Home Articles posted by a&s Adria (Page 84)

Eagle Eye Recognised With New Innovation Award

Eagle Eye Networks, a global leader in cloud video surveillance, has won the ESX Innovation Award in the Video Management System category, for the company’s Eagle Eye 911 Camera Sharing technology.

Eagle Eye 911 Camera Sharing is a first-of-its-kind technology that gives emergency communication centre telecommunicators (911 professionals) instant access to security cameras during an emergency, empowering them to deliver critical incident information to first responders. School leaders and public safety officials have lauded Eagle Eye 911 Camera Sharing as a groundbreaking technology that can quickly deliver important information when time is of the essence.

ESX Innovation Award winners are chosen by an independent panel of judges, based on criteria including ingenuity, applicability, and response to market need.

“We just launched Eagle Eye 911 Camera Sharing two months ago, but we’re already hearing from schools, businesses, 911 professionals, first responders, and law enforcement about the tremendously positive impact this technology can have in speeding up response and improving outcomes in emergency situations,” said Dean Drako, Founder and CEO of Eagle Eye Networks. “Winning an ESX Innovation Award is a distinct honour, and we want to thank the security industry experts who served as judges for this meaningful recognition.”

Board Appoints New COO at Dormakaba

The Dormakaba Board of Directors has appointed Carsten Franke as Chief Operations Officer (COO) and member of the Executive Committee effective 1 August 2024. He possesses an extensive track record in driving companies towards operational excellence through optimising manufacturing footprint and supply chain, as well as enhancing plant and procurement performance.

Carsten Franke has been Chief Operations Officer for Electrolux Group, Stockholm, since 2020, where he drove best-in-class operational excellence throughout the company, optimising the manufacturing footprint and performance while continuously improving efficiency and lowering the cost base. His track record also includes industry-leading achievements in Health & Safety and carbon emission reductions. Prior to his role as COO at Electrolux, Carsten Franke held various other leadership positions within the company, including as Chief Operations Officer for the Business Area EMEA and Vice President Supply Chain EMEA.

Before his tenure at Electrolux, he was Program Director Industrial Engineering at Knorr-Bremse, Munich, where he significantly increased productivity by for example introducing lean manufacturing to locations worldwide and he was operations head for the Australian business. He started his career at the Maschinenfabrik Reinhausen, Regensburg, where he led the restructuring of the productions.

Till Reuter, CEO Dormakaba Group says: “With Carsten Franke joining my team, I welcome another leader with strong expertise in transforming companies. Optimising and streamlining our manufacturing network and supply chain, along with enhancing our plant performance, are key objectives of our ongoing transformation programme. With Carsten on board, I am confident that we will achieve our goals.”

Carsten Franke will take over the position of Chief Operating Officer effective 1 August 2024. He follows Alex Housten, whose departure from the company was announced early December 2023.

Egal: How to achieve fast, high quality testing of copper and fibre cabling

The proliferation of the Internet and smart buildings, increased investment in the telecommunications sector and the growth of data centres around the world are driving the demand for structured cabling and, consequently, the need for efficient testing of network installations.

The structured cabling industry, from manufacturers to designers and installers, is facing accelerated growth driven by system convergence, edge computing and cyber security. The speed at which telcos, systems integrators and cabling companies are migrating to fibre, green cabling, power over Ethernet (PoE) and other highly sensitive copper cabling technologies is increasing the demands on the delivery of quality structured cabling installations. Finally, the manufacturers of passive and active network equipment are making the certification and warranty of systems dependent on the performance of appropriate tests, which are becoming more and more demanding in terms of human resources, know-how and time due to the increasing complexity of the network.

Taking structured cabling testing to the next level

Structured cabling professionals need solutions that are affordable while offering the widest range of capabilities for use with a variety of cabling technologies in passive networks and applications.

The AEM TestPro CV100 structured cabling test system is recognised by cable companies around the world as the answer to the trends and growing demands of cabling construction, from data centres to smart buildings.

Speed: Users say the solution is extremely efficient and much faster than competing devices, allowing installers to test multiple connections in a day’s work, saving companies time and money.

Ease of use: The AEM TestPro CV100 testers are simple and intuitive to use, allowing cable infrastructure to be tested quickly and successfully by staff of varying skill levels.

Price: Additional cost benefits are provided by a price that is significantly lower than the competition, especially as network installers can use the same equipment to test copper, fibre and wireless networks.

One instrument for all tasks, from testing to certification

The AEM TestPro CV100 allows installation teams to use a single instrument with the same user interface for all tests, changing only the interfaces for each cable type – a particular advantage in smart buildings where complex cabling infrastructures are involved, from fibre optic to CAT6A cabling for PoE, CCTV, automation, and other advanced applications.

For those responsible for deploying and ensuring the operation of access points, IoT systems, smart lighting and security systems, TestPro CV100 offers a comprehensive set of tests to ensure the infrastructure is ready to support these advanced technologies. For example, TestPro CV100 certifies CAT6A cables in seconds, including all standard test parameters and additional parameters such as DC resistance imbalance, TCL and ELTCTL transmission losses and distance to fault. In addition, TestPro CV100 provides Level 1 fibre certification and, in combination with OTDR, Level 2 fibre certification.

In addition to the most feature-rich modular platform, AEM’s system also incorporates LiveWiremap software, which provides instant audio and visual confirmation of connectivity between endpoints. Users confirm that testing is further simplified by the use of dual displays – at both ends of the link – and by the sheer speed and ease of test execution and generating reports.

Aziguard Object Detector 2.0

Azitrend released a second version of AziGuard software’s module used in perimeter protection.

The AziGuard neural detector recognizes the objects on video images as a person, vehicle, or person on a bicycle/motorcycle. The video analytics is done in the centralised GPU servers, so any camera brand is supported on the platform.

Usually, AziGuard Object Detector is used in perimeter protection through the company’s partnership with manned guarding companies. Companies use it as a very profitable instrument for protecting perimeters. AziGuard’s recent studies and evaluations, in terms of budgeting and business plan, reveal that a company with approximately 140 locations, each one with 1.5 manned guard posts (1 for 24 h/day and one for night and weekend), will switch the service in video analytics, will benefit from 52% of profit margin increase. At the same time, they can expect a minimum 39% decrease in the perimeter protection security budget.

Optimized system

The goal of the partnership with manned guarding companies and clients is to provide an accurate system that should be optimised for more than 1000 cameras managed with one dispatcher position. In this manner, financial costs are optimized.

With the help of VMS software and video analysis AZiGuard, Azitrend meets security companies with the concept of electronic guarding, based on the recognition of people/cars/bicycles in video images. These events, managed by a powerful video management system, the basis of the entire AZiGuard ecosystem, constitute an innovative security concept, consisting of recognition, alerting and intervention in case of an event.

Wanting to optimise the system, in terms of having the best module of detection, Azitrend developed the next generation of object detection. Now with a new module, there will tend to be zero false alerts in the system. During our testing in a real environment at locations with 16-32 cameras we had 0-2 false alerts. Aziguard object detector 2.0 is one of the best video analytics perimeter protection modules. And we invite companies to test it. There are several ways Aziguard object recognition fits into the alarm-treating operations.

Acknowledging the event

Video cameras are located on the perimeter or protected area. The AZiGuard video analysis software recognizes in the video images, through the AZiGuard Neuro Detector module, people, cars or bicycles trying to penetrate the protected perimeter.

Confirmation

The advantage of instant access to video images translates directly into the confirmation of any event in the dispatch and the deployment of the crew only for real events. We all know the degree of false alarms generated by a classic perimeter system and the need to deploy crews to any event produced. We are now considering a reduction of up to 99% in false alarms and dispatching emergency crews only to real events.

Intervention

Once the event is confirmed, the response crew moves to the location to resolve the case. Other tools are available to the dispatcher to manage the event until the crew arrives at the location, such as direct communication through external speakers placed in the objective with deterrent messages, easy tracking of the intruder by checking the objective map with colored video camera icons where there is movement so that the crews receive the most accurate coordinates.

With the help of VMS software and video analysis AZiGuard, Azitrend meets security companies with the concept of electronic guarding, based on the recognition of people/cars/bicycles in video images. These events, managed by a powerful video management system, the basis of the entire AZiGuard ecosystem, constitute a whole innovative security concept, consisting of recognition, alerting and intervention in case of an event.

NIS2: WinGuard Facilitates the Implementation of New European Cybersecurity Directive

The European Union has taken a significant step towards bolstering cybersecurity with the introduction of NIS2, the second version of the “Network and Information Security Directive.” This directive sets new standards for the security of networks and information systems in critical sectors, affecting EU member states and the Balkan countries.

The primary goal is to strengthen the resilience of networks and information systems and improve security standards across critical sectors. This includes establishing cybersecurity authorities and fostering collaboration among European countries and institutions. Companies, especially those in critical infrastructure sectors such as energy, transportation, health, and finance, are called upon to act. This involves implementing and enforcing security measures, reporting and documenting security incidents, collaborating with authorities, and implementing risk management procedures to identify and mitigate potential risks.

WinGuard can provide valuable support in this context by offering central security management functions, compliance tools, and automation options, thus enhancing the physical security of buildings as well as networks and information systems.

1. Integration of Security Systems: WinGuard aids companies in optimizing their existing security resources by integrating a wide array of existing IT and security solutions, such as access control, video surveillance, and intrusion detection systems. All integrated security systems and infrastructures are monitored and managed through a central platform, WinGuard. This enhances the monitoring and management of physical security measures, ensuring uniform and rapid identification and response to security incidents.

2. Incident Management: WinGuard facilitates the recording, prioritization, and handling of incidents, enabling more efficient responses to security incidents.

– Monitoring: Events and alarms from various systems can be monitored in real-time, forming the basis for early reactions to potential attacks.
– Automatic Alerting: When security incidents or anomalies are detected, the platform can automatically trigger alerts and notify the relevant personnel. This ensures swift responses to security incidents and the implementation of appropriate measures to maintain security.
– Automation and Orchestration: WinGuard’s ability to automate and orchestrate various security systems enables companies to implement and manage security measures more efficiently. Thus, Security responses are quicker and more coordinated.

3. Continuity Planning: WinGuard supports the creation and management of emergency and continuity plans, ensuring that critical business processes can be maintained even during physical security incidents which is crucial for the resilience of critical infrastructures.

4. Compliance and Reporting: Through automated reporting functions necessary information related to security-relevant incidents and measures are meticulously documented and analyzed. The generated compliance reports can be useful for internal audits and communication with supervisory authorities.

5. Risk Management: By integrating risk management tools, WinGuard helps companies identify, evaluate, assess, and mitigate potential risks and vulnerabilities on a regular basis.. This allows potential security gaps to be detected and addressed, minimizing risks before they lead to incidents.

6. Compliance Management: WinGuard enables companies to define and enforce security standards. This includes data encryption, secure password usage, and firewall implementation. The platform continuously monitors these security measures against current regulations and initiates immediate corrective actions in case of deviations.

7. Training and Emergency Drills: WinGuard can provide information and instructions via the platform to aid in awareness-building of employees. Additionally, it can simulate security incidents and conduct emergency drills to improve preparation for real threats.

For affected companies and managers, NIS2 presents both a challenge and an opportunity. They must ensure their IT infrastructures meet security standards and implement appropriate protective measures. The directive offers the chance to use cybersecurity as a competitive advantage and boost customer trust in data security.

Conclusion: NIS2 is a significant development for cybersecurity in Europe. Solutions like WinGuard play a crucial role in implementing these directives by helping companies effectively protect their networks and information systems. WinGuard raises security standards and enhances resilience against cyber-attacks. Through central integration and management of security systems, real-time monitoring, detailed documentation, and proactive risk management, WinGuard offers a robust solution for improving physical security and ensuring compliance with NIS2 requirements. This enables companies to meet NIS2’s demands and elevate their cybersecurity to a new level.

Installing an Intercom System for Business

Modern intercom systems for business can be integrated with other security solutions to boost the end user’s security and operations. Installing an intercom system for business, meanwhile, requires various considerations. This article takes a closer look.

Source: William Pao, asmag.com

Intercom systems for business allow visitors to communicate with their host and gain entry once they are approved. That said, intercoms are an integral part of security at business organizations and can be beneficial for a range of end user entities.

“All business types can benefit from an intercom system, whether large or small, because they face many of the same challenges. Communication is always important, and intercoms help to reduce liabilities when it comes to staff safety by monitoring customer interactions and keeping a record of traffic into and out of a location. Large businesses, schools, healthcare facilities, and other entities also integrate their intercom solutions with mass notification systems, lock down procedures, or to communicate with occupants in the event of a weather emergency,” said John Hemp, Director of Sales for Mid Atlantic & New England at Aiphone.

“Rather than directing all calls to the reception, a visitor intercom can be set to intercom the relevant departments. This cuts down on hunting down different people or having the receptionist vet on behalf of the entire company. A delivery or guest looking for the HR department can directly communicate with HR and inform them. In addition, IP intercom that uses mobile phone apps ensures that the visitor is always attended to even if the party is not in the office,” said Ler Wee Meng, MD of Securevision. “Therefore, any company that has a door access system in place would benefit from an intercom – large companies with multiple departments or SMEs with just two people. The key is to communicate with visitors and grant access.”

Integrative features

More and more, modern intercom systems for business can integrate with other security solutions such as video surveillance and access control. This has major benefits for the end use entity.

“For example, they can integrate with video surveillance systems, automatically displaying the video feed of the calling location on the control center’s video wall when an IP intercom terminal calls, aiding security personnel in understanding the situation,” said Zhou Liang, CTO of SPON Communications.

“Integrating intercom systems into other security systems can help improve overall security, and operations. For example, if an intercom is integrated into an access control system, an organization can communicate with and grant visitors access to the facility more easily and efficiently. When integrated with video, organizations can gain visual intelligence, for example, confirming that the person visiting really is there to deliver a package,” said Alex Kazerani, CVP for Cloud Video Security and Access Control at Motorola Solutions.

Kazerani cites his company’s own examples. “The cloud-native Avigilon Alta offers the Video Intercom Reader Pro, which is an all-in-one device with integrated intercom, video, and an access control reader. This combines all of your front door security devices into one, with a 5MP built-in camera, AI-powered call routing technology with two-way audio, and reliable touchless access for credentialed users,” he said. “This creates frictionless, yet secure, access for both visitors and users alike. Visitors can simply say the name of who they’re visiting or ask to speak to a reception. Calls are routed to the appropriate people, who can view live video, speak live with visitors, and easily grant them access using a mobile app or via the Avigilon Alta Control Center.”

Installation tips

Installation of an intercom system for business requires considerations from multiple fronts. These include the location of installation and the angle at which the system should be installed, among others.

“The installation locations for IP intercom systems in businesses include parking lot entrances/exits, garages, perimeter areas of campuses, building hallways/public areas, office entrances/exits, and stairwell entrances/exits. During installation, the bottom of IP intercom terminals should be 1.5 meters above the ground to ensure clear capture and transmission of voice and facial images during intercom,” Zhou said. “IP intercom terminals typically require minimal maintenance as the control center can display real-time online/offline/task status. Remote monitoring of the audio and video feed from front-end IP intercom terminals is possible.”

Video quality, meanwhile, is also important.

“Video quality should be considered at various times during the day when the sunlight will be in different positions. Users should also look at the entire field of view and not just the center area where the guest will be. The edges of the view should be clear or a region should be privacy-masked if cameras are pointed at sensitive areas,” Kazerani said. “Most of the maintenance needs will be due to the intercom being accessible to the general public. It will have the expected amount of wear and tear and it may need to be in a ruggedized enclosure if in a high-traffic area. Also, the video feed should be monitored to ensure that nothing is obscuring the camera lens like dirt or oils from people’s fingers.”

There are other points to consider as well. “IP door phones are often rated for outdoor use. And in many cases, the door phones can be installed with rain covers. Vandal-proof rating may not be necessary unless the business is located in a place where there is a threat of vandalism,” Ler said.

Finally, communication with customer is important.

“I would recommend talking with the customer about their normal business practices and communication habits when selecting and installing an intercom solution. The goal is to enhance their communication abilities without adding complexity. Collaborating with IT departments when installing an IP solution is necessary – especially when a system will live on the IT network,” Hemp said.

He added: “Another piece of advice is to plan out wire runs ahead of time and make sure it is physically possible to place devices where the customer wants them. It’s important to test out accessibility, wire paths, and wall or desk placement. Communication with the customer is key and solutions need to work within their existing parameters of doing business. We don’t want to install a solution that’s going to slow them down or make things inconvenient. If the system is not easy to use the customer will stop using it in the long run and ultimately forfeit the security benefits of installing an intercom system.”

A new upgrade in the CLIQ ecosystem boosts security and user convenience

London, June 2024 — Organizations equipped with CLIQ intelligent key-based access management have confidence that their premises and employees are safe and secure. With CLIQ you can flexibly manage access, to secure almost any opening with electronic cylinders or padlocks and programmable smart keys.

A new upgrade in the programming device family simultaneously enhances this security and convenience.

 Requiring regular credential updates is the simplest, most effective method for keeping premises secure. ASSA ABLOY’s new CLIQ Wall Programming Device (PD) helps to update

keys’ access rights faster without involving the system administrator. This cuts the risk of unauthorized keys circulating.

 CLIQ is built around precision-engineered locking cylinders and high-end microelectronics. A standard battery, lasting approximately 10 years with typical use, inside each programmable smart key powers the cylinder or padlock — and encrypts data transfer between lock, key and system. Robust, durable CLIQ cylinder locks secure lifts, machines, mailboxes, cabinets and more with the same control as sensitive doors. A range of programming devices transfer and update access rights for keys.

Fast, reliable CLIQ key updating for enhanced security indoors and outdoors

The CLIQ Wall PD, available as indoor and outdoor variant, has now been redesigned to make this updating process faster and easier than ever.

“Facility managers can have the peace of mind that every user key in circulation is easy to load with the latest approved access rights and validity,” explains Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEIA. “The Wall PD can also collect audit trails directly from keys. Life is just easier when you CLIQ!”

The upgraded CLIQ Wall PD protects users against mis-steps, confusion or false positives during key programming: Intuitive LED lighting instantly confirms when their key is updated in both the indoor and outdoor product variants. The CLIQ Outdoor Wall PD is the ideal solution for demanding environments as it is protected against weather and vandalism.

With the new CLIQ Wall PDs, keyholders and facility managers don’t need to worry about data privacy. Enhanced encryption via Ethernet ensures every issued CLIQ key is protected with robust security. The upgraded device now supports the 802.1x protocol for enhanced security.

And with rapid installation — using the existing wiring and backplate — it is simple to switch existing wall programmers for new devices to keep a site and staff safer. Total compatibility with existing and future CLIQ keys ensures that replacing old programmers with the new CLIQ Wall PD is hassle-free and future-proof.

Learn more at https://www.assaabloy.com/group/emeia/solutions/products/digital-access-solutions/cliq/cliq-programming-devices/wall-programming-device

New VIVOTEK Entry-Tier 9383 Series Network AI Camera

VIVOTEK is expanding its AI security business with the introduction of its entry-tier 9383s series network AI camera, which allows users to utilise AI video analytics services at affordable costs, easily recognise attributes of people and cars, and enhance operation and management efficiencies. Moreover, the camera seamlessly integrates with the Core+ AI network video recorder (Core+ AI NVR), or the VAST Security Station (VSS) system. With the addition of a new feature “Case Vault,” VSS is able to quickly compile and produce needed video data within one minute and provide a complete report for critical videos.

This addresses the previous challenge of time-consuming organisation of image data, establishing a comprehensive security environment through an AI solution that integrates both hardware and software.

Combining AI Technology

Using this combination of AI technology and devices, VIVOTEK is able to assist SMEs to build a smart and secure operational environment.

According to VIVOTEK research findings, the B/B ratio of IP cameras with embedded AI functionality will double by 20271. “VIVOTEK has been devoted to the security industry for 24 years, and to keep pace with the rapidly growing AI market, VIVOTEK continues to launch customer-centred diverse products,” said Louis Liao, Director of Product Planning at VIVOTEK.

“To expedite AI application and expand product market share, VIVOTEK C-Series launches for the first time the AI entry-tier 9383-Series network camera, which is combined with the industry-leading AI smart surveillance system VSS to target global SME owners, helping them to build complete AI solutions under limited budgets, creating more intelligent and efficient operational environments.”

The 9383-series AI network camera comes with three advantages:

  • Precise AI analytics: An AI algorithm is used to analyse subjects such as people and cars, including colour, car model, backpack and cap, enhancing detection efficiency.
  • Clear imaging: The 9383-series camera is equipped with a 5-million-pixel lens and advanced video sensors, which delivers 2.5x greater dynamic range than sensors of the previous generation. Not only does it prevent over-exposure, but also captures clear videos at night.
  • Durability: The camera offers weather-resistant and vandal-proof ratings of IP66 and IK10, ensuring durability even in harsh outdoor conditions.

New “Case Vault” feature

In addition to introducing AI technology to more IP cameras, VIVOTEK also offers the AI surveillance system Core+ AI network video recorder and VSS (as video shown below) to build AI solutions. Both Core+AI network video recorder and VSS have deep search technology. VSS is equipped with powerful AI analytics capabilities; connecting up to 22,400 cameras, VSS utilises the the deep search feature, which includes three major assisted searches: attribute search for people/vehicles, scene search, and re-search. Combined with effective AI video detection capability of VIVOTEK’s cameras, the system can precisely search for key videos. Now, with the newly added “Case Vault” feature, VSS can find needed images and organise video clips based on the designated time and location, and generate a complete report, enhancing security efficiency and accuracy.

Five year warranty

VIVOTEK continues to introduce edge computing to front-end cameras and backend systems, and adds AI applications to enhance product efficiency, while also realising business sustainability. VIVOTEK offers the 5-year warranty on 9383-Series network camera and Core+ AI NVR to help satisfy ever-changing market needs for its customers.

Videx Launches Xprox-MO Mifare OSDP Proximity Reader

Videx Security, a leading provider of access control and door entry solutions, has launched its Xprox-MO, a cutting-edge panel mount Mifare proximity reader.

Designed for use with the Videx WS4 web server access control system and compatible with third-party access control systems supporting the Open Supervised Device Protocol (OSDP), the Xprox-MO offers flexibility and security for modern access control needs.

Versatile compatibility and installation

The Xprox-MO reader supports a wide range of Mifare cards and tags, including Classic, Plus, Desfire and Ultralight. It is also compatible with high-security applications utilising Desfire cards where data encryption is achieved using 128-bit AES on both the reader and cards/tags. The reader’s design aligns with the UK industry standard, fitting a 40mm x 40mm cutout, making it ideal for both new installations and retrofits.

Robust security features

Featuring IP65 ingress protection, the Xprox-MO is built to withstand harsh environments, ensuring reliable operation in various conditions. The reader includes three status indication LEDs (green for access granted, red for access denied and amber for standby) and an internal buzzer for clear audible feedback, enhancing user experience and security.

Advanced configuration and connectivity

The Xprox-MO is equipped with a built-in micro-USB connection for easy configuration and firmware updates. Its RS485 connectivity ensures seamless integration with both Videx WS4 and third-party access control systems. The reader also supports multiple proximity card formats, including HID Iclass CSN and NTAG, providing extensive compatibility for diverse applications.

Rob Sands, Videx’s Technical Director, said: “Our goal with the Xprox-MO is to provide a flexible and secure access control solution that meets the evolving needs of our customers. The combination of advanced features, robust security and ease of integration makes this reader an excellent choice for a wide range of entry applications.”