You are at : Search > Articles Search Results

Articles Search Results

151 Articles and 17 related Products found for Siemens

Sharpen Your Senses: Securing Boundaries with Perimeter and Intrusion Detection Technologies

Sharpen Your Senses: Securing Boundaries with Perimeter and Intrusion Detection Technologies

Editor / Provider: a&s International | Updated: 8/17/2011 | Article type: Tech Corner

Perimeter security and physical intrusion detection are crucial for critical infrastructure and large-scale commercial complexes. Whether for government and military facilities or commercial-industrial areas, having a reliable and efficient risk-deterrent system on the perimeter of any important site is now mandatory. On a global scale, there is much room for growth — IMS Research forecasts that in 2011 the intrusion detection market will surpass US$2.4 billion, and the perimeter security market will reach about $400 million. a&s explores the latest market update and technological developments in perimeter and intrusion detection, as well as key considerations for selecting and installing a complete system.

Market potentialand sales performance for perime terse curity and intrusion detection products depend on the region or country's recovery from the recent recession, according to industry experts.

Retrofit projects tend to take place in mature markets, while new projects occur in emerging markets. “The increase in demand is almost directly related to a country's GDP growth rate and economic recovery,” said Luc Joosens, Detection Product Management Leader for EMEA, UTC Fire & Security. “Countries that have experienced economic recovery in 2010 have demonstrated an increased demand for intrusion detection systems.”

The Americas and Asia markets have strong demand for perimeter and intrusion detection products. "The Asian markets have been driven by construction growth, low unemployment, high GDP, a growing middle-class and increased government spending," said Blake Kozak, Market Analyst for IMS Research. "The American intrusion market is forecast to be especially in demand because of the move away from traditional PSTN communications toward GPRS and wireless connectivity."

“The Gulf region is a growth market for us, and we are actively developing our base there,” said Stewart Dewar, PM of Senstar. “In terms of emerging markets, India continues to hold opportunity for perimeter intrusion detection system (PIDS) companies as do Mexico, Colombia and Brazil. We have also recently opened an office in Singapore to address this region more aggressively.”

Several manufacturers concur with IMS Research's prediction on the perimeter security and intrusion detection markets. “To achieve US$570 million in 2014, the market would need to experience growth more than three times over what was seen from 2009 to 2011,” said David Curtiss, Director of Engineering at Smarter Security Systems.

“While that type of growth seems aggressive, government programs are placing requirements on critical infrastructure facilities that will need to be fulfilled. Also, there are new video management and analytic technologies now offered to replace or augment existing infrastructure.”

Conservative players have less bullish estimates, although they agree that GDP growth and government programs will drive this market. “The US market, for instance, will turn around over the next couple of years with regulations such as Chemical Facility Anti-Terrorism Standards for the petrochemical industry. The International Ship and Port Facility Security Code in relation to the seaport market is already impacting perimeter security business in Africa and other places,” Dewar said. “The next three years should give the sluggish markets, particularly in Europe, time to rebound and get back on track. In many cases, projects have not been cancelled but rather delayed or pushed off to deal with the economic challenge.”

Others are even more optimistic about potential growth. “The worldwide perimeter security market should reach even more robust levels as new technologies are integrated into comprehensive solutions,” said James Ionson, CEO of Oncam Global. “Open perimeters, such as deserts or waterways, with few, if any, obstacles to access, present new challenges for the industry to address. The spike in piracy at sea and terrorist activity can be expected to result in the need for enhanced security systems for both commercial and luxury travel vessels, as they extend surveillance from a liability focus to also include perimeter security.”
[NextPage]

SPICING UP OLD FENCES
Perimeter security and intrusion detection products are more complex and powerful than ever. End-user behavior has also shifted from using individual products to combining various detectors and sensors for holistic protection. “As a result of the fact that basic detection technology has been getting better and more advanced, the coverage of different risks is currently much better than some years ago,” said Juergen Grasmehr, Global Portfolio Manager Intrusion and Perimeter Systems, Siemens Building Technologies.

“It is now possible to cover almost any kind of areas or objects, such as fences, walls, ground, water, air, building roofs and building facades. Together with other technologies like video surveillance, it is now possible to have very high detection quality combined with an automatic, sophisticated verification thanks to automatic camera tracking, zooming, object classification, visualization in overview maps and the like.”

One way to provide greater security at critical infrastructure sites is to combine multiple security technologies. “Indoor detection systems can be expanded with perimeter protection for advanced warning, while multiple technologies can be combined in the perimeter protection, such as fence and active IR; fence and microwave; motion and video surveillance; or combinations of these,” Joosens said. “Improved anti-masking technology reports sabotage attempts to the security system, and finally the increased use of video surveillance cameras with higher image quality and longer range provides better security at key sites.”

IR with microwave, quad pyro elements, multicurtain laser and 3-D detection based on time-of-flight technology are some examples of basic detection technology becoming more advanced, Grasmehr said. “Also, detector information can be delivered faster and more precisely with current technology. For instance, placing a number of alarms in a specific zone from different detectors can increase or decrease the real alarm probability.”

For outdoor detectors , the increased development quality, as well as manufacturing quality of electronics and mechanics, is manifested in affordable high-end products such as laser scanners, radar detectors, high-end fiber optical detection systems or piezo dynamic sensors, Grasmehr said. “New sensor systems are more flexible, and in some it is possible to run and combine multiple, complex detection algorithms on one detector at the same time. For instance, a laser scanner is able to detect small object in one area and large object in another area.” Dual motion sensing technologies — such as double passive infrared (PIR) or PIR with microwave — are also gaining popularity, as combinations are capable of achieving higher false alarm immunity, Joosens said.

“Using the latest K-band dual technology, this kind of sensor verifies the PIR signals with the microwave signal prior to any alarm decision and is less likely to trigger false alarms as K-band microwaves do not penetrate walls and glass as easily,” explained Tony Makosinski, External and Security Industry Liaison, Honeywell Security.

“Therefore, faster and more reliable detection is achieved, and false alarms and associated intervention costs are reduced. As this technology becomes more developed, it is increasingly taken up by the rest of the industry.”

For fences, cable sensors deploying fiber optics and coax are prevalent today, said Curtiss. “For fences with detectors, PIR detectors offer superior performance when complemented with a perimeter security system in areas such as gates, roads or any location that may require trenching.”

Buried fiber-optic systems appear to be taking the lead versus radio frequency/leaky coaxial types of sensors in underground detection due to their immunity to water, lighting and soil conditions, said David Smith, CEO of Optellios.

“Although fiber optic technology is not new, the prevalence of its use in security deployments is on the rise compared to strain gauge, microphonic and shaker systems, because it is easy to install.” Fiber requires no electronics on the fence, no additional power and is immune to lightning and radio interference. It has sufficient bandwidth to handle video and access control communication. Detection technologies initially developed for military applications, such as radar detection, are more common in civil security projects, Grasmehr added. “The radar system could detect and track a person from a considerable distance before he or she is even near the fence or up to the fence line, and continues to track once the person has entered the fenced perimeter,” said Jason Burger, Sales and Marketing Manager, Navtech Radar. “Radar does not require light or good weather to function, and would work in all light and weather conditions.”

“Some airports are using radar arrays that are configured to detect movement in both the X and Y axes. This data is then combined to produce a 3-D display of the target,” Curtiss said.
[NextPage]

SOFTWARE POWERS
PSIM and mapping software are coming into the spotlight with more offerings from established leaders and startups, especially for critical sites operating with multiple security systems. “The ability to integrate the many disparate security devices and locations within an organization into a common operating platform that enables efficient assessment and response from a command and control center as well as field personnel is highly desirable,” Curtiss said. For entry-level security management, alarm integration modules enable fast deployment interfaces to other security subsystems, using dry contacts for handshaking, Dewar said.

To facilitate integration between PIDS sensors and a security management system (SMS), it requires several things from the PIDS vendor. “First, a well thought-out software architecture — one that provides sensor management tools that can be used at the same time the PIDS software is exchanging information with the SMS, and one that allows the SMS to do a query for the current status of all sensors,” Dewar said. “By having this capability, after a power-up or restart, the SMS can quickly be synchronized to the state of the perimeter system. Second, a comprehensive SDK is required that clearly documents the protocol by which alarm and status information is exchanged and that provides a high-fidelity simulator so all sensor events can be simulated in software to test the eventual integration.”

The addition of video surveillance and VCA maximizes the effectiveness of a perimeter or intrusion detection system, which can both be managed through central management software. Video verification is carried out by PIR that triggers a camera and sends snapshots or a compressed video clip via the control panel to the monitoring station or directly to the end user for verification of the alarm, Joosens explained. “Both wired video verification systems as well as wireless video verifications systems exist, but as the distribution of the images is handled by the control panel, the systems are typically proprietary to the control panel manufacturer and interoperable with other intrusion systems. There are major differences in the various systems on the market in terms of the type of image sent, the image quality and the transmission time.”

“Video verification and analytics is a necessary combination that end users need to implement if they can. Let the PIDS detect the intruder and let the video provide the video surveillance to determine the appropriate response,” Smith said. Video surveillance solutions that interrogate and verify potential threats enhance the effectiveness and efficiency of perimeter security systems, Ionson said. “They enable timely and measured responses while dramatically reducing costly false alarms. Using 360-degree imaging, with its total situational awareness, to trigger a colocated PTZ camera to quickly zoom in on a suspicious event increases both the speed and accuracy of threat verification.”

WHAT'S NEXT?
Choosing the right perimeter security and intrusion detection products depends on the site that they are supposed to protect. There is no one solution for all perimeter security applications and each application should be approached with this knowledge, Dewar said.

“While specific challenges from site to site still exist, the introduction of standards across the board has led to significant advancements in the reliability of physical intrusion systems,” Makosinski said.

When considering critical infrastructure, the requirements for intrusion detection are moving toward higher security, meaning better capture performance, better signal analysis and better communication solutions, with multiple paths and better integration into other subsystems, said Dennis Petricoin, VP of Product Management for Intrusion Detection, Bosch Security Systems. “We continue to see integration and flexibility as a key part of the industry's future.”

Selecting suitable products that satisfy end user requirements is only part of the equation. The second part of this feature explores key considerations system integrators should pay attention to during and after installing a perimeter and intrusion detection system.

US Market Grows with Backlogged Demand

US Market Grows with Backlogged Demand

Editor / Provider: a&s International | Updated: 8/16/2011 | Article type: Hot Topics

With increased cash flow, pent-up demand for security is rallying in 2011. Critical-infrastructure applications, as well as education projects, are going strong. In product adoption, IP smoothes the way for enhanced interoperability, indicating a good year to come.

US security demand reached a boiling point after the 9/11 terrorist attacks. Homeland security boomed, as states and municipalities rushed to secure citizens and critical infrastructure. The detection market for chemical, biological, radiological and nuclear and hazardous material decontamination technologies is expected to reach US$1.5 billion by 2016, according to the Homeland Security Research Corporation.

A need for a unified response drove access control demand. “Access control is growing in government, utilities and health care,” said Paul Everett, Research Director for Access Control, Fire and Security at IMS Research. “The government has federal Homeland Security Presidential Directive 12 and personal-identity verification mandates, which drive growth.”

Critical infrastructure continues to heat up, as the market rebounds from the economic downturn. US government installations are stringent about IT and will specify standards for hosted video and access control in the cloud, said Matt Barnette, VP of Sales and Marketing, AMAG Technology.

Rising Verticals
Transportation and City Surv eillance
The transportation market is witnessing strong growth as air and rail hubs remain on high alert. “Critical infrastructure is growing, such as for city surveillance, airport, transport and roads, seaports and railways,” said Kim Robbins, Director of Marketing Communications for DVTel. These verticals are sustained by continued grant funding to meet specifications.

State spending for intelligent transportation systems (ITS) was expected to reach $1.4 billion in 2010, said IMS Research. California and Florida lead in spending, with another 26 states increasing the scale of their ITS deployments by $10 million to $100 million each.

City surveillance is well underway in large US cities. “Just about every major metropolis is adding traffic cameras for analytics,” said Lance Holloway, Director of Technology Strategy, Stanley Convergent Security Solutions.

Analytics can speed up video searches, identifying objects as people or vehicles, as well as classifying colors. “More system integrators request real projects,” said Zvika Ashani, CTO of Agent Video Intelligence. “We see demand in critical infrastructure and city surveillance.” Integration of large camera deployments in critical infrastructure requires better integration, making PSIM providers hotly in demand. “It's why we acquired PSIM provider Rontal to expand our technology into critical infrastructure and the enterprise space,” said Courtney Jaret, Marketing Director for Verint Systems.

Adoption of PSIM is growing to streamline operations. “We have massive buildings and corporations spread across the U.S., making the addressable market enormous,” said Matthew Kushner, President of the Americas, CNL Software. “That has largely come about because of the economic tone. As more budgets are released, integration problems that haven't gone away since 2008 mean more demand for PSIM.”

End users look for fully integrated solutions. “Customers want to sit down in front of one software package and one interface to control their facility or multiple facilities,” Barnette said.

Comprehensive solutions need to deliver true value beyond equipment. “Users look for a full platform that can control heating and cooling, count people and monitor displays,” said Gadi Piran, President of On-Net Surveillance Systems.

However, America's large installation base of analog equipment is slowing network uptake. “The smart-city market outside the U.S. is massively larger,” said Steve Collen, Director of Business Development, Physical Security Business Unit, Cisco Systems. “Cisco has about 500 smart-city deals worldwide.”

[NextPage]

Best in Class
Education has long been an early adopter of security, with good growth expected in the U.S. “Education is sadly seeing more uptake because of violence, bullying and vandalism,” said Steve Gorski, GM of the Americas, Mobotix. “If you think about schools, they have good network infrastructure, which lends itself to supporting network cameras.”

Higher education is seeing a change from the traditional security channel. Instead of going through installers, some end users are deploying network video surveillance themselves. A US university had its own IT security team install 500 cameras, heightening vigilance to crime or deliberate violence, such as shootings. “The university used video surveillance very effectively to deter and solve incidents on campus,” said Wendi Burke, Manager of Global Marketing Communications, IQinVision

A college deployed a solution combining a strobe, sensor and camera at its observatory, after the theft of a $2 million telescope. “The institution didn't secure the telescope because they thought it was too big to take,” said Rollie Trayte, President and COO of FutureSentry.

Cashing In
Gaming projects slowed during the recession, but are seeing renewed movement. “Gaming is big for us,” said Scott Paul, Senior Product Marketing Manager for Pelco (a Schneider Electric company). “We have a number of installations and reference sites around Las Vegas, including the Bellagio, the Mirage and McCarran Airport.”

HDcctv enables HD resolution over coaxial cables, which is suited for casinos betting on upgrades. This utilizes legacy wiring while covering key areas such as entrances or dealer tables with better detail. “The big benefit is that casinos don't need to change cabling over existing RG 59, and you don't need to rip apart the casino,” said Mark Wilson, VP of Marketing for Infinova.

“If you just change the cameras, that expense can come out of the maintenance budget.”
Retail
Retail has stabilized, as consumer spending increases.
“Retail is growing for wholesale chains with many stores and a central video system,” said Lars Gudbrandsson, Head of Product Management for Milestone Systems. “The U.S. is good at incorporating large installations and taking advantage of IP surveillance.”

Video surveillance can provide real ROI to retailers. “Wal-Mart saved millions of dollars on litigation from fraudulent slip-and-fall claims by being able to display detailed video of people deliberately pouring water or pretending to fall,” said Bengt Christensson, Senior Marketing Director for Ambarella.

Retrofit
A strong retrofit market in the Americas kept intrusion from declining too much as new construction slowed, according to IMS Research. More interactive systems are seeing uptake, such as video verification.

Cloud applications are particularly appealing, with several rollouts underway in the U.S. “The cloud is seeing movement for video verification,” said Jon Hughes, Product Marketing Manager for Video Surveillance, Interlogix (a UTC Fire & Security company). “We have third-party development partners.”

Slow economic conditions hastened adoption of easy-to-administer access control solutions such as software as a service (SaaS). “Greater emphasis has been placed on streamlining and reducing operational costs for security operations covering broad geographic deployments,” said IMS Research in an April report. “However, uptake will be modest until mainstream users identify the same benefits as niche users. One barrier limiting mass adoption is end-user reluctance to store security data on a third-party server rather than on-site.”

Migrating to IP
IP video has matured, with breakthroughs in resolution, compression and storage. While the technology is essentially unchanged from prerecession specifications, buyers now are actually able to pick up the tab.

“IP uptake is accelerating,” Gorski said. “We have had tremendous growth in the U.S., which is up 50 percent.” More cameras and DVRs are opening up to IP. “VARs from the IT world are now in security,” said Joe Cuellar, Sales for DNF Security.

One of the biggest draws of IP video is higherresolution imaging, with 2.1-megapixel resolution equaling that of six D1 cameras. All those extra pixels require a significant amount of storage, which is becoming more affordable. “The increases in the number of video channels per installation and the resolution of the cameras are some of the primary reasons for the growth of data in video surveillance applications,” wrote Frost & Sullivan in its 2010 “North American Physical Security Network Storage Market” report. “As end users weigh the benefits of expenditures for installation and implementation of updated and advanced technology against existing infrastructure, recovery in this sector is expected to begin in 2010.”

The value of network storage is also driving adoption in the U.S. “Falling prices and greater levels of innovation among the IP-based physical security systems are helping the shift to more IP-centric systems requiring networkbased storage,” Frost & Sullivan said. “Integrated security management offers huge potential for network storage systems in physical security. Security systems can be incorporated into enterprise databases to expedite business processes.”

Strategic partnerships are the way forward, as seen in Cisco Systems joining forces with Pelco for its network camera business. Pelco's acquisition by Schneider Electric furthered strengthened Cisco's ties, as it had worked extensively with Schneider on building projects. “What we see in the future of that relationship is much more than physical security; with building automation and access control, it's packaging all those things together,” Collen said. “I think the security market's a good one to be in, as it seems quite robust.”

[NextPage]

Standards
ONVIF and PSIA are the dominant interoperability bodies, with PSIA being the first body formed during February 2008 in the U.S. PSIA is working on comprehensive standards for video surveillance, access control and intrusion, while ONVIF is more video-centric.

Today, ONVIF is the one with more members — 296 as of press time. “We have close to 800 products,” said Jonas Andersson, Chairman of ONVIF's Steering Committee and Director of Business Development and Global Sales at Axis Communications. “Consultants have started specifying the standard, which no one could imagine.” Each standard has its own merits. However, as most vendors specialize in video surveillance, they adopted the standard followed by network camera king Axis.

While both ONVIF and PSIA promise to address access control and intrusion, the first iteration of the standards covers getting video from third-party network cameras. Playback, compression and PTZ controls are not yet covered, as each company does things differently.

As end users mix and match cameras, interoperability standards relieve headaches. “Many customers have come to trust the quality and the performance of our products, and will be able to continue doing so as they use their VMS or NVR of choice,” said Steven Sung, Regional Sales Manager of CNB Technology. “We want to be an integral part of the process in making network cameras more available than ever.”

However, technical issues still need to be ironed out. “Real-time streaming protocol is not detailed enough in ONVIF, which is why some cameras display with better quality than others,” said Qiwei Zhang, Assistant Chief Engineer of SAE Electronic. “Equipment in the network is not detected if it goes offline, which is covered in the PSIA standard. We're leaning toward PSIA compliance, as it's a more complete standard.”

Each body has multiple levels of membership; fees are not charged for manufacturers conforming to the standard, while higher-level paying members are involved in writing the specifications. “ONVIF has achieved so much, and it's foolish to expect everything to be perfect from the start,” said Anders Ulle, Communications for Siemens Building Technologies.

“ONVIF doesn't test all devices; it's an honesty game.” The current version of ONVIF is incompatible with past versions, causing great developer consternation. “Future releases of the standard will be backward-compatible,” Andersson said. “We will just add to the standard, not modify it.”

However, each manufacturer will interpret the standard differently to maintain their competitive advantage, making true interoperability elusive. “I was the vice chair of PSIA and saw where the market was going,” said Danny Petkevich, VP of R&D for Next Level Security Systems. “Everyone was doing the same thing. Where the future is and where it is now is taking all the pieces, putting them together and making it easy for people.” Standards are in their infancy, but are a step in the right direction for a highly fragmented industry.

The American market has made an impressive rally in the past year, with fervent hopes that the worst of the downturn is over. Increased funding and healthy domestic demand are spurring an uptick for IP and solutions that deliver cost-saving results. US security is on the rebound, hoping to score big in 2011

Chemical Plant Secured by Siemens Surveillance Solution

Chemical Plant Secured by Siemens Surveillance Solution

Editor / Provider: Siemens Building Technologies | Updated: 8/5/2011 | Article type: Infrastructure

Chemical manufacturing facilities have always placed a high priority on public and environmental safety but today manufacturers must also now consider the threat of intrusion and attacks. Thanks to a management solution from Siemens Building Technologies Division, security procedures at a chemical manufacturing facility owned by PPG Industries are greatly enhanced.

Pittsburgh-based PPG is a global manufacturer and supplier of paints, coatings, optical products, specialty materials, chemicals, glass and fiber glass. Serving customers in construction, consumer products, industrial and transportation markets, it operates on the leading edge of new technologies and solutions. The company operates in more than 60 countries around the globe.

PPG reviewed the surveillance system at one of its largest and uniquely located sites. While the system recorded activity 24 hours a day, accurate real-time surveillance was limited to periods when security guards watched video-feed without interruption. It was a relatively simple matter to realize that the software intelligence built into the solution from Siemens Building Technologies Division, would enhance protection of the site, with the additional benefit of simultaneously reducing surveillance costs.

The Siemens solution is an automated large-scale video surveillance solution that transforms traditional physical security systems by combining camera and other sensor (intrusion, fire detection, access control etc.) input. It provides reliable protection for industrial facilities, transportation hubs and byways such as seaports and airports, water treatment facilities and other critical infrastructure by continuously monitoring sites through intelligent policy zones and virtual barriers even across water. It detects, tracks, and classifies activity in real time, filtering critical events from camera and other sensor input, displaying the results on a comprehensive digital map of the entire site on a single screen. This enables operators to see exactly what is happening at any time throughout the whole site. Integrated 3-D analytics determine object attributes in absolute “real-world“ coordinates. This requires fewer cameras and helps lower infrastructure cost compared to 2-D analytics.

At the PPG site, the software-driven nerve center of the solution takes input from many cameras and provides a live, bird's-eye view of the entire manufacturing facility, spanning more than 1,000 acres and including a mile of shoreline as well as railway entry and exit points. This composite view takes the guesswork out of tracking objects that move from camera to camera, so operators always know the accurate location of every object in the facility.Detailed information about anything suspicious is readily available.

The perimeter and other sensitive areas are protected by ‘Alert' zones. This automated triggering of instantaneous alerts substantially reduces the cost of monitoring, giving around-the-clock protection. When anything unexpected occurs, the solution automatically detects any activity, pinpoints the location and tracks the perpetrators whilst simultaneously alerting guards through audio, video notifications, and e-mail alerts. This ability to efficiently deploy guards rapidly and efficiently helps prevent the escalation of incidents. Alerts are triggered from changes as simple as a vehicle or an individual entering a restricted area, but can also be triggered by object speed or size. Alert areas are easily and instantly set or changed by dragging area boundaries in the composite image of the site and can be adjusted using preset shortcuts. The open architecture enables the solution to run on standard hardware and software and allows it to be modified and expanded to respond to changing security needs. It easily accommodates site-specific operational conditions and varying security requirements allowing the limiting of access to selected areas or the entire site, the specification of varying security level requirements within the site and the raising or lowering of security levels in accordance with threat levels or evolving governmental mandates.

Planning and implementation of the system at the PPG site was assisted by the skill of Siemens staff and the solution was delivered ahead of schedule. This gave security personnel at PPG time to get practical, hands-on experience before the system went live and after just a single day of training, operators were using the system successfully.

Troy Higginbotham, Senior Tech Analyst of PPG, said, "I have been working with Siemens' surveillance software since 2003. In my opinion, the latest  version is the best upgrade since its inception. The ability to track a single object with multiple interrogation cameras and auto-zoom to a factor based on how far the object is from that camera is very impressive.

Higginbotham continued, "I have had the opportunity to work with the system for a few hours in order to re-acquaint myself and the advances made have amazed me. Siemens' professional services team, along with the technical support team, has done everything needed to make this project a successful upgrade"

Shortly after the Siemens' solution was operational, a mock attack was staged with actors portraying terrorists. Operators tracked, monitored, and recorded the progress of the ‘intruders' by vessel and on foot, via the screen image of the site. Never before had security officials at the site been able to detect and monitor a potential threat to their facility so effectively. They then dispatched guards to their exact locations.

The Siemens solution has now become the foundation of the security program at the site because it seamlessly integrates new and existing sensor types and allows the client to manage all surveillance-related security issues easily from a single point.

Sky is the Limit: Airport Security Soaring into Smart Management

Sky is the Limit: Airport Security Soaring into Smart Management

Editor / Provider: Camille Shieh | Updated: 7/4/2011 | Article type: Infrastructure

Heightened aviation security since the 9/11 attacks and subsequent terrorist threats has brought along increased awareness, for danger can be detected or deterred before brought into the air.

As new airports continue to be constructed and existing ones upgraded, newer technologies like HD video surveillance, video content analysis and management software are gradually adopted to enhance the security and safety of complex airport and aviation operations. Security management of the entire premises is, thus, increasingly highlighted. One of the top challenges faced by system integrators today is assimilating new technologies and products into existing systems, as old and new systems often have trouble communicating with one another. However, should an airport project adopt technologies based on an open platform, integration would be much smoother, with extra cost minimized and existing investment extended.

It is common to find restaurants, retail shops, cafes — and even hotels, spa centers and casinos — in today's airports. “As airports provide a global transportation network among cities, they are important hubs and have considerable regional economic significance, giving the cities they serve great commercial advantages over those that do not have them,” said Uwe Karl, Head of Airport Solutions, Siemens Building Technologies. “Airports will undoubtedly continue to grow in number, and existing airports will continue to grow in size in order to satisfy the increasing demand for mobility. The systems employed to protect them, therefore, need to accommodate such growth, with a smooth migration path to allow systems to expand easily.”

Newer, Bigger, Better
The mature markets in North America and Western Europe see a continuation of security upgrades. “The sales outlook is promising as threat has not lessened,” said Mark Wilson, VP of Marketing, Infinova. “The biggest need requested by airports in North America is HD video surveillance.”

The US market is continuing at a good pace, fueled by the events of 9/11 and carried through up until the Obama administration, said Mark Moscinski, VP of Safety and Security, System Development Integration. “Federal stimulus funding has also kicked in for many airport security projects with design phases giving way to implementation projects; in fact, we seem to be only at a halfway point through the federal funds for the realization of our current projects.” In the last few years, large airports in Europe have had more difficulty with growth than smaller airports, and this trend will continue in the next five years, said Arjan Bouter, International Sales Manager at Nedap. “In Europe, large airports are looking for more flexible solutions to curb the impact of disruptions by extreme weather conditions and other disasters.”

Newer airports in the Middle East and Asia will also challenge the European ones, Bouter continued. “Obviously, this will have an effect on security management systems; new safety and security platforms will contribute to a lower TCO that improves the competitveness of European airports.”

New and upgrade projects in emerging markets, such as China, India, Southeast Asia, Eastern Europe, Russia and Latin America, see healthy growth in number. “We recently completed a project for 22 airports in India, in addition to other major projects in Easter Europe and the Middle East,” Wilson said. “For these projects, we used a combination of analog and HD cameras, and in many cases, they are taking advantage of the existing fiber optics.”

These regions are characterized by strong expansion. For instance, China has planned over the next five years 55 new airports to cover the expansion of traffic, Bouter added. “These regions will implement new security platforms, often based on open standards.”

Many airports in these regions are also undergoing a “face-lift,” and usually for these projects, HD and megapixel technologies are sought after in conjunction with advanced software like video content analysis (VCA), said Aluisio Figueiredo, COO of Intelligent Security Systems. Overall, the physical security market for airports is expected to double by 2016, said Julian Harris, Research Analyst for Aerospace and Defense in North America, Frost & Sullivan. “Perimeter security is growing significantly due to technology innovation and the push to protect patron safety. We see fiber-optic fencing experience more growth than traditional fencing, as the former continues to be invested in.”

In video surveillance, Harris sees more IP surveillance installed at larger international airports, while smaller airports opt for analog technology with less integration of disparate security systems. “In terms of access control, fingerprint readers tend to be adopted by larger airports, while smaller airports stick to standard access control protocol, suggesting that larger airports are exploring more options.”

Biometrics will continue to play an increasingly crucial role, agreed Scott Mahnken, VP of Marketing, Bio-Key International. “Convenience and security are paramount in airports, and biometrics are virtually impossible to corrupt yet involve no cards, passwords or tangible assets. Documents may be forgotten, but we will always have our fingerprints or other biometric attributes.”

[NextPage]

Government In volvement
As most airports are state-owned, municipal, state and federal governments are crucial players in determining what security measures need to be set up in airports. “There is a maze of security and regulatory issues facing every airport,” said John Diedam, VP of International Sales, Ingersoll Rand Security Technologies. “It starts with a thorough understanding of Title 49 CFR Part 1542 of the US Homeland Security's Transportation Department, ranging from who must be in charge, how to become compliant and airport tenant security programs, to security of various locations within the airport, law enforcement and access control. The first objective is to reduce the complexity of this and all other pertaining regulations, along with the security ramifications.”

Next, one needs to determine and resolve airport security and fire safety vulnerabilities, Diedam continued. “Security could be almost perfect if everything was locked down and nobody could come or go, but that's not feasible. What needs to be done is to assure that security is at a high level but innocents can escape when needed. There's a compromise, and they are typically found within the regulations aforementioned and local codes and regulations.”

In the U.S., every commercial airport is owned and operated by a local government entity — city, county, state or port authority — each with its own political structure, funding capabilities, environmental/noise requirements and security/law enforcement support, said Art Kosatka, CEO of TranSecure (a member of the Association of Independent Aviation Security Professionals). “There are federal regulations, as well as state and local building and electrical codes and fire and life safety codes, which must be met.”

“We often see that local or state governments are strongly involved in the economic development of the region/country where the airport is situated,” Bouter said. “Under such circumstance, local solution providers are often favored to take on new or upgrade projects.”

Airports are used as hubs to create new business in many places, observed Gerard Otterspeer, Product Marketing Manager for CCTV, Bosch Security Systems. “At times, international consultants such as ADPI, COWI-Larsen, Bechtel and Parsons set the security standards in airport projects while they help clients plan and design aviation construction projects.”

New ≠ Best
While there are strict and high security requirements, not all airport projects use the latest technologies the security industry has to offer. “Airport clients are very savvy customers, knowing what they need and insisting that their integrators and manufacturers provide systems that meet their expectations for both performance and budget,” Wilson said. “With even new construction projects, it is not unusual to see analog video implanted in areas where it sufficiently does the job. In fact, there are many hybrid and coexisting systems at airports.”

“Airports focus on leveraging as much of their existing technology as possible; they do not have a rip-andreplace mentality,” said James Chong, CTO of VidSys. “Additionally, they tend to wait to use new technology until it has been proven in the marketplace.”

“Generally, we like to think in terms of first providing an initial concept of operations (ConOps) for the customer — what are you doing, why do you need it, where is it required, what is the threat you are addressing and what are the priorities,” Kosatka said. “This should drive the technology decisions, one of which might be that new technology in consideration isn't right for the airport's actual needs at all.”

Securing airports is a complex undertaking, remarked Larry Lien, VP of Product Management at Proximex (an ADT Security Services company). “Airports are continuously looking for ways to improve ConOps to best protect passengers and employees, as well as avoid poor publicity and lost revenue from security incidents. Some airports leverage the latest technologies to fit specific project requirements. They evaluate many factors to make the decisions, including the benefits, risk factors, costs and ROI for new technologies. Newer technologies, such as HD cameras, offer significant advantages because airports may leverage fewer cameras but still cover a large area. However, airports must still consider the ability of newer technologies to communicate with existing systems and fit within the ConOps.”

In airport projects, proven brands, solutions and products are preferred, while current technologies are followed in a general fashion, Otterspeer observed. “HD and even full HD products have gained popularity in this kind of projects for applications like forensic search and wide-angle viewing; however, during the course of a project, the technologies used can change.” Technologies used are much influenced by the consultants in many cases.

[NextPage]

HD and VCA
Using HD video streaming can help extend the life of the existing analog cabling of an airport surveillance system while providing better forensic evidence and the zero latency needed for live monitoring using PTZ camera controls, Wilson Vertical Market said.

In airport security, the devil is indeed in the details. “HD delivers a wide-screen format that captures more useable image content, reducing the amount of empty sky or foreground in a scene if a wide-viewing angle is needed, such as at baggage claim areas,” Otterspeer said.

Motion sensor technology has certainly improved and can now detect farther and more precisely than previous versions, said Rolland Trayte, President of FutureSentry. “Solar-powered wireless sensors offer simple installation and add the detection range to 1,000 feet. Advanced applications can also add analytics to further ensure robust detection and reliability of alarming inputs, and enable the system to ‘learn' the difference between uniquely shaped objects.”

Adoption of VCA for airport monitoring remains low, despite a visible growth in the last couple of years. “VCA is used in about less than 10 percent of airport projects currently, with potential to grow moderately to 15 to 20 percent in the next few years,” Harris said.

“Security standards are not in place yet to get this widely adopted in the market.” Actual applications, Otterspeer added, include line crossings for external perimeters and wrong-way or loitering detection for strategic locations such as air traffic control towers, customs gates and aircraft ramps. “VCA is used from site to site, depending on what the project requirements are,” Moscinski said. “Currently, simple analytics are used most often, as the technology still has several barriers to overcome, such as unsatisfactory hit ratios and high FARs. Simple VCA like motion and object detection can help identify when someone has crossed checkpoints from the nonsecurity to the security side, alarm relevant personnel and provide evidence to assist with tracking and identifying the intruder. We see the most active VCA evaluation now taking place for use in perimeter security.”

Another key technology identified is ALPR, which is very common these days at Tier-1 (major) airports and is becoming increasingly common at Tier-2 and even some Tier-3 airports, said Jim Kennedy, President of Inex/Zamir. “The primary use is for parking revenue management to prevent ticketswapping fraud and subsequent revenue losses. Increasingly, we are requested to provide a ‘list-matching' capability to our system so that local authorities can be immediately notified if a vehicle that is on a watch list enters a specific parking facility.” The disappointment with VCA often stems from undelivered functions it promised in the beginning, Figueiredo said. “Many vendors are pushing less-than-ready VCA products out to customers to make quick cash even if the technology is still not mature enough for real-life usage, ultimately creating more problems for customers. The accuracy of VCA reading is, on average, 85 percent or better when utilized in a controlled environment with strategic camera position and correct lighting.”

HD, megapixel cameras and video analytics may provide improved inf o rma t i on and s i tua t i ona l awareness, but they introduce enormous operational costs in terms of bandwidth and storage requirements, and other issues such as forensic capability and privacy.

[NextPage]

Drawing Together
In expansion projects, such as a midsize, domestic airport scaling to large, international airport or a large-scale airport expanding current facilities, new security systems and technologies, such as HD video, IP-based video and VCA, are often introduced. “These new technologies cannot be installed independently of other existing security systems and require shared information,” Lien said. “Security operators must use different consoles and different systems to manage incidents. The costs associated with operating independent and nonintegrated systems, such as training, additional skills required for reporting and longer incident response time, are significant.”

Yet connecting disparate systems under one central command is no easy task. “We face a lot of problems with legacy systems,” Figueiredo said. “Sometimes, there is no documentation, no SDK, or the company responsible for the system simply went out of business. System integrators (SIs) like us basically have to make sure that the systems work together through the use of an open-platform approach.”

“Typically, each installer/integrator is focused on making sure its own system is installed and runs correctly,” Lien added. “Expectations of how to integrate and what an integrated system can realistically accomplish could often be miscommunicated. Entities that require communication between systems should find an experienced SI that can help them set clearly defined goals for their environments.”

For security purposes, central management software like physical security information management (PSIM) is a good way to maintain unified control over different systems in operation. “A true PSIM solution enables one complete and intelligent security system by aggregating information from various subsystems and automating processes as appropriate to effectively manage situations,” Chong said.

PSIM software is a good option whenever doing a significant expansion or a new project, added Joshua Koopferstock, Director of Marketing, Feeling Software. “Multiple systems, mapping and SOPs should be combined within a single software package, and this common operating picture in airports is becoming increasingly important as security systems become bigger and more complex as the facility expands in size.” To facilitate smooth integration of hardware and software, as well as the old and the new, adopting an open approach that grants partners with access to their SDKs and APIs is vital, Koopferstock said.

“Oftentimes, SIs and PSIM vendors combine their knowledge of and expertise in physical security technologies, process management, and security policy and compliance to provide organizations with a complete situational awareness and management solution,” Chong said.

In addition, SIs and airports should work together to consider their ConOps and how the systems should function after integration, Lien remarked. “Understanding process flows, automating tasks, correlating information and giving usable information to operators will help airports optimize their operations and realize cost savings.”

Many are now focused on quickly identifying situations and disseminating the information to the guards, police and other necessary agencies in real time, Chong said. “Airports are also starting to use a single security asset, such as a camera, for multiple uses. For example, security may use a camera to see if someone is walking around the runway, while air side operations may use the same camera to verify if the gate is available for an arriving flight.”

The growing complexity of daily airport operations demands equally diversified security systems. Smoothly integrated systems, such as access control and people tracking, will help with the fluidity of security management on aviation premises. Biometrics, the new kid on the block for airport access control and ID authentication, will be explored next.

Geutebruck Video System Supports Security at Ljubljana Airport

Geutebruck Video System Supports Security at Ljubljana Airport

Editor / Provider: Geutebrück | Updated: 7/7/2011 | Article type: Infrastructure

Aerodrom Ljubljana which operates Joze Pucnik Ljubljana Airport has long term plans for it to become the aviation hub for the whole region. With Slovenia's entry into the EU and admission to Schengen in 2007 came the need to increase airport capacity. In the first stage of a two-stage project, the existing passenger terminal (T1) has been renovated and a whole new 6,000 square metre storey added. The extra space together with four new jetways now facilitate the separation of Schengen and non-Schengen traffic and make boarding easier. Part 2 of the project due to start in 2011 involves the construction of a new T2 terminal adjoining T1 to provide capacity for a further 2.5 million passengers per year. 

In fact piece by piece over the last two decades the airport has been completely rebuilt. And with each new construction project the security systems have had to expand and develop. The airport's chosen video security system supplier for the original T1 building, the new garage and outdoor car parks as well as for the recent T1 renovation and additional storey was Geutebruck Adria. This business relationship has now been a long and satisfactory one. 

Technological migration
Since 2006 all new additions to the video security systems have been pure IP. Around 100 new IQeye IP cameras and Axis IP SpeedDome cameras now work alongside the original 160 analog ones. Late in 2008 some new powerful GeViScope video platforms were introduced. Besides increased performance these also brought exceptional video motion detection capabilities and enormous flexibility for future adaptation. In 2009/10 the need to relocate the control room to a new building provided the ideal opportunity to upgrade its facilities. The old analog matrix and analog monitor wall were replaced with a virtual digital matrix and an array of wide plasma monitors.

From the new security operations center staff monitor the whole site. They control the entrances to the airport, the car parking facilities, areas in and around the general aviation and passenger terminals, the VIP areas, the apron and runways.They alert colleagues ‘on the ground' to parking violations, loitering and other suspicious behaviour as well as unattended baggage. Their monitoring also ensures that pick-pockets or other small time criminals are not tempted to take advantage of unsuspecting travellers amid the hustle and bustle. The integration of the video system with the airport's access control system is key to the strict control of movements through the doors and gates which form the crucial air-side/land-side interface. Air-side cameras allow security operations center staff to check that the apron and runways remain unobstructed, safe and secure, and of course enable them to alert and manage emergency or other services if required. 

System selection
Before the contract was awarded for the most recent T1 terminal expansion the airport authority evaluated and compared video security solutions from three major European suppliers. As Dusan Sofric,Ljubljana airport's security manager reports, the Geutebruck equipment was chosen because of its performance and proven reliability. 

This latest GeViScope-based system which uses GscView display software and MBeg control units was designed by Koda and Siemens and installed by PAN electronic and G7. “It is very reliable and easy to use” explains Dusan Sofric. “It is operated by staff in security operations center who have had basic training on GscView.The system has performed very well, exactly as it was initially demonstrated to us.”

Memoori: Will Economic Setbacks Reduce Business Opportunities in the Security Industry?

Memoori: Will Economic Setbacks Reduce Business Opportunities in the Security Industry?

Editor / Provider: Submitted by Memoori Business Intelligence | Updated: 6/8/2011 | Article type: Hot Topics

This time last year economic indicators took a hit with major concerns about the need for countries within the Euro Zone to cut back on public expenditure; in order to repay their massive debts. While this did have an effect on demand for security equipment it was marginal and the fragile recovery in the economy has limped on in the last nine months. But recent events in Greece, Portugal and Ireland would suggest that the bail outs have not worked and they are likely to default on the loan repayments. This has both extinguished any recovery in these markets and has taken its toll in other weak economies in Europe. It will have an adverse impact on world trade. Stock markets across the world have significantly marked down share prices and the buoyant forecasts of economic growth made some five months ago are being revised.

However the emerging markets of China, India and Brazil have so far not been affected. For some years financial markets have turned tail at the mere hint of bad news and have exaggerated the possible consequences; but by the same token the upswing also responds as rapidly. The facts and statistics shown in this month's do not flag up any serious adverse trends that will reduce the opportunity to grow the security business in the near term of the next six months, but they do suggest that there is less confidence and a hint of caution in the air.

Our figures for the first quarter of this year showed that consolidation had slowed down with the number of acquisitions down by 20 percent on the same period of 2010. The last two months have seen a significant recovery, Tyco Fire and Security claim they are about to close a US$110 million deal, there is serious talk about Securitas and Niscayah making a reunion and the possibility that Cisco will put Linksys on the block reach fruition, then we will be on track to beat the 2010 record for value of deals exceeding $7.98 billion.

Investment for the first five months of the year is marginally up on the same period of 2010 but much of this is the result of arranging new lines of credit. There appears to be little change in the area of venture capital funding.

The most encouraging feature of the business is reflected in the financial performance of security players. The fourth quarter 2010 and first quarter 2011 financial announcements made recently show for the most part revenues and profitability well up on the same quarter of 2010; and the full year outperforming 2009. With almost all anticipating improved trading conditions in 2011, it looks as though revenues and profitability will improve on 2010.

The star performers in 2010 include Axis Communications, Mobotix, Basler, Authentec and Bio-Key, despite the fact that their fourth quarter was well down on 2009. These companies are very specialist and perform in the high growth areas of the business and / or strong in geographic markets that performed well in 2010. They are all companies that spend on product development in the high-tech areas of IP networking.

Similarly the world's major security companies such as Tyco, Honeywell Security, Schneider Electric and Siemens Security Systems all increased both profitability and growth, they are bullish about 2011. Cooper Industries and Ingersoll Rand likewise also increased their growth and profitability, while Bosch Security Systems returned to profitability on increased sales.

With trading conditions looking buoyant in some geographic regions and the drivers that accelerated consolidation and investment in 2010 still well in place that the slowdown of acquisitions and stagnation in funding in the first five months of 2011 does not indicate in anyway a correction but is just a short-term deviation. One major acquisition would bring consolidation well back on track.

So despite economic setbacks it's expected the market to continue to flourish in the high-technology areas of the security business particularly where IT convergence can deliver better ROI. Working the emerging markets and the US with emphasis on some vertical markets will produce the best results while mainstream and low-tech business will continue to reduce its share of the business.

For more information, please go visit Memoori.

Advanced Access Control Helps With Real-Life Management and Processes

Advanced Access Control Helps With Real-Life Management and Processes

Editor / Provider: Submitted by HID Global, Siemens Building Technologies, CEM Systems and UTC Fire & Security | Updated: 6/1/2011 | Article type: Commercial Markets

Access control not only monitors the entrance and exit of a facility but ties in closely with payroll and time and attendance, enhancing total people and process management.

Albert Einstein Health Care Network Stays Connected Through HID Global
Albert Einstein Health Care Network (AEHN) in Philadelphia, U.S. is a large health care system that comprises four hospitals, seven campuses and about 50 off-site primary care physician and surgical center locations. The medical center and its network host 1,200 beds, 6,000 employees, 1,200 staff and voluntary physicians, 10,000 visitors per day and more than 100,000 emergency room patients per year. The health care system needed to replace the employees', doctors', volunteers' and other medical staff's badges with ID smart cards featuring the network's new logo while integrating its payroll system into the new badges.

For this project, AEHN selected HID's readers, smart cards and badge personalization service to replace the 300 existing swipe card readers and produce 7,000 new personalized smart card badges. To ensure a seamless transition for employees, HID offered dual-technology smart cards that worked on both existing and new systems.

HID's badge personalization service printed 50 cards that were tested over two payroll cycles before formal adoption to guarantee that AEHN's payroll system worked accurately and flawlessly with the smart cards.

Once it confirmed the payroll and ID cards were fully integrated, AEHN provided a database of employees and their photos so the badges could be printed and encoded off-site at the card production facility. Within four weeks, AEHN had 7,000 newly branded badges incorporating the new technology.

Since adoption of the new smart-card badges, other departments have integrated other functions, including single sign-ons to computers, AEHN information security enhancement, and cashless vending, integrating cafeteria and vending systems to work with the payroll system.

Future plans for the multiapplication platform include tracking employees' mandatory vaccinations and adding credentials of physicians for visiting doctors in case of a disaster. Down the road, AEHN is hoping to integrate access control cards with medical records and patient information as well.

[NextPage]

Siemens Building Technologies Provides Better Health for Hospitals
Drastic budget cuts, aging populations and increasing patient demands present enormous challenges to hospitals around the globe — many facilities have already closed down. In Germany, for example, the number of hospitals has decreased by 10 percent to around 2,100 in just a decade. The German Hospital Association does not anticipate a reversal of this trend.

The Building Technologies (BT) division of Siemens helps hospitals address these challenges with smart and energy-efficient solutions, coupled with sophisticated security systems. BT's portfolio includes fire detection and extinguishing, security, low-voltage power distribution, building automation, energy efficiency solutions and energy management contracting. Siemens provides financing for energy-saving measures, guarantees customers preset yearly energy savings, and allows them to repay their investments from the money saved.

A case in point was the “Hospital of the 21st Century” which opened in early 2009 in Sittard, the Netherlands where patients are treated as guests and efficiency measures extend beyond cost reduction to enhance patient well-being and rapid healing. At the Orbis Medisch Centrum, advanced Siemens technologies contribute to outstanding patient care while reducing health care costs by around 10 percent.

Hospital security and fire safety were additional key issues. BT's RFID system ensures the security of personnel. In case of emergency, staff can trigger an alarm through the RFID tag integrated in their personal badge, which is forwarded to the personnel in charge through a wireless tracking system.

Additionally, Siemens installed an innovative fire safety system consisting of detection, evacuation and extinguishing components. It is mapped in a danger management system in the hospital's command center so that in an emergency, patients, visitors and personnel can be directed to safety using visual indicators and loudspeaker announcements.

[NextPage]

Access to Edinburgh's Spire Shawfair Park Hospital Protected by CEM Systems
CEM Systems' security management system was installed by ADT Glasgow in Edinburgh's new Spire Shawfair Park Hospital to secure patients, visitors and the state-of-the-art medical equipment at the hospital. The system provides the hospital with an integrated access control, alarm-processing and photo-badging arrangement.

Spire Shawfair Park Hospital is a new hospital in the east of Scotland and is part of Spire Healthcare — a leading provider of private health care with 36 hospitals throughout the U.K., employing 7,600 individuals and treating more than 930,000 patients a year. As a new modern hospital facility with the latest medical equipment, Spire Shawfair Park Hospital provides a range of private day care services to patients across Scotland.

The management software comes with many security applications, with Spire Shawfair Park Hospital particularly favoring the ID-badging application. The ID-badging application allows the hospital to print and design its own personalized access cards, while providing the ability to divide card holders into access groups, including day surgery, X-ray, accident and emergency, and hospital porters. This ensures only authorized individuals have access to certain areas.

The software also includes the alarm event display (AED) application. AED responds to all alarm situations in real time, providing a dynamic on-screen interface to external systems such as surveillance. Spire Shawfair Park Hospital can use this application to alert security personnel if an alarm is triggered or a door forced. Security at the hospital can act on this alarm immediately to ensure staff and patients are kept safe, and restricted areas are kept secure.

With the management system successfully installed, Spire Shawfair Park Hospital now has secure entrance points, where smart card technology ID badges are issued to control accessible and inaccessible areas in the facility.

[NextPage]

GE HealthCare Selects UTC Fire & Security for Integrated Security Access
GE Healthcare provides transformational medical technologies and services through medical imaging and information technologies, medical diagnostics, patient-monitoring systems, performance improvement, drug discovery and biopharmaceutical manufacturing. Headquartered in the U.K., GE Healthcare employs more than 46,000 people worldwide committed to serving health care professionals and their patients in more than 100 countries.

GE Healthcare's main facility in Italy, covering 6,920 square meters over four floors with 430 employees, was moved into a new building. This building was in need of tighter security matching GE's global security outlook. Looking at the security approach of GE's facilities around the world, there was a specific need to expand the current system with integrated access control and video surveillance. GE Healthcare turned to UTC Fire & Security to provide the solution.

GE Healthcare's new security system is based on UTC Fire & Security's integrated security platform. This enables significant integration between access control, video surveillance and other building management systems. The Italian headquarters building is equipped with 40 strategically placed day/night cameras connected to three DVRs, 14 door readers and 50 magnetic door locks. The magnetic door locks in combination with badge readers control the opening and closing of doors and act as a basic intrusion detection system, triggering alarms when doors are forced or opened without authorization.

The integrated security system links access control and video surveillance, making it possible to crossmatch events. As a result, when a specific action occurs a door is opened, forced or access is denied — the video footage of that event is stored automatically on one of the DVRs. The main server in the central control room also manages identical security systems in GE Healthcare's local offices in Rome, Bologna, Turin, Naples and Mestre. With this system, no unauthorized action goes undetected, enabling business operations in a secure environment.

Security Industry Dynamics: April Came in with a Roar but Went out with a Whimper

Security Industry Dynamics: April Came in with a Roar but Went out with a Whimper

Editor / Provider: Submitted by Memoori Business Intelligence | Updated: 5/5/2011 | Article type: Hot Topics

The first quarter results analyzed on Memoori, a site providing information involved in security industry, entitled “The Physical Security Industry in 15 Minutes” showed that both consolidation and investment had slowed down significantly. In the first quarter of this year the number of acquisitions was 20-percent down on the same period of 2010 when Tyco made a US$2 billion acquisition of Broadview Security.

This was a disappointing start to 2011, but Reuters broke the news that Schneider Electric was mulling the possibility of acquiring Tyco International. This startling news opened up the possibility of realizing a $30-billion deal, by far the biggest ever in this industry; having major implications particularly for the other suppliers in the distribution chain.

Within days every analyst and pundit had reviewed the implications from all angles most commenting that this daring strategy could work but that it was risky. Schneider quelled speculation that the company was exploring acquiring Tyco International, saying it prefers smaller deals and that there would be no large scale transaction in 2011.

There can be no doubt that Schneider had been taking a serious look at this potential acquisition but the shareholders and financial community did not like it and the board have been forced to call a halt. The risk is that this acquisition would have stretched their finances too far, which overruled the strategic benefits of driving their security business to the top of the league while at the same time providing them with a global market leading fire safety business. Both of these businesses have proved to be robust and have grown during the world recession.

So strategically this is an opportunity lost, for Tyco would fit in well with Schneider's existing security / safety structure. There is no duplication with Tyco's Fire Detection & Extinguishing business and surprisingly little overlap with their physical security business. Schneider's strength is in the video camera surveillance market in the commercial sector acquired through its purchase of Pelco in 2008 and has a strong business in systems integration through a number of acquisitions that made up Tour Andover Controls. Tyco through the ADT operation is strongest in the residential market and Schneider does not play in that market apart from low-voltage equipment.

The residential market for security is expected to play a major role in bringing together home area networks, energy management and its interface with the automatic metering infrastructure a rapidly growing part of the smart grid. This new business would offer very significant longer term prospects for organic growth.

[NextPage]Had Tyco come into play then it is highly likely that Schneider would have had to fight off Honeywell Security, Siemens Building Technologies and UTC Fire & Security, but all of these companies have a major overlap in both fire and security. While that does not obviously rule them out they would need to divest a significant part of this business in order to make the acquisition commercially viable. The deal would therefore be less attractive to them. In addition, Honeywell and Siemens would have been scrutinized by the European Commission with regard to market share implications in the fire detection market.

It would appear that Tyco would not be adverse to a merger or acquisition so expect more rumors in the next nine months.

There were no major deals this month but Tyco (ADT Security) scored again with the purchase of Proximex, a PSIM supplier; following last month's purchase of Signature Security which they purchased from Oceania Capital Partners Limited for $171 million.

April recorded two major investments, but as always alliance arrangements continued to be buoyant with some nine identified, bringing the total number to 33 for the first four months of this year.

The most encouraging feature of the business is reflected in the financial performance of security players. The fourth quarter 2010 and first quarter 2011 financial announcements made recently show for the most part revenues and profitability well up on the same quarter of 2010 and the full year outperforming 2009. With almost all anticipating improved trading conditions in 2011, it looks as though revenues and profitability will improve on 2010.

The star performers in 2010 include Axis Communications, Mobotix, Basler, China Security & Surveillance, Authentec and Bio-Key, despite the fact that their fourth quarter was well down on 2009. These companies are very specialist and perform in the high growth areas of the business and / or strong in geographic markets that performed well in 2010.

Tyco, Honeywell and Siemens all increased both profitability and growth and are bullish about 2011. Cooper and Ingersoll Rand similarly increased their growth and profitability, whist Bosch Security Systems returned to profitability on increased sales.

With trading conditions looking buoyant and the drivers that accelerated consolidation and investment in 2010 still well in place we expect that the slowdown of acquisitions and funding in the first four months of 2011 does not indicate in anyway a correction but is just a short term deviation and 1 major acquisition would bring consolidation well back on course.

From Vision to Reality Turning Convergence Into Real Business Value

From Vision to Reality Turning Convergence Into Real Business Value

Editor / Provider: Submitted by Siemens Building Technologies | Updated: 5/5/2011 | Article type: Hot Topics

Productivity and cost optimization, risk management, compliance, business continuity and sustainability are key objectives of corporations worldwide. Anand Mecheri, CMO of Siemens Building Technologies, examines the consequences of convergence of physical systems with IT and among safety, security and building management systems.

Solutions for safety, security and energy efficiency today are still largely implemented and managed separately. Over time, these solutions are expected to converge and interact with other business systems to deliver a value that is far greater than the functions they individually deliver.

Convergence started with building system backbones integrating into the IT infrastructure. But convergence is not just that. The end state with convergence will be when the customer has a seamless view of his business with collaboration among the underlying processes to achieve continuous improvements to productivity and reduction of costs and risks. There are several consequences for the industry.

Many of the control devices (the automation layer in a system) have evolved into generic IP edge devices running applications to manage building services.

● Open and standardized communication protocols between the control equipment and management stations over an IP network are becoming a reality.

● Management stations are increasingly open to interface with business systems using standard IT protocols such as LDAP, XML, TCP, HTTP and Web services.

● New services, such as hosted/remote access management, virtual guard tours, integrated mass notification and incident management, remote energy monitoring and remote services for building performance optimization, are all in some way driven or influenced by convergence.

CUSTOMER BENEFITS
Simplified system architectures would mean lower life cycle costs and TCO driven by backbone infrastructure, flexibility and investment protection. With standardization and eventually the potential to have vendorindependent control equipment under a common management system, the customer can upgrade the systems without ripping out everything. This was also the key value driver for the IT revolution in the 1990s.

The ability to leverage on remote services over the Web will be of great benefit for customers to obtain professional services without having to build up premisebased capability, which is more difficult and more expensive. The ability to seamlessly integrate building services with other business systems will open new capabilities hitherto not visualized in the areas of facility management, energy efficiency, energy management, convenience and enhanced security.

[NextPage]Converged solutions will also support enterprise risk management; this includes compliance with various regulatory requirements, such as those laid down in the Sarbanes-Oxley Act and Basel II.

The convergence of the physical and logical worlds is already here. Security and safety solutions are increasingly deployed on IT networks. Several open standards have already been published, especially in video surveillance and access control. Enterprise security is being jointly addressed across the physical and logical domains. IT network events are getting monitored by the physical security applications and vice versa. An integrated identity management approach at enterprise level is readily available.

Similarly, solutions for smart grids require demand response capability to be implemented in buildings with communication over the Web based on open protocols. Remote and hosted services are already available. Integration of physical systems with IT systems for provisioning, change management, case tracking, predictive energy planning and sustainability reporting is all available today, in varying degrees of maturity. Thus, convergence has in fact already permeated to many of the building disciplines.

CONVERGING SECURITY AND SAFETY
The convergence of safety and security is a growing chapter within the convergence story. Traditionally, the two systems have been integrated to address scenarios arising from a fire alarm, such as opening accesscontrolled doors to allow for unhindered evacuation or closing fire doors to compartmentalize the zone of fire. Safety and security systems today are increasingly converging to common management stations to address further needs for intelligent (incident) response, such as in situational awareness and evacuation planning.

Managing incidents requires well-structured processes driven by site-specific workflows. Only such an approach can provide us with the assurance that every incident is well-managed from a response point of view. Reduction of complexity, unified command and control, standardization of policies and procedures, and logical user interfaces and workflows that reflect the scenario are implemented to manage incidents more efficiently. This results in improved accountability and assurance

EFFECTIVE INCIDENT RESPONSE
Effective response starts with gathering requirements and defining scenarios. Then, determine the availability of resources and their preparedness to manage each scenario. This is followed by creating situational awareness from several sources, such as convergence of alarms and events from subsystems, or receiving emergency calls. Then, communicate to first responders on a converged communication platform. Next, alert building occupants who may be impacted and give them appropriate directions.

The signaling in buildings should be available on multiple media, including PCs, LEDs or video screens, PDAs, and dissemination of information via text messaging or email. Additionally, you need to provide decision support and make a common platform available to share the status, protocol/process, decisions and actions. Last but not least, an effective solution requires the implementation of the process and capability to gather feedback on incident progress to have a corrective, closed-loop process that enables the response to be adapted dynamically and in real time.

[NextPage]DISASTER RECOVERY AND BUSINESS CONTINUITY
Disaster recovery strategies should encompass business continuity as much as sustainability. Disaster recovery demands ensuring integrity of configuration/master data and restoration of the defined functionality in the quickest possible time. When a site recovers from an incident, the security, fire and automation systems also need to be restored to ensure the operational parameters are restored to support operations. The systems also need to ensure that the site is not exposed to a greater risk than what existed before the incident, including risks to the sustainability processes and initiatives that were in place prior to the event.

CHALLENGES?
The industry must adapt to this environment. The opportunities to enhance customer benefits can only be achieved with the addition of required skill sets in the design and development of the solution which will now extend beyond its conventional realms. We need to gain a better understanding of the processes that we can now start influencing and building solutions that address them. We will also need to develop competencies for a consultative sales process. The IT skills required for system integration will also be higher. New services will need to be developed and productized.

VISION OF THE FUTURE
Some end customers are still relunctant to buy into “integrated and converged solutions,” due to the perceived higher costs; the value add is not fully understood. To provide complete control over all processes that affect business continuity, operational costs, productivity and sustainability, investment into building technologies must move from a cost center perspective to being a business enabler. We will continue to embrace and drive this change, including development of standards that takes convergence into account.

Siemens Access Control System Operated by Danish Power Generator

Siemens Access Control System Operated by Danish Power Generator

Editor / Provider: Siemens Building Technologies | Updated: 4/13/2011 | Article type: Government & Public Services

Siemens has built a working relationship with DONG Energy, Denmark's largest power generator. Having delivered a number of diverse projects for the company, the recent has seen Siemens work with DONG to establish one common access control system across all of the company's 85 sites throughout Denmark.

Producing more than 50 percent of Denmark's power and approximately 40 percent of its heat, DONG is one of the energy companies in Northern Europe. Its business is based on producing, distributing and selling energy and energy-related products through traditional power plants and wind farms, not only in Denmark but also in the U.K., the Netherlands, Norway, Sweden, Poland and France, as well as through hydroelectric plants in Sweden. The company employs around 6,000 personnel mostly working at its Danish sites.

DONG believes that maintaining a good working environment and a high level of safety for employees and suppliers is a prerequisite for operating a healthy and efficient business. This corporate responsibility being an integral part of its values and vision, the company requires all staff to undergo a safety and security certification course for each of its sites at which they work or visit. This attitude was the major driving force behind a move to improve the access control systems deployed at the 85 sites in its homeland, though the initiative also addressed recommendations made by the Danish authorities that regularly monitor security and safety at Denmark's critical infrastructure facilities.

As a result, DONG Energy determined to establish a common access control system across all of its sites in Denmark to increase the security level and to ensure easy access for all employees to centralized and decentralized power plants, city stations and office buildings alike. DONG placed the order with Siemens for the multisite access control system specified by its own facility management team. The contract was duly completed on schedule and all DONG Energy employees are able to use the same card to access all sites anywhere in the country. The project included not only implementation of new systems and the replacement of old, third-party systems, but also the facility to interface with DONG's system application & products system for exporting human resources data.

The new Siemens access control system provides freedom of movement for thousands of employees in a secure environment at numerous locations scattered throughout Denmark. It is flexible, scalable and easy to use and in its entirety comprises 6,000 contactless smart cards and proximity cards, 79 door controllers, 617 readers or proximity coupling devices and four printers. The system is also installed in smaller substations and office buildings throughout Denmark and has the capability for future expansion into other international locations.

The central controllers of the access control system play a crucial role, as they are the interface between the integrated software and the field-level devices. Two types of controllers are installed, which work in tandem on the same site. Communication between all the controllers in the system takes place peer-to-peer, independent of the server. So if connection to the server should be interrupted, operation of the system is unaffected.

Following the successful implementation of the access control system, Siemens was also awarded the service contract for three years.

DONG Energy is aiming to be a major international supplier to the whole of Northern Europe. The company has approximately 70 current licenses for research of oil and gas and is undertaking drilling activities in the Danish and Norwegian part of the North Sea.

First Page< Prev< | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 >Next >Last Page
Sign Up for Free
Weekly e-Newsletters
  • Headline
  • Trending Tech
  • Hot News
  • Product Highlights
  • Success Stories

Featured Suppliers