becoming “smart,” and can provide additional valuable and meaningful data/information for end users. We aim to promote the value of IP video to more partners and applications, in and beyond security. VIVOTEK was founded in year 2000, we will celebrate and launch global campaign of our 20 years anniversary in our shared pursuit of a safe and secure society.

The new SMARTair® Knob Cylinder: one small change has changed everything

London, July 2019 – Style, intelligence and robustness come together in the new SMARTair® Knob Cylinder from ASSA ABLOY. Part of the SMARTair® access control system, this intelligent device with integrated RFID reader is now more resistant to attack. It comes in elegant, contemporary finishes and colours, upgrading aesthetics and functionality in equal measure. It quickly upgrades almost any existing regular door to an access-controlled door — without any drilling.

The new Knob Cylinder fits seamlessly and flexibly into a SMARTair® system, providing advanced, user-friendly access management designed to make any workplace work better. If you need to monitor and control who goes where, and when, you need the new SMARTair® Knob Cylinder.

The Knob Cylinder is battery-powered and works with every SMARTair® access management option, so you can choose between online (“real-time”), offline, update-on-card and standalone management — or combine more than one system at the same site with the same software interface.

Upgrading to the new Knob Cylinder is simple: just replace an existing mechanical cylinder with the new device. No complex installation or drilling stands between you and safe, reliable, flexible SMARTair® access control. Glass, wooden or aluminium doors — Scandinavian, Euro and many other profiles — present no problem.

A modern, mobile solution

The Knob Cylinder works with all standard proximity technologies, including MIFARE®, DESFire and iCLASS®, and also offers another new way to open your doors — with the SMARTair® Openow™ mobile app.

With Openow™, users no longer carry separate credentials; just their smartphone with secure virtual keys stored inside. There’s no longer any need to collect or validate an access card to open authorized doors locked with the new SMARTair® Knob Cylinder. With Openow™, if you have your phone, you are already carrying your keys.

Modern and mobile-ready, the SMARTair® Knob Cylinder is built to make your building smarter. Its robust design, redefined aesthetics and easy installation are perfect for securing offices, business headquarters, conference and meeting rooms.

To download a free product guide and technical specifications for the new SMARTair® Knob Cylinder, visit: https://campaigns.assaabloyopeningsolutions.eu/hubfs/smartair/SMARTair%20standalone%20PDFs/WEB_Knob_Cylinder_Brochure_EUR.pdf

Unlocking the potential of mobile phones

According to official EU data, by 2016 94% of European large businesses were issuing their workers with some sort of connected mobile device. We seem to use our smartphones for everything. Yet, according to Assa Abloy, mobile phones are actually under-utilised when it comes to building security and access management.

Evolving technologies now enable us to manage access rights via mobile phone apps, open a door with a virtual key credential, and much more. An estimated 44 million mobile credentials will be downloaded by 2021, according to a recent IHS Markit forecast.

Assa Abloy believes that this is all because a mobile phone is so well adapted to controlling access at the workplace. It is convenient, secure and flexible. A screen-lock adds an extra layer of PIN, swipe passcode or fingerprint security. With phones, multi-factor authentication is baked into the credential. And how quickly would you notice if a plastic key-card went missing? Nowhere near as fast as you’d spot your smart phone was gone. Security and facility managers can do things with virtual keys that are impossible with a plastic credential. They can issue, revoke or amend them instantly and from anywhere with secure cloud access via a mobile phone. However briefly a temporary visitor needs to enter your building, the easiest way to let them in is with their phone.

Another recent analyst report suggested as many as 20% of organisations would use smartphones for access, in place of plastic smart-cards, by 2020. The move to mobile access control seems inevitable.

“Other highly security-aware industries like banking demonstrate the advantages of the smartphone,” says Thomas Schulz, Director Marketing & Communications Digital and Access Solutions at Assa Abloy EMEA. “Similarly, we see fast-growing interest in unlocking doors and other openings with mobile credentials, and in facility managers administering access rights via their smartphone.”

Schulz points to the new Arkansas State University campus in Mexico, where students and staff have no access cards to collect or validate. Every site user installs and validates their own Openow app and collects keys virtually.

Survey shows biometrics is accepted as a mainstream technology

A recent global survey has shown that biometric technology is already considered to be mainstream, that fingerprint technology is the most popular form, and respondents from the U.A.E and Brazil are the most enthusiastic to the idea of using biometric technologies.

Idemia, a world leader in augmented identity launched an independent international survey of 2,800 respondents to see what people around the world think of biometrics. More than 200 to 400 interviews were conducted in each of the 11 countries, representative of the overall population. The company drew ten main conclusions from the survey results.

1. Biometric authentication technology has a good reputation

Around the world, people are overwhelmingly positive about biometric authentication technologies, with 74% of respondents having a positive or very positive attitude towards it. What’s drawing them in? Having a single unique login, preventing fraud and the overall ease of use top of the list.

2. The World is ready

According to the survey, a whopping 90% of people around the world say they’re ready to use biometric identification processes. The majority, 61%, would use it to unlock their phones while others envisioned paying in store and online.

3. The tech/non-human aspect of biometrics is not a turn-off

Surprisingly the technical aspect of biometrics and the often-associated lack of human contact raised very few red flags among survey participants. Meanwhile, respondents were fearful of identity theft, data fraud and privacy concerns.

4. Biometric technology is already mainstream

Most of those surveyed (78%) have already dabbled in biometric authentication, namely fingerprint verification (63%). In our tech-infused world, only 22% of respondents have never tried it before.

5. Fingerprint verification is the most popular

Fingerprint is not only seen as the most secure and most accurate form of biometrics but the most convenient as well. Regarding accuracy and security, iris recognition was a close second, while facial recognition was runner-up in convenience.

6. Brazil and U.A.E are the most enthusiastic countries

Brazilians have a very positive opinion about biometric technologies. In fact, 89% have tried it, primarily because fingerprint registration is required to vote in the national election. The U.A.E. comes in second for its positive perception of biometric authentication (81%), appreciated particularly for its innovative and fun aspect. They are the least wary of fraud or data or identity theft.

7. The French are still sensitive about their biometric identity

While the majority (61%) of French respondents has a positive attitude towards biometric technologies, they are below the global average of 74%. Perhaps as a result, the country also had the fewest respondents who had given the mobile wallet a try.

8. Biometrics is big in banking

In banking, 82% of respondents want to replace PIN codes with their fingerprint although 87% would still like to keep it as a backup option.

9. People want to keep a close eye on their biometrics

Respondents are divided on how to register their fingerprints on a payment card, but most of them would prefer to enroll it by themselves via their banking app (42%) or with the help of a bank agent in a branch (67%). A vast majority would prefer to keep it in the chip of their card (40%) instead of having it stored in the cloud (11%).

10. Biometric mobile wallets are not yet trending worldwide

43% of respondents are already using their biometric data to pay with mobile phones. However, there is a huge regional divide with India leading with 86% versus only 11% in France.

Evolving Retail Sector Drives Electronic Article Surveillance Market

The electronic article surveillance market is expected to grow from USD 981 million in 2019 to USD 1,173 million by 2024, at a CAGR of 3.6%, according to the latest information released by Marketsandmarkets. A modernising retail sector and protection against inventory losses, shoplifting, and theft are the major driving factors for the market’s growth during the forecast period.

The evolution of the retail sector means that an increasing number of retailers are deploying retail automation solutions based on innovative technologies, including EAS, to provide services that are flexible as well as easy to access for both retailers and customers. As the EAS solutions help protect inventory loss from shoplifting and theft, optimise retail store performance, and enable inventory intelligence solution along with traffic counting; many retailers are deploying EAS solutions.

Tags are predicted to dominate the electronic article surveillance market (in terms of share) during the forecast period. Tags provide superior protection for goods to reduce theft and shoplifting. They induce an alarm when they pass in an active state through an EAS detection zone at a store’s entrance or exit. Two types of tags are available in the market—hard and soft. The functioning of a majority of tags and labels is relatively similar in terms of detection performance by the security antenna located at the doors. The majority of the demand for tags is generated from apparel and fashion accessories stores, due to the growing number of consumers, the number of retail stores is also rising at a rapid pace, propelling the growth of the electronic article surveillance market for tags.

Growing Usage of RF Technology Based Components

At present, say the analysts, RF technology holds the major share of the electronic article surveillance market, and a similar trend is expected to continue during the forecast period. The growth of RF technology is driven by the growing usage of RF technology based components in the end users including apparel & fashion accessories stores, supermarket & mass merchandise stores, and drug & health product stores. Moreover, RF technology has key features such as ultra-wide detection distance, simple installation and operation, low false alarm rate, strong anti-interference ability, and high stability and durability, due to which the market for RF technology holds major share of the market.

The market in APAC is expected to exhibit the highest growth rate in the electronic article surveillance market. A growing number of retail stores in the apparel and fashion accessories, and supermarket and mass merchandise sector are expected to create a considerable demand for EAS systems. Supermarket and mass merchandise outlets are increasing in number because of the high economic growth, rising consumerism, elevating standards of living, increasing disposable incomes, and changing lifestyles; this is expected to increase the demand for EAS systems in this region.

Companies in this market named as key players by the researchers, include Checkpoint Systems, Johnson Controls, Agon Systems, All-Tag Corporation, Amersec, Tag Company, Ketec, WG Security Products, Softdel, Shenzhen Emeno Technology, Cross Point, Takachiho Koheki, Stanley Security, Shopguard Systems, Dexilon Automation, Feltron Security Systems, and Sentry Custom Security.

From 40 keys per employee to a single, programmable, battery-powered key, thanks to CLIQ® wireless access control

London, July 2019 – One French town just north of Paris faced familiar key management challenges. Each person in their Municipal Technical Centre had to carry approximately forty physical keys. If a single key was lost or stolen, for even one door, all compromised cylinders had to be changed. To prevent unauthorized access, all the keys had to be replaced, too — at great expense. Key duplication costs were mounting.

“One lost key cost from €3,000 to €4,000 for changing cylinders and replacing the keys,” explains Fabrice Girard, Territorial Technician at the Villiers-le-Bel Municipal Technical Centre.

To fix their expensive lost key problem, Villiers-le-Bel city administrators chose to combine ABLOY’s mechanical PROTEC2 and CLIQ® electromechanical locking within the same flexible, key-based access control system. Almost 500 CLIQ® wireless cylinders, 850 programmable, battery-powered CLIQ® keys, plus programming devices and wireless CLIQ® padlocks, have been deployed in a multi-year, rolling upgrade programme.

Now, with CLIQ®, lost or stolen keys are cancelled instantly using the CLIQ® Web Manager software. The Web Manager works securely inside a standard browser, with no software installation needed. Administrators can program access rights for every CLIQ® key, padlock or cylinder using the Web Manager. They filter access to specific sites and doors according to the precise needs of every city employee.
“CLIQ® Web Manager is a very easy and pleasant system to use every day,” says Fabrice Girard.

Efficient workflows and rollout
CLIQ® also saves time for the city’s security team, because staff no longer must return to the Technical Centre to collect the keys for multiple sites. Authorized users carry a single, programmable, battery-powered CLIQ® key, where all their individually tailored access rights are stored.

“We wanted a wireless system with reduced maintenance costs and increased safety,” adds Fabrice Girard. “CLIQ® met all these requirements.”

The city has already rolled out CLIQ® beyond their Municipal Technical Centre to 10 local schools. Using the CLIQ® Web Manager, security staff can track exactly who has been granted access to every school site — critical for these sensitive premises and to improving overall school safety.

Plans are in place to equip Villiers-le-Bel’s 12 remaining schools with CLIQ® within 2 to 3 years, including canteens and boiler rooms. Because CLIQ® can be deployed and scaled flexibly, the city’s dedicated security budget funds this gradual extension of their CLIQ® system.

CLIQ® technology is secure, user-friendly and scalable across multiple sites — and already trusted in schools, colleges and universities all over Europe. To learn more about CLIQ® key access control, visit campaigns.assaabloyopeningsolutions.eu/cliq

33rd ASEAN Summit ensures clear dialogue between world leaders with simultaneous interpretation from Bosch

As one of the most important events organized by the Association of Southeast Asian Nations, the 33rd ASEAN Summit and Related Summits brought world leaders together in Singapore to discuss economic and political issues in the region. Chaired by Singapore’s Prime Minister Lee Hsien Loong, the five-day summit at Suntec Convention Centre featured representatives from China, India, Japan, Republic of Korea, Canada, Australia, the Philippines and the United States, among others. Dignitaries in attendance included Chinese Premier Li Keqiang, U.S. Vice President Mike Pence and Canadian Prime Minister Justin Trudeau.

With important issues on the agenda, simultaneous interpretation between twelve languages for all 1,300 attendants was a key to success during the five-day event. Making it happen proved challenging for several reasons: First, the multi-purpose convention center provided no permanent interpreter booths or wiring for interpretation hardware. Second, close to 20 meetings between world leaders took place in separate meeting rooms, with each room and meeting requiring its own interpretation set-up. And third, the temporary interpreting solution needed to be ready within only three days leading up to the summit.

Congress Rental Singapore – a member of the Congress Rental Network and official conference partner of Bosch Building Technologies – designed and installed the temporary setup for the ASEAN Summit using a combination of wired DICENTIS, DICENTIS Wireless and DCN solutions from Bosch. Responding to the requirements for each of the four different meeting rooms, the experts deployed a total of 31 DICENTIS Discussion devices with touchscreen, 36 DICENTIS Wireless discussion devices with touchscreen and 33 DCN Conference devices with language selector. For the language interpreters provided by the government institution, 56 DCN Interpreter desks offered a familiar technology platform.

This set-up allowed Congress Rental technicians to equip each meeting between world leaders as the situation required. For instance, higher-level meetings held in the two plenary meeting rooms on level four of the venue could be supported either by DICENTIS Discussion devices or DICENTIS Wireless discussion devices, depending on the conference day and how much transition time was available to change the set-up for the next meeting. For the fastest build-up and break-down, the best choice proved to be DICENTIS Wireless devices paired with INTEGRUS Pocket receivers and headphones pre-set to the listener’s preferred language.

Several of the meetings during the five-day event ran at the same time, so Congress Rental decided to centralize its simultaneous interpretation capabilities. In a central location, 28 temporary booths were set up, each equipped with two DCN Interpreter desks. From there, interpreters delivered live interpretation to delegates in the plenary meeting rooms and summit attendees in the listening room on level 3. More than 1,300 INTEGRUS Pocket receivers were available in the listening room, where attendees could follow proceedings in any of the 12 languages used at the event. At the same time, automatic camera control tracked the interactions between world leaders in the plenary meeting rooms, which attendees could watch live on the installed TV screens on level 3.

Throughout the five-day ASEAN Summit, Congress Rental Singapore kept a number of technicians on-site to ensure system performance and hand-over of conference devices between participants several times per day. Via the user control software on the backend, the digital system from Bosch provided Congress Rental Singapore with valuable data on microphone usage and interpreter performance, plus a chance to address potential issues in real time, which was highly valued by the summit managers: “I have continually received nothing less than complete admiration and the highest appreciation for the way simultaneous interpretation services were managed, and for the performance and quality of the attending Congress Rental staff”, said Chris Jackson, ASEAN, Australia Special Taskforce.

Overall, the combination of hands-on support and flexible technology platform proved a success: The over 1,300 participants of the 33rd ASEAN Summit and Related Summits enjoyed a productive event accompanied by seamless interpretation in twelve languages. In addition, the solution was dismantled and ready to be redeployed at the next high-level conference only a few hours later.

How technology is helping to beef up security at events

Terrorist groups continue to target mass gatherings, but technological innovations such as high-definition video, facial recognition and AI are allowing security personnel to better handle such threats. These new technologies can help to identify suspicious individuals and other anomalies in real time as well as for post-event investigation. Sensors mounted at entry points and event perimeters can detect attempted intrusions and hazardous materials. Information from these sensors can then be passed to a command center or to security personnel on the ground for a prompt response.
Izvor: a&s International
E-mail: redakcija@asadria.com
Kategorije za web: Man guarding, Video surveillance, Software, Perimeter Protection

Machine Learning Enhances Video Surveillance at Outdoor Events

Video surveillance plays a critical security role at large outdoor events. Advances in AI and machine learning can offer enhanced tools for spotting potential threats.

Facial and behavior recognition technologies are improving video analytics, providing invaluable new tools to security professionals. Stephanie Weagle, CMO of BriefCam, a company that specializes in using cameras and video analytics for security, said video- analysis technology could be trained to recognize “signs of problematic behavior,” as well as keep an eye on unauthorized entry, exceedingly high foot traffic or loitering.

Such video technology can be integrated with other services to trigger follow-on actions after potential threats are detected. Proactive alerting, triggering calls to action in response to suspicious or unusual behavior, can enhance the overall efficiency of a security team. Advanced video surveillance tools increased “situational awareness,” Weagle said. By mounting cameras with behavioral-recognition technology in various locations, security personnel can have a better grasp of what’s going on in the area. Weagle added that the continuous, ongoing surveillance provided by cameras also minimized the risk of “human error and distraction.”

Facial recognition played a critical role in video analytics, and prolif- eration of better-quality cameras and advances in video analytics had helped to improve the accuracy of facial recognition, Weagle said.

One such advance is the ability to store photos of suspects or past offenders on a video-analytics engine and alert security personnel when such individuals are spotted by a camera. Security personnel can then be dispatched quickly to deal with the potential threat. Weagle noted facial recognition technology could not only be used to identify criminal suspects but also VIP guests, “to ensure important visitors are being properly engaged and ushered around as needed.”

As facial recognition is still relatively new and not yet widely adopted, countries have different policies and rules on the technology’s use. Nonetheless, event organizers should consider “how the technology can be used in ways that ensure fairness, transparency, accountability and privacy compliance, while maximizing public safety,” Weagle said. Data collected by video sensors could also help to “map out activity trends and discover insights” to improve security readiness and response, she added. One challenge facing event organizers is vehicle and crowd congestion creating bottlenecks at entry and exit points. Video analytics could address this problem by collecting traffic flow data, before coming up with optimized pedestrian or vehicle navigation routes to ease the traffic. This would improve the guest experience and enhance security, Weagle said. She added it would also enable “evacuation and security dispatch routes to accelerate emergency responses” to be planned in advance.

“This information can also be used to understand staffing requirements, ensuring that crowds are guided through the event, queues and bottle- necks are prevented and employees are upholding safety regulations,” Weagle said.

How Advanced Video Surveillance Can Combat Terrorist Threats

Terrorist attacks on large crowds are a reality security professionals need to be prepared for. Deep learning-based video surveillance technology can help counter these types of threats.

Advanced surveillance camera technology can be used to investigate suspicious behavior and prevent terrorist attacks on public places. The U.S. Department of Homeland Security lists some out-of-place scenes that security cameras should be set to identify: vehicles parked near areas with high pedestrian traffic, individuals wearing unseasonably bulky clothes and individuals attempting to enter restricted areas or entrances as patrons are leaving.

After receiving a bomb threat, the standard security practice is to initiate a search of the entire event space to locate the potential explosive device. If a suspicious package is detected, event operators can use camera footage to determine if the package has been deliberately placed or is merely unattended.

Security professionals are realizing the importance of advanced video surveillance. IHS Markit figures show global shipments of network camera reached 108 million in 2018. IHS Markit estimates sales will go beyond 120 million in 2019 and 140 million in 2020. The share of high-megapixel cameras is expected to increase as well. “As the number of camera shipments increases, a better way of analyzing and assessing the captured video is needed,” said Oliver Philippou, Research Manager at IHS, in a report.

As conventional methods fall short of enabling the needed analysis, deep learning — which mimics the human brain to learn from and understand the world through a hierarchy of concepts — offers a potential solution.

Deep learning allows security personnel to intelligently search through large amounts of recorded video for a crucial piece of information that may be contained in only a few frames. “In a police investigation, this has the potential to save hundreds of hours of officers’ time. Searchable analytics are therefore penetrating markets such as city surveillance, which historically searched video manually,” IHS’ Philippou said.

BriefCam is one such company using deep learning to provide enhanced video analytics. BriefCam’s video technology can distinguish between people and objects on the basis of different factors. “Security personnel must be able to quickly review and understand incidents that have occurred and rapidly locate suspects and perpetrators,” said Stephanie Weagle, CMO of BriefCam.

The company offered robust video analytics, allowing security personnel to “rapidly review video across multiple cameras and pinpoint people and vehicles,” Weagle said. Security personnel can search suspects in the footage based on attributes like gender, clothing and direction and speed of walking. With the help of deep neural networks and computer vision technologies, moving objects, like someone riding a bicycle, can also be separated and tracked.

Sensors Critical to Perimeter Security for Outdoor Events

The first security step for organizers of outdoor events is the establishment of a clear perimeter. Common physical barriers for this purpose include bollards, blockers and fences. However, they don’t provide intrusion monitoring and detection capabilities. To meet this requirement, a sophisticated perimeter intrusion detection (PID) system is needed.

A robust PID system should meet the three Ds of protection: defend, detect and deter. Richard Huison, Regional Manager for Gallagher Security (Europe), notes not all systems meet these standards. “A physical fence offers defence and deterrent, but no detection. Video with complex analytics are great at detecting, but do not provide any deterrent,” he said. Gallagher recently partnered with CLD Fencing Systems to launch a monitored pulse fencing (MPF) solution called FenceSafe-E. MPF delivers controlled electronic pulses that last a millisecond, ideally enough to deter intruders from making a second attempt at breaching a perimeter. FenceSafe actively monitors attempted break-ins and deters potential intrusion with warning signs every 10 meters. Tension detectors trigger an alarm that sends a notification to the smartphones of security personnel. The system also briefed security personnel on “precisely what threat they will encounter,” Huison said.

During the 2018 NFL draft at the AT&T Stadium in Arlington Texas, chemical, biological, radiological, nuclear and explosive detectors were hidden in the entryways to the stadium. They sent smartphone notifications to those in the command center and security personnel on the ground if hazardous materials were detected. This same technology is also being used at border crossings and ports. Light detecting and ranging (LiDAR) sensors can similarly aid security. LiDAR is a remote sensing technology that uses laser pulses originally designed to create 3D models or maps to track the movement of people and objects. “Retailers can track customer’s behaviour with LiDAR, following their route through the shop, and monitoring hand height and direction, so they learn exactly what customers pick up and put down,” Huison said.

He added event organisers could use this technology for “counting people, studying and controlling traffic flows, queueing and pinch points and making real-time decisions to stick within Health & Safety Executive licence-limited numbers in specific zones or areas.” A perimeter control system works best when the full spectrum of inputs, including cameras, sensors, LiDAR, biometrics data, etc., are centralized within a single command. Ideally, “all sensors, systems and metrics are controlled and managed centrally” and images and instructions are relayed to patrol personnel to enable “smart, proactive and efficient” protection, Huison said. According to reports, the Super Bowl used this approach in 2018, with computer vision taking center stage. Data was collected from multiple sources and aggregated for processing, providing real-time information on what was happening in and around the stadium.

Deploying various types of sensors for perimeter security allows security personnel to promptly respond to anomalies through mobile alerts. By displaying aggregated security data on a command center, professionals can also proactively evaluate what is going on at the event in real-time and coordinate a suitable response.

Recommended Practices for Preventing Terrorist Attacks

As extremists show more interest in “soft targets,” organizers of large outdoor events at temporary venues need security that can be rapidly assembled.

Mobile surveillance cameras are preferred to more permanent CCTV cameras at temporary sites. Mobile surveillance cameras not only help to secure outdoor events, but also enable employee oversight, visitor traffic optimization and demographic analysis of visitors.

The FenceSafe-E by Gallagher and CLD Fencing Systems uses pre-assembled modular units for speedier setup. “Fence lines of over 30 meters with 45-degree corners, ends and 90-degree returns were erected and commissioned with full pulse fencing within 90 minutes,” said Kevin Godfrey, Strategic Business Development Manager at Gallagher Security, in a press release. Given the large footprint of outdoor events, Richard Huison, Regional Manager for Gallagher Security (Europe), suggests “limiting the most secure and costly solutions to smaller ‘priority zones’, such as VIP areas or generator compounds.”

A security team should allocate resources in order to ensure the physical safety of patrons, as well as secure valuable assets and the event’s brand reputation. Besides standard security hardware, e-ticketing provides another line of defence. Huison said e-ticketing not only reduced the risk of forgeries and unauthorized reselling, but also helped to spot watched individuals, known troublemakers and other security risks in advance.

Thanks to the growing use of mobile payment methods such as ApplePay, it is now possible for organizers to hold ticketless and cashless events. Secure QR codes allow organizers to establish what Huison calls as a “virtual electronic perimeter” within which mobile credentials serve to provide security. When working with third-party security staff, it is recommended that company staff report all suspicious behaviour to the main security contractor and avoid engaging in security related actions themselves. The First Responder’s Toolbox, published by the U.S.’s Joint Counterterrorism Assessment Team (JCAT), suggests that “regardless of the event size, venue, or location, continuous and ongoing efforts to improve interagency coordination and information sharing with event stakeholders will enhance security and improve emergency response.”

Security personnel should maintain constant communication with one another, either through the use of walkie-talkies or other means, so that they can stay informed with the latest development without leaving their area of duty.

According to JCAT, “to prepare for any potential terrorist attack against open-access events and mass gatherings, organizers and security officials are encouraged to establish partnerships with first responders and private sector stakeholders in advance. This will enhance information sharing, coordination, and potential emergency response concerns.”