You are at : Search > Articles Search Results

Articles Search Results

1470 Articles and 371 related Products found for access control

CEM integrated access control and biometric for new Polish museum

CEM integrated access control and biometric for new Polish museum

Editor / Provider: CEM | Updated: 1/30/2015 | Article type: Security 50

CEM Systems, part of the Security Products business unit of Tyco, announced that they have secured the new Silesian Museum in Katowice, Southern Poland. The AC2000 access control and security management system was delivered by CEM Approved Reseller Samaxon, and installed by IB Systems & Budimex.

The stunning new Silesian Museum houses 109,000 items from different fields of art, as well as archaeological, ethnographic and historical artefacts. The new museum building, opening mid 2015, has all of the Museum's exhibition space buried underground with only glass tower skylight extensions visible above.

“As an organization with a large number of important works of art and other artefacts of historical importance, security is obviously of paramount importance for The Silesian Museum. CEM AC2000 access control system was chosen because of its proven security and reliability in addition to its flexibility to integrate to third party security systems” said Philip Verner, EMEA Sales Director, CEM Systems. “Integration is an important part of the Museums' overall security strategy, requiring their existing intruder and CCTV security systems to work seamlessly with the access control system.”

CEM Systems worked together with Samaxon to develop a software interface between CEM AC2000 and Avigilon video management system and used the AC2000 Galaxy Dimension Interface to integrate with the Honeywell Galaxy intrusion detection system.

The AC2000 Galaxy interface enables inputs from intruder panels to be placed as icons on the AC2000 AED (Alarm Event Display) application allowing for central alarm monitoring of both access control and intruder alarms. AC2000 AED provides the Museum with a powerful security management tool and provides a central command and control user interface for the access control, video and intruder systems. AC2000 AED also provides the Silesian Museum with dynamic, real-time information on all alarms and events that occur on the AC2000 system.

AC2000 comes with a range of comprehensive software applications that can enable the Silesian Museum to enhance business operations. The Museum will utilize AC2000 VIPPS (Visual Imaging Pass Production) and AC2000 Visitors. AC2000 VIPPS gives museum security personnel the ability to design and customize ID badges and AC2000 Visitors enables staff to monitor and control visitor access to the prestigious building. Visitors can be given access levels and/ or traced, allowing visitor movements to be monitored and controlled. Visitor cards can then be reused when returned, saving on visitor card costs.

The Silesian Museum has also installed CEM S610f integrated fingerprint card readers at high security doors throughout the building. This additional layer of biometric security allows for triple authentication — card, PIN and fingerprint — for highly restricted areas that require extra security.

Stepping into new trends: Video surveillance in 2015

Stepping into new trends: Video surveillance in 2015

Editor / Provider: Eifeh Strom, a&s International | Updated: 1/30/2015 | Article type: Hot Topics

A new year brings new trends. Many of the trends from 2014 have since turned into industry standards, such as HD resolution and IP surveillance; however, new ones have emerged to keep the security industry on its toes in 2015.

The Market at a Glance
In 2014, video surveillance accounted for approximately 53% of the total market share (US$13.5 billion) in terms of global physical security product sales, according to Memoori Business Intelligence. Double-digit growth has been the norm in the video surveillance market over the last decade, and analysts at IHS forecast similar growth in the new year, predicting more than 10% growth in 2015. Furthermore, Marketsandmarkets has predicted that the global video surveillance market will reach roughly $42.1 billion at a CAGR of 17% for the period 2014 to 2020, with the IP system market expected to grow at a CAGR of 23.5% during the same period. Rising crime rates, an increase in terror attacks, and growing security concerns all are contributing to this growth.

Who Reigns Supreme? IP vs. Analog
The move to IP is no longer so much a trend as it is simple fact: New installations are going IP and many analog users are upgrading to network-based solutions. With that said, does that mean that IP has finally taken over analog in video surveillance? The answer is yes and no. In terms of revenue, IP sales have surpassed analog sales; however, in terms of quantity, analog shipments still outnumber those of IP. This is poised to change, with analysts believing that IP shipments will take over analog by the end of the decade. Evidence of this shift can be seen in markets like Latin America where the overall market — one that is heavily focused on analog — is now leaning toward IP equipment for the first time (by supplier revenue), according to a report by IHS.

Asia Leads the Way
In the world of security, Asia has had a tendency to be a step behind when it comes to the most up-to-date technologies. In the coming years, though, APAC is forecast to be the fasting growing region for IP video surveillance globally at a CAGR of 44.3% during the period 2013 to 2020, according to a report by Allied Market Research. The report also pointed out that North America is expected to experience the highest share in the IP video surveillance market by 2020, predicting that the continent would be the highest revenuegenerating segment with a value of about $19 billion in 2020. However, China is estimated to have been the largest regional market for video surveillance equipment, accounting for a third of global revenues in 2013.

Trends for the Growing Market
Along with growth come trends, trends that help drive growth and keep the market up-to-date with new and exciting technologies. In 2014, we saw IP surveillance become a norm and HD resolution become a standard. In the following, a&s explores a few of what we expect to be the most popular video surveillance trends for 2015.

High Efficiency Video Coding (H.265) One of the most important developments for 2015 will be that of high efficiency video coding (HVEC), also known as H.265, which directly relates to another trend: 4K resolution. HVEC will play a significant role in the feasibility of 4K in security applications. According to security experts, about 90% of surveillance products currently use HVEC's predecessor H.264 for compression. However, that is set to change. “Our outlook is that most future advancements in the market will focus on compression, as the megapixel market has evolved extremely quickly and the compression will need to advance nearly as quickly to meet the growing demand for higher resolution images. H.265 may be the answer to this as there is a tremendous amount of computational power required for the compression and decompression of these images that the industry is currently grappling with,” said Stephen Carney, Director of Video Product Line Management at Tyco Security Products.

Pervasive use of H.265 has many implications for the security industry. With the ability to double the data compression ratio compared to H.264 at the same level of video quality, H.265 will greatly improve the usability of 4K in security applications. In fact, both Hisilicon and Ambarella introduced IP camera SoCs based on H.265 at the end of 2014 and widespread use of H.265 is expected within the security industry by the second quarter of 2015. This will in no doubt directly impact the adoption of 4K.

Finding Applications for 4K
The entrance of 4K resolution into the security industry was met with both curiosity and excitement. Similar to how HD was expected to be the new standard for image resolution when it was first introduced into the industry (which it since has become), many believe that 4K ultra-high definition (UHD) will eventually replace HD as the standard, and the availability of H.265 in security will be a catalyst to this; however, this change will not happen overnight. “4K will certainly be a trend to watch, though broad adoption will be problematic for the security industry at this point due to limitations on current camera form factor/lens combination, bandwidth, and storage constraints and the cost of the equipment versus the benefits or necessity of the additional resolution gained with the technology,” Carney said.

Despite the current limitations, many of the obstacles should soon be resolved. Aside from H.265 helping with data compression, the rapid rollout of 4G across the globe should assist in dealing with bandwidth problems, as well as better, improved accompanying hardware (e.g., lenses, monitors, etc.).

Bigger, Better Image Sensors
With the trend of 4K in 2015, along with the fact that HD has become the standard, bigger, better sensors are now needed to support such high-quality images. The trend toward increased value of total image quality will utilize large image sensors, the latest iris system, and high picture quality at near IR, said Koji Maunari, GM of the Industrial Optics Business Unit at Tamron. In fact, the image sensor market is expected to grow at a CAGR of 8%  from 2014 to 2020, according to a recent report by Marketsandmarkets. Not only are manufacturers coming out with bigger sensors, they are also adding special technologies to further enhance image quality, specifically designed for video surveillance use. Well-known sensor makers such as Aptina, Omivision, and Pixelplus are now pushing out larger image sensors, while companies such as Sony have come out with new sensor technology specifically addressing the needs of the video surveillance market. The new Starvis technology, a back-illuminated pixel technology used in CMOS sensors specifically designed for video surveillance, was released by Sony in mid-2014. The technology extends from the visible light range to include the near-infrared range to support filming at night, which is often a problem area for 24/7 outdoor surveillance in most CMOS cameras. The improved performance at night will help more extensive adoption of CMOS cameras in the near future. Additionally 4K sensors are also being developed. These new sensors can support up to 12 megapixels (4:3) and 4K (17:9), and even support 4K at up to 60 frames per second. Furthermore, with sensors now reaching 1/1.9 inches, even higher resolution and clearer images are possible.

HD-over-Coax Gets More Advanced
HD-over-coaxial solutions are not new to the security industry. In fact, IMS Research, an IHS company, named HD-over-coaxial solutions a trend for 2012; however, at that time the solution in question was more or less limited to HD-SDI, which turned out to be not nearly as cost-effective as the security industry had initially hoped. Yet, like with any technologies a little time has yielded new-and-improved solutions, and 2014 saw just that with the introduction of new HD-over-coaxial solutions. One of the major proponents of HD-over-coax is Dahua Technology, who came out with their HDCVI technology in late 2012. However, it is not until more recently, in the last year, that the industry has really seen HD-over-coaxial solutions take off, with many other companies coming up with their own technologies and solutions as well, such as AHD, ccHDtv, and HDTVI. HD-SDI has also evolved: The new generation has upgraded in long-distance transmission, and more importantly, has become more cost effective.

Despite the fact that the overall market is going digital, many definitely still see plenty of room for HD-over-coaxial solutions, noting acceptance of the technologies particularly in developing regions such as Asia Pacific and Latin America.

Renewed Life in Intelligent Video Solutions Intelligent functions have been touted for a while in security, but it isn't until more recently that they have been widely incorporated and desired in video surveillance. In fact, as of recent, a certain degree of analytics on the edge has become a standard feature for most IP cameras. From entry-level to high-end, cameras can now be differentiated by how “smart” they are. As part of this, video surveillance has proved capable of not just recording and reviewing, but preventing and analyzing. “The IP revolution has changed the surveillance cameras from a forensic tool aimed at solving problems after an incident has occurred to becoming a vital part of proactive intelligence chain. Network video cameras collect valuable data that can be analyzed and turned into actionable insights,” said Johan Paulsson, CTO of Axis Communications.

The idea of actionable intelligence is one reason intelligent video solutions are seeing an up surge in demand. “We [Verint] believe that actionable intelligence presents an opportunity for customer to implement solutions that enhance security and safety, while reducing operating costs and increasing productivity and efficiency,” said Brian Matthews, VP of Global Marketing and Product Development for Video and Situation Intelligence Solutions at Verint Systems.

Another reason demand is growing is due to more developed technology. “Advancements in analytics should also not be ignored, as this segment of the market has progressed to where analytics are accepted as reliable, accurate, and part of the day-to-day operations of a large percentage of users. Some analytics, such as facial recognition, will definitely benefit from the higher resolution images and increasing levels of clarity as camera technology continues to progress,” Carney said.

The many benefits that intelligence brings to video surveillance, especially now that the technology is more reliable, are being realized across verticals. Certain verticals like retail have found particular use for intelligent video, where the data is being used for business intelligence. “Especially video content analysis solutions like Bosch's that do not only automatically trigger alarms on the basis of pre-defined alarm rules, but also enable the tracking of objects,” said Erika Gorge, Corporate Communications Manager at Bosch Security Systems. “This kind of intelligence can also be used to obtain information that goes beyond a pure security purpose such as marketing intelligence information on the scenes being under surveillance — for example number of people (people counting), movement of people, registering characteristics like color or crowd density information.”

Furthermore, we will also see a higher adoption of big data for multiple applications, such as smart cities, in 2015, where a smart surveillance camera with advanced VCA could definitely play an important role. We will see how VCA changes a surveillance camera into a content provider for big data.

There is a catch, though: Avigilon's recent acquisition of ObjectVideo's entire patent portfolio and licensing program. In the future, Avigilon will replace ObjectVideo as the patent holder to lead the future development of VCA technology, once again reshuffling the intelligence market. The impact this move will have on the security industry as a whole will be massive, and not necessarily in a good way — Avigilon now holds 124 US and international patents and 202 US and international patent applications as a result.

Integrated Systems Become a Must
In the past, integration of disparate systems has been a struggle for many users. With newer solutions, the ability to integrate is in high demand, and as such integration has become a focus for many security players.

“Integration has been talked about a long time — but as a user experience it has been less than ideal. You will soon see systems that deliver on that promise of a seamless user experience,” said David Gottlieb, Director of Global Marketing Communications at Honeywell Security. William Ku, VP of the Brand Business Division at VIVOTEK echoed confidence in the integration trend: “The full integration of disparate systems, including video surveillance, intrusion systems, perimeter detection, access control, and real-time intelligent analysis on data will be the trend in managing security in every vertical application since the security could be secured seamlessly and enable staff to respond to intrusion or threats in a short time and solve the events on-site in an effective way.”

The trend for more integrated systems is also what will help push IP growth forward, as the IP market has matured and entered into the late growth stage of its product life cycle. Yet, the low-end market still has significant potential for IP growth, as noted by Karl Erik Traberg, Head of Corporate Communications and Business Development at Milestone Systems.

In the middle and high-end markets, however, the trend for more integrated systems will continue to drive IP growth. “In the market for advanced solutions with high camera counts there is a significant opportunity to offer more advanced integrations with access control and other security applications,” he added. “Verint believes in and has realized increased demand for innovative, integrated solutions that combine situation management, communications, and cyber intelligence, and facilitate collaboration across security and law enforcement agencies. We believe that today's government organizations, institutions, and multinational corporations, in connection with safe city, border control, transportation security, critical infrastructure, and other large-scale security initiatives, are interested in and preparing to deploy unified security solutions that fuse data from a wide range of security systems and intelligence sources to enable efficient information correlation and analysis,” Matthews said.

Hope for 2015
A lot of major changes took place in 2014 that has in a way left a question mark hanging over the fate of the security industry — the Canon Europe acquisition of Milestone Systems, Anixter acquisition of Tri-Ed, and most recently the selling of Samsung Techwin to Hanwha Group. Yet, one thing is for certain: there will always be a need for security and video surveillance. This sentiment is what industry players are emphasizing when it comes to future growth of the security/ surveillance market. Development for the overall market may not be as rapid as it once was, but with the above trends helping to drive surveillance growth, as well as the continued growth of things like video surveillance as a service and cloud computing, there is definitely still upward hope for the future of video surveillance.

Avigilon provide HD security solutions to University of Phoenix Stadium

Avigilon provide HD security solutions to University of Phoenix Stadium

Editor / Provider: Avigilon | Updated: 1/29/2015 | Article type: Security 50

Avigilon Corporation, a global provider of end-to-end security solutions, announced that the University of Phoenix stadium, home to the Arizona Cardinals in Glendale, AZ, has deployed the Avigilon high-definition surveillance solution to monitor its campus and increase public safety. Home to the NFL Pro Bowl on January 25, 2015, Super Bowl XLIX on February 1, 2015, and many other large scale sporting and entertainment events, the stadium covers 1.7 million square feet spread across five different levels.

“Safety is a top priority at stadiums worldwide. Increased concerns about security threats are causing venues that host large, high-profile events to justifiably scrutinize their security practices,” said Bryan Schmode, chief operating officer, Avigilon. “The University of Phoenix Stadium is leading the way with its commitment to keeping its guests and facility secure. We are extremely proud to provide our solution to one of the most celebrated and visible sports stadiums in North America.”

The University of Phoenix Stadium, with its retractable roof and field, is unlike any other stadium in North America, and a marvel of design, engineering, and technology. This multi-purpose facility, which opened on August 1, 2006, has previously hosted several high-profile professional and college football events or “bowls” as well as numerous international soccer matches, headlining concerts, and trade/consumer shows. Other high-profile stadiums that use Avigilon’s security solutions include Target Field (home to the Minnesota Twins), Rogers Centre (home to the Toronto Blue Jays), and many others.

The University of Phoenix Stadium deployed the Avigilon solution to cover the entire seating bowl and field. In total, the project will add more than 200 Avigilon HD cameras to the facility. The seating bowl and field Avigilon are monitored by 16 Megapixel (MP) HD Pro cameras to provide clear visual detail and the ability to zoom in to select locations as necessary while Avigilon 2 MP HD PTZ (pan-tilt-zoom) cameras provide additional coverage. The system is managed by the award-winning Avigilon Control Center (ACC) software, which enables stadium employees to operate all cameras and search through footage quickly and easily. The project is scheduled to be rolled out in four phases. In the next phase, the stadium will deploy Avigilon’s Access Control Manager (ACM) at additional entry points throughout the facility to ensure entrances and exits are controlled and secured. In addition, new 5 MP HD Bullet cameras will be added to the exterior of the building to monitor the stadium’s plaza. Together, ACC and ACM will provide a complete and efficient monitoring system for the entire stadium.

“We selected Avigilon for its quality products, the image clarity of its cameras, the solution’s ease of use, and because Avigilon delivers a complete end-to-end offering to meet our security needs,” said Peter Sullivan, general manager and regional vice president for Global Spectrum at the University of Phoenix Stadium. “As the host venue for the NFL Pro Bowl and Super Bowl XLIX, we look forward to the confidence and security Avigilon will provide our facility and the guests who will be attending these great events.”

Protected against harsh environments

Protected against harsh environments

Editor / Provider: William Pao, a&s International | Updated: 1/27/2015 | Article type: Tech Corner

When it's pouring outside, or the temperature hits -10 degrees, you want to make sure your surveillance equipment is still working properly. Nowadays, equipment for critical environments — those that are subject to water, dust, winds, sand, salt, or extreme climatic patterns — is built with durability in mind and can effectively withstand harsh conditions. This way, users can rest assured that their products will work normally no matter how tough the surroundings get.

Surveillance equipment isn't just for homes or offices. Sometimes, it is founded in some of the harshest and most unrelenting places in order to keep premises safe and secure. Whether it's set up on a maritime oil drilling platform or somewhere in the Middle East where summer temperatures may easily hit 50 degrees Celsius, equipment must be hardened and ruggedized to be able to perform smoothly and provide maximal safety for users.

International Standards
To help users understand whether certain products are suitable for certain conditions, several international standards have been formulated to indicate how effectively they can work in environments prone to water, dust, explosions, and impact. Some of these standards are listed below.

IP
IP or ingress protection ratings specify how capable equipment can withstand the ingress, or entry, of foreign solids or water. An IP denotation is usually consisted of two numerals, with the first indicating the protection of equipment against solid foreign bodies and the second indicating protection against water. For critical environment equipment, it should be rated IP66 to IP68 as opposed to IP32 to IP54 for indoor settings. A similar rating system, published by National Electrical Manufacturer Association (NEMA), specifies protection of electronic equipment against external ice, corrosive materials, and oil immersion in addition to dust and water.

Hazardous Areas
Hazardous locations are specified under different rating systems around the world. For critical environment equipment, it should be able to work well in areas designated as Class 1 Division 2 Group A or B in North America, or as Gas Group IIC in Europe. Both indicate places where easily flammable gases and vapors, such as hydrogen and acetylene, are present.

IK
The IK rating system is used to denote protection of equipment against impact produced by either a natural disaster or vandalism. It ranges from IK00, or no protection, to IK10, or protection against 20-joule impact, equivalent to the impact of a 5-kilogram mass dropped from 400 millimeters above impacted surface.

Others
Winds are categorized by their speed on the so-called Beaufort Scale. Equipment in critical environments should resist winds of up 61.2 meters per second, or No. 17 on the scale.

This is in contrast to typical equipment that only needs to work well in 41.4 meters-per-second winds, or No. 13 on the scale. Meanwhile, given temperatures often get extremely high or low in critical environments, equipment must be able to withstand these conditions. While typical equipment should have a working temperature range from -10 to 60 degrees Celsius, critical environment products should be able to work in a range between -40 and 70 degrees Celsius. For special equipment in factories monitoring boilers or furnaces, it must be able to withstand high temperatures from 300 to 1,000 degrees Celsius.

Hardened and Ruggedized
When security equipment is installed in critical areas for whatever purpose it's designed for — video surveillance, access control, or intrusion detection — it must be toughened to weather adverse conditions. Special technologies or materials, for example epoxy resin, polyamide, and aluminum alloys, are used to make the products work well in regions or vertical markets that call for hardened, ruggedized equipment.

Video Surveillance
Cameras are needed not just in commercial or residential settings but also in places that are subject to danger or extreme weather conditions. “There's high customer demand for rugged, environmental performance,” said Craig Dahlman, Director of IP Camera Products at Pelco by Schneider Electric.

“Rugged, fortified systems are needed to protect delicate and valuable camera and optics packages.” To meet that demand, Pelco by Schneider Electric has manufactured a series of products that are able to withstand explosions, water and dust ingression, fog, high and low temperatures, winds of up to 57 meters per second, and corrosion by salt and different types of chemicals.

Various cutting-edge technologies have been adopted to make those features possible. For example, certain products feature the pressurized integrated optics cartridge (IOC) technology, which protects the equipment from moisture and airborne contaminants and packages an auto-focus camera, lens, heater, and sensors in a small, self-contained, and sealed unit. Dry nitrogen pressurized to 10 pounds per square inch gauge (PSIG) protects the environment inside the cartridge, whereby sensors strategically placed in the cartridge send an alert message if changes in pressure, temperature, or humidity are beyond factory-set acceptable limits.

Certain models also feature heater, window defroster, sun shroud, and thermal insulation blanket to enable operation in temperature conditions ranging from as low as -46 degrees Celsius to over 49. In the event of a power failure during an ice storm, the entire unit can deice itself and become operational in just two hours after regaining power at a temperature as low as -25 degrees Celsius.

“Video security and surveillance is a mission-critical application … and there is a global demand for these products, particularly in hot dry areas, cold wet areas, marine environments, and humid environments,” Dahlman said.

Illumination products supplement video cameras by providing the necessary lighting and are sometimes placed in critical environments as well. “Housed in marine grade aluminum with a toughened glass window … our critical environment products have a wide operating temperature range from -52 degrees Celsius to 55. Our thermal management system achieves up to 60 percent better heat dissipation than other LED luminaires with a significantly cooler operating temperature,” said Barry Thompson, Head of Hazardous Area Division at Raytec.

These features make Raytec lighting products ideal for a variety of verticals and regions. “We are currently delivering illumination in a vast number of challenging and remote applications across the globe, such as oil fields in Kuwait and Dubai, oil pipelines in North Africa, and offshore platforms in UK and various Middle East regions,” Thompson said.

Access Control
No stringent requirements are demanded of access control readers for commercial or residential applications. But when placed on the outside or in a critical environment, that's a different story.

“The reader has to withstand torrential rain in an outdoor installation,” said Tom Su, Sales Manager at Hundure Technology, which is set to release an IP66 reader. “Plus, it has to be durable enough to be able to work properly in the long term in a harsh environment and withstand human-made damage.”

Materials play an important part in toughening the products. Hundure, for example, uses as a main ingredient epoxy resin, which is an excellent electrical insulator and protects electrical components from short circuiting, dust, and moisture. “We have epoxy inside the reader to make it totally waterproof for outdoor installations,” Su said. Potting, or the filling of a complete electronic assembly with a solid or gelatinous compound for resistance to shock, vibration, moisture, and corrosive agents, is also used during the manufacturing process. “We use potting material for the majority of our readers, which seal them from any kind of water penetration,” said Steven Katanas, Director of Sales for Australia and New Zealand at HID Global. “Potting completely encases all electronics and stands up well to many harsh outdoor environments. An outer case might get beat up a bit, but the inner electronics are durable.”

The other critical element in an access control system, namely the cards, should not be overlooked, either. “Some cards use more durable materials than others. For instance, a line of our smart cards use an ABS shell construction for durability in harsh environments, and can be used in diverse applications including physical access control, PC logon, biometric authentication, time and attendance, cashless vending, public transportation, airline ticketing, and customer loyalty programs,” Katanas said.

Perimeter Intrusion Detection
Perimeter intrusion detection systems (PIDSs) are almost always placed on the outside of important premises such as airports, power plants, and certain government facilities. Sometimes equipment is deployed at places with highly intensive electromagnetic waves, and electromagnetic interference (EMI) may occur. PIDSs with EMI-resistant capabilities are therefore a plus. “One of our perimeter security taut-wire products was installed around a Radio Free Europe site, which transmits one megawatt power of short wave radio using curtain array antenna. These are extreme RF condition,” said Hagai Katz, Senior VP Marketing and DB at Magal Security Systems. “The most demanding conditions were for sections of the fence, which happen to reside right below the antennas' feeders, absorbing very high radio frequency radiation. In spite of all, the system has managed to perform perfectly.”

Heavy winds are also a threat to equipment or products placed on the outside, and manufacturers have different ways to overcome that. For example, Navtech Radar, which makes radar-based PIDSs, puts all the moving parts inside wind-resistant enclosures. “Normally if you have a rotating part exposed to the wind, then the wind pushes on that rotating part, moving it in a way you don't want it to move,” said Philip Avery, MD of Navtech Radar. “All our rotating parts are inside an enclosure. There is a plastic radome that protects the rotating parts from the wind and other elements.”

Any fixings — connectors, screws, and others — that hold the radar together should also be protected. Navtech Radar, for example, is considering putting plastic coating on the connectors to protect them from corrosion, which may occur at heavily corrosive environments like road tunnels.

“Different parts of the radar are bolted together using screws, and the last thing you want is to have those screws heavily corroded so the radar will fall apart,” Avery said. “You need to make sure that not only the main body of your system is made of the right material, but the fixings that hold it together are also made of the right material.”

Door Phones/Intercom/PA
Placed at the entries of residences, door phones should be able to adapt to various local climatic conditions. “Our products are used in high-temperature regions such as the Middle East and Africa, and also used in low-temperature areas like Russia or Scandinavian countries,” said Yoshi Nishiyama, who works for the international sales department of Aiphone. “Regarding the materials, we use environmental friendly materials complying with WEEE & RoHS. And the plastic materials we use are self-extinguishing materials against fire. All the metal materials for door phone units are designed against vandalism, and they have protection against water, sunlight, acids, and so on.”

For intercom and PA manufacturer Zenitel, it chooses polyamide as the material for making its industrial-grade PA call panels and intercom stations.

“Initially, our PA system was designed for the oil and gas industry and marine vessels. Polyamide is resistant to corrosion, so it's suitable for marine environments. Also that material is quite strong so it can withstand impact,” said Piet De Vriendt, Commercial Product Manager for Vingtor-Stentofon at Zenitel. “Fewer and fewer companies are making intercom stations out of metal for industrial applications, as new technologies have improved for polyamide, which is also better for corrosion and chemical resistance.”

Thing to Look for During Installation
For critical environment installations, a rule of thumb is to get products that are rated for conditions worse than where the equipment is being installed. “At the very least, users should make sure they are not installing equipment that is rated for a temperature- and humidity-controlled environment into an area where there will be considerable heat and moisture fluctuation,” HID's Katanas said.

Integrators should also help clients build an infrastructure that presumes and prepares for changes in the future, including ensuring durable performance in harsh environments. “This requires a platform that is dynamic, open, and adaptable, and that ensures security is independent of hardware and media so that organizations can evolve their infrastructure to meet tomorrow's needs,” he said.

With security products becoming increasingly network-centric, how to protect the network infrastructure in critical areas is also important. Some countries or regions even have rules about how IP-based equipment should be installed.

“The Middle East has requirements for transmission equipment that can tolerate very high temperatures. In India we have the same requirements, and in both markets high winds, dust, and sand are an issue, which the transmission equipment must also be able to withstand,” said Sara Bullock, Business Development Director at AMG Systems, adding her company has devoted much R&D efforts on heat reduction.“Our products carry many interfaces within the same box, which dramatically reduces the equipment required at the remote position, which in turn reduces heat within the cabinets,” she said. “A critical factor is airflow. Our products have ventilation slots on the casing, and as long as they are mounted in the correct way, they allow airflow to be forced up through the units.”

Zenitel's De Vriendt stressed the importance of collaborating with someone who is strong at IP setup in harsh conditions. “The most important advice we can give to integrators and installers is to have good cooperation with the consultants who specify the system and to work with companies that have experience with setting up IP networks in these environments,” he said.

Built With Durability
Today's surveillance equipment is built with durability in mind, able to resist various harsh environments to satisfy users' needs. With an understanding in these products, and knowledge on how they should be set up properly, users can have full assurance that their surveillance systems will run smoothly in the midst of inclement conditions.

Banks cash in on integrated, scalable systems

Banks cash in on integrated, scalable systems

Editor / Provider: Israel Gogol, Freelancer, a&s International | Updated: 1/27/2015 | Article type: Commercial Markets

In recent years the most talked-about security threats to banks have been cybercrimes and fraud. Though it seems that traditional security systems are no longer in the spotlight; banks still make substantial investment in their physical security systems. Changes in the design and layout of banks as well as banks' desire to make the most out of their installed systems have great impact on the design and implementation of current security systems.

Banks hold the great responsibility of keeping our money safe. Even though most of this money is now in the form of electronic bits and bytes, banks are still one of the first associations when we think of security and surveillance systems.

Banks usually balance the mix of their security systems between discrete and unobtrusive systems such as emergency buttons and small hidden cameras (e.g., at the counter area or an ATM pinhole camera) and more visible measures such as guards and larger cameras. The visible security systems serve a double purpose, both deterring potential violators as well as giving customers a feeling the bank is indeed a safe place to keep their money. Surveillance systems installed in banks will usually combine several cameras with different functionality. Outside the bank infrared cameras will provide day and night monitoring. Inside the branch, dome and bullet cameras are used for lobby and counter monitoring for clear picture capturing and forensic evidence. The main purpose of these cameras is to prevent illegal intrusion by unauthorized people as well as monitoring the office environment to prevent property loss.

CHALLENGES OF THE BANKING VERTICAL
A major obstacle facing security companies and systems integrators is aligning the security needs of individual branch locations with the requirements outlined by the corporate headquarters. “Securing the bank branches themselves is different from securing a corporate headquarters or data center location, as branches are more often the targets for criminals since it's assumed that's where the money is located,” explained Matt Frowert, Director of Marketing for Financial Services at Tyco Integrated Security. Therefore, the standard level of security and defense are more in-depth at a branch than for a corporate office. Many times legacy systems, or different versions of the same platform, may be found in different regional branches of the same institution within a country, which makes centralized management difficult. In addition, there may be internal resistance to changes or upgrades that the corporate standards demand due to funding constraints, or the local staff being inexperienced and lacking training regarding proper security measures and systems. Another challenge may simply be a matter of timing and scheduling; implementing major technology upgrades across very large financial institutions with many branches and offices.

NEW BANK LAYOUTS
In recent years banks have been changing their traditional set-up to be more appealing to customers. There are more “light” branches located inside shopping malls and supermarkets. Traditional branch layout and design have also changed and now include more open floor plans and fewer staff which are tasked with broader responsibilities. “More in-branch automation and systems found in these new types of banks very likely means that they may not have the same levels of cash that traditional branches have,” added Frowert. “During a robbery attempt, the suspect may be confused when he discovers there is limited teller cash and no safe like there would be in a traditional bank set-up. These new frameworks for bank branches will affect the security of the customers themselves and the bank's security model for protection,” he explained.

As a result, emphasis is placed on new systems that offer increased ATM protection through anti-skimming technology, access control, and proper lighting measures for ATM vestibules to help ensure customers are properly protected.

BENEFITS OF INTEGRATED SYSTEMS FOR BANKS
Like any other enterprise, banks require their systems provide security, safety, efficiency, and cost saving. “Normally, powerful VMS software can integrate four systems, such as video monitors, access control, alarm systems, and the intercom system, which are used to communicate with bank clients at other locations, for example using an ATM at a different site,” said Nathan Chen, Solution and Product Manager at Dahua Technology. In turn, each system includes several components: alarm systems for example will include fire alarms, seismic sensors to detect if someone is digging into the bank, and emergency buttons. Access control systems will combine card readers, biometrics, magnetic door sensors, etc. This provides banks with an integrated solution instead of four stand-alone systems. In addition, sensors such as smoke detectors or temperature sensors are now built in the cameras and can send alarms directly to the DVR system. This way the bank can benefit from having several sensors on one platform and cut costs.

Systems integration is also critical for protection against insider threats by employees which can be very costly. “An increasingly popular step in mitigating insider threats through an integrated security system includes linking access control to identity management,” explained Frowert. By integrating these systems, financial institutions can restrict employee access to sensitive areas, track entry/exit times by employee or department, and use a log correlation engine or security information and event management (SIEM) system to log, monitor, and audit employee actions. By monitoring these types of systems, managers may notice individual employees trying to access part of the building they are not authorized for, which is activity they can then flag and subsequently continue to monitor the employee's behavior for other activity that might lead to an insider incident.

HYBRID DVRs AND NVRs
Hybrid DVRs and NVRs allow the integration of both existing analog cameras and newer IP cameras. The use of hybrid DVRs and NVRs can therefore help banks make the most out of their existing legacy systems and give them the flexibility they need in adding more cameras or testing new cameras and technologies.

“Our customers are interested in how they can protect their investments in legacy infrastructure while also taking advantage of the benefits of newer technology. There is an increasing move towards new NVRs because they can prolong the use of video surveillance systems as well as provide enhanced features to end users,” iterated Stefano Torri, European Sales Director of March Networks (an Infinova Company). These provide both analog and IP camera support and allow organizations to test and deploy IP cameras selectively, alongside existing analog cameras. “Banks are thinking about the broader benefits of the technology they use, so for example, NVR technology provides advances in video compression and storage management compared to earlier DVRs, and the use of H.264 compression, optimized to limit video signal noise, makes images clearer while reducing the use of bandwidth and storage. These things are important if a bank wants to tag video based on user-defined criteria, such as motion detection, transaction events, or alarms. Software that delivers intelligence and analytics is also a growing trend amongst banks and financial institutions,” he added.

ANALYTICS
An example of an analytics function used in banks is loitering detection, detecting for instance when a person lingers around an ATM machine. If such an event is detected, security personnel can then access the video recording in real-time and make a decision if further action is needed. Analytics can also provide information on customer behaviors (e.g., people counting, queue monitoring) which can be shared across the organization to improve not only security surveillance but also customer service and marketing. For example banks can analyze dwell and wait time at branches and change branch staffing appropriately to make sure there are enough tellers to service the waiting clients.

Apart from connecting the different systems in the branches, banks can also share information between locations. This feature has been gaining traction and makes security more comprehensive. Intelligent video applications allow an internal investigator to track fraudulent transactions and alert branches. “For example, entering a stolen card number into the system will deliver brief video clips of every associated transaction from anywhere across the entire retail banking network,” explained Torri. Not only can security managers easily export this information to branch managers, but they can also present it as integrated case evidence to the police.

KEYLESS ENTRY
Apart from using video analytics, banks are using intrusion detection and keyless entry to improve security measures and increase cost effectiveness. Replacing or re-keying traditional locks can cost a bank up to US$3 million in just one year. To mitigate the risks and costs associated with using traditional keys, banks are implementing new, wireless locks which work with inexpensive access cards to open entry doors. These new technologies also provide audit friendly reporting for the activities of any individual or of a specific entry point in the branch.

OPPORTUNITIES IN BANKING
Banks are relatively conservative players in the security market usually waiting to implement tried and tested solutions. Due to their large scale and many sites, frequent changes of security systems are not likely. Therefore solutions that help banks take advantage of their existing systems, integrate several functionalities together, and introduce newer technologies will be the choice for the banking vertical.

5 Tips for a Successful Security Installation in Banking
Matt Frowert, Director of Marketing for Financial Services at Tyco Integrated Security, provided the following five tips for banks when deploying a security surveillance system.

  1. Find an experienced integrator who specializes in bank physical security. 
  2.  Look for a partner who can support everything from single bank branches all the way up to money center banking models (banks who deal with governments, large corporations, and other banks).
  3. Network with security affinity groups of industry organizations, like the American Bankers Association, to receive recommendations on vendors from other banks in your area.
  4. Standardize on leading access, video, and intrusion systems supported by vendors that have a track record of investing in technology. 
  5. Invest in communication with and training of banking staff to enable them to effectively use the systems (e.g., arming the alarms at the branch level, managing the distribution of codes at the branch level, etc.).

HID Global shares top secure identity trends for 2015

HID Global shares top secure identity trends for 2015

Editor / Provider: HID Global | Updated: 1/23/2015 | Article type: Security 50

HID Global®, a worldwide leader in secure identity solutions, issued its outlook on technology trends for 2015, as well as other anticipated developments across key vertical industries in the secure identity marketplace. The annual assessment is intended to help organizations understand and take advantage of the latest advances to improve security, convenience and the user experience.

Growing adoption of interoperable technologies based on open standards continues to spur innovation at an unprecedented pace.

“This past year laid the foundation for what we expect to be an exciting 2015 for our customers and partners as they continue to benefit from the flexibility, adaptability and new capabilities made possible with award-winning Seos® technology,” said Dr. Selva Selvaratnam, senior vice president and chief technology officer with HID Global. “Whether it's moving campus IDs onto smartphones, or centralizing all identity management for protecting doors, data and cloud-based applications, or securing electronic medical prescriptions and ATM transactions, we will see the transformation of our customers' experience using secure identities during the coming year, and beyond.”

Driving new capabilities across markets are a set of six key technology trends that Dr. Selvaratnam has identified, including:
* Increased innovation fueled by interoperable technologies that enable partners to build new solutions (secure print authentication, EV charging station access, and more) that can be accessed with the same smart card or smartphone used to open doors.
* The adoption of new credential form factors.
* Additional ways to open doors and other entrance systems.
* Advances in how to manage identities.
* Using biometrics to help change security from a barrier to a guardrail.
* The growing popularity of interconnected devices and the Internet of Things (IoT), where Wi-Fi locks, RFID-enabled devices, online hotel locks, and mobile keys are all connected ways of interacting or capturing data for the benefit of companies or consumers.

In addition, Dr. Selvaratnam highlighted a number of trends to watch across the following eight vertical market segments:
* Banking and financial institutions: Physical and logical security will continue to converge into unified solutions, against the backdrop of a mobile transformation in consumer banking, the U.S. move to EMV credit and debit cards, and the early phases of biometric authentication at the ATM.
* Hospitals and healthcare institutions: The latest secure identity solutions will play a pivotal role in securing the facility, narcotic prescriptions and personal health information, and will also be used outside the hospital to verify “proof of presence” for home health service delivery.
* Education: As the transition from magnetic stripe (magstripe) and proximity (prox) to high-frequency contactless smart cards continues, universities will also move campus IDs onto smartphones and other mobile devices using systems that can manage multiple ID numbers for multiple uses on multiple platforms.
* Federal government: Government-wide upgrades to new, more secure access control technology will extend beyond the desktop to the door, using both cards and mobile phones, and rigorous secure issuance requirements will drive the growing need for certified and approved printers.
* Government ID: Worldwide demand will grow for end-to-end, highly secure government-to-citizen ID solutions, along with small-footprint, industrial-strength printers that combine flexibility and security, reduce infrastructure investments, and maximize throughput.
* Transportation: IP-based access control will grow in importance across the transportation segment, improving security by integrating a physical access control system (PACS) with other solutions on the same network. Meanwhile, biometric systems will offer an opportunity to increase security and profits in both commercial and personal transportation applications.
* Enterprise: Organizations will increasingly need to improve security at the door, for their data, and in the cloud, and will move to converged solutions while simultaneously accelerating the move beyond passwords to strong authentication across numerous physical and logical access control applications.
* Retail: The biggest focus will continue to be defending against threats such as those experienced by Target Corporation and other major retailers. Other growth areas include mobile IDs, the Internet of Things, integrated biometric authentication, brand protection solutions that validate the authenticity of goods, trusted “proof of presence” applications for digital out-of-home (DOOH) media campaigns, and instant issuance solutions for branded credit and loyalty cards.

Software House gains FIPS 140-2 validation for iSTAR door controllers

Software House gains FIPS 140-2 validation for iSTAR door controllers

Editor / Provider: Software House | Updated: 1/23/2015 | Article type: Security 50

Software House, part of the Security Products business unit of Tyco, the world's largest pure-play fire protection and security company, announces the certification of its iSTAR Edge and iSTAR Ultra door controllers under the government's Federal Information Processing Standards Publications (FIPS) 140-2 program, the most stringent standard for cryptographic products. With the certification of iSTAR Edge and iSTAR Ultra, Software House becomes the first company to offer a full lineup of FIPS 140-2 approved controllers covering a wide range of access control scenarios.

With the certification of iSTAR Edge and iSTAR Ultra, Software House becomes the first company to offer a full lineup of FIPS 140-2 approved controllers covering a wide range of access control scenarios.

FIPS 140-2 is an information technology security validation program that certifies products and systems for use in government-run and other highly regulated industries, such as finance and healthcare, where sensitive information is collected, stored, and shared. The FIPS 140-2 requirements are among the government's most stringent requirements for product design, documentation, and secure operations.

“The certification of these physical access controllers addresses two of our government and enterprise customers' most critical needs: compliance and choice,” said Rick Focke, Senior Product Manager, Tyco Security Products. “Receiving FIPS 140-2 validation ensures the products' conformity for use with sensitive information, while offering multiple products with this key certification makes Software House's iSTAR line the most versatile choice on the market today.”

iSTAR Edge is an IP-based edge device serving smaller one- to four-door PoE network applications, while the powerful and scalable iSTAR Ultra, which is built on the Linux platform, supports up to 32 readers. Software House also offers iSTAR eX, an Ethernet-ready four- to eight-door controller which has already been FIPS 140-2 validated.

Vanderbilt provides high-level security for Crider Foods

Vanderbilt provides high-level security for Crider Foods

Editor / Provider: Vanderbilt Industries | Updated: 1/22/2015 | Article type: Commercial Markets

Vanderbilt Industries, a global leader providing state-of-the-art security systems, announced that Crider Foods, Stillmore, GA, relies on Vanderbilt Industries SMS Access Control system to provide security for its large production and processing facilities. Tutela, out of Brunswick, GA, is the integrator and installer on this long-running project.

Privately owned and operated, Crider Foods represents a commitment to quality, food safety and customer service. The Crider Foods Canning Facility was opened in Stillmore, GA after a fire destroyed their Augusta plant. In 2003, a “Fully Cooked” plant was added. Crider Foods is committed to being a leader in canning proteins and in its fully cooked operation. Crider is always investing in equipment and expertise to ensure continuous improvements.

After completion of the canning plant, Crider contracted with Vanderbilt and Tutela to set up a high-level security system. To date, the Vanderbilt SMS system manages access for over 500 employees and contractors at approximately 150 contact points spread over 11 locations at the Stillmore campus. Locations include the fully cook plant, company headquarters, the visitor's Lodge, canning plant, cooler building, transportation building, warehouses and others.

'The Vanderbilt system enables us to manage employees so that they can access only the areas where they have been scheduled to work,
when they are scheduled to work.
We also have the flexibility to easily change those access privileges as needed, at any time,' said Ron Sasser, Crider's IT Director.

“Our security system is absolutely critical to helping assure compliance to all the health and safety rules and regulations we have in the food production industry,” explained Ron Sasser, Crider's IT Director, who also oversees security. “We are committed to an extremely high level of access control management to prevent any cross contamination of our products.”

Sasser continued, “Our priority is to limit access for all our employees as to where they can go in the facility. The Vanderbilt system enables us to manage employees so that they can access only the areas where they have been scheduled to work, when they are scheduled to work. We also have the flexibility to easily change those access privileges as needed, at any time.”

Crider also uses their Vanderbilt access control system to verify time and attendance information. If an employee doesn't punch in, Sasser and staff can use the system to verify when any employee has entered the property. In addition to controlling access to buildings and within buildings, Crider employs guards at the facility's road entrances to verify all vehicles coming onto the property.

While asset protection is always an issue, for Crider Foods the number one priority is achieving full compliance with food and safety regulations in order to achieve the highest level of Safe Quality Food (SQF) Certification. Crider has succeeded in gaining SQF, Level 3. “Only a few companies reach this level,” explained Sasser. “To reach such a certification level, we carefully control the movement of all individuals within the complex, and this means, for example, restricting access to chemicals and to the roofs of our buildings, among other sensitive areas.”

Crider also deploys 100 IP video surveillance cameras to keep any eye on operations. “Cameras are helpful,” said Sasser, “but you have to start with access. My access control system tells me who I'm seeing on the video. Now, I know who someone is, because the access control system puts them in that location. Without access control, the cameras are only so good.”

“The Vanderbilt system is working well, it's doing everything it is supposed to do. We've used it for so many years, and Tutela has been very good taking care of any issues and system expansion needs along the way. If we have a need, this team gets it taken care of. “

The Vanderbilt system, under Tutela's watchful installation and administration, provides a layered level of security starting from the minute one steps onto the Crider property, down to limiting access to chemical storage. The system supplements time and attendance data and provides documentation for OSHA reporting. But, at the end of the day, Crider's high-level security system provides management the tools they need to achieve one of the highest Safe Quality Food (SQF) Certification levels in the industry, and that's worth a great deal in proof of product quality and company reputation.

Nedap opens US sales office to accelerate growth in retail sector

Nedap opens US sales office to accelerate growth in retail sector

Editor / Provider: Nedap | Updated: 1/21/2015 | Article type: Security 50

 The opening is part of a long-term expansion plan designed to bring Nedap closer to its US end-customers and partner network. The US presence enables Nedap to shift its focus from servicing global accounts to successfully partnering with national American accounts. Dannie Klompsma has been appointed Area Director North America to shape and extend the US operation.

 

The headquarters will include sales, engineering, marketing and a partner training center to provide partners with maximum local support and business resources.

Maximize support and impact
Setting up this US office is the initial step towards establishing a full American headquarters for the retail division. The headquarters will include sales, engineering, marketing and a partner training center to provide partners with maximum local support and business resources.

“It is essential for Nedap to be closer to the market and our partners to really make a difference in the US retail market,” Dannie Klompsma explains. “After several years of continuous growth in the US, we decided to establish a logistic hub in Boston in 2013, in addition to our hubs in Europe and Asia. This US office is the next major milestone in our commitment to the US market.”

Offer to market: loss prevention and stock management
Nedap's portfolio for the American retail sector consists of loss prevention and stock management solutions. The solutions enable retailers to optimize their in-store merchandise availability and permanently reduce losses caused by customer theft, internal fraud and administrative errors. Nedap develops hard- and software in the field of RF- and RFID-based electronic article surveillance (EAS), RFID-based stock management, visitor counting and access control. All Nedap solutions can be managed and monitored remotely. These features offer more insight and control on headquarters level to retailers.

TOP10 most popular security products in 2014

TOP10 most popular security products in 2014

Editor / Provider: Michelle Chu | Updated: 1/22/2015 | Article type: Hot Topics

      Happy New Year!  :)

asmag.com has been presenting TOP10 popular products of the month for a year, and, so far, it is one of the hottest Features on the site – thanks for all of your support all along! At the very beginning of 2015, we'd like to walk through 2014 once more and give you the TOP10 popular products in 2014.

 

Looking back to last year, more than half of the most popular products are no strangers to our readers. We have two cube cameras from Hikvision, which had received an incredible attention through the H1 in 2014; two key components from Nextchip; a smart door lock from Samsung; a set of control panel device from DSC:

Hikvision DS-2CD2412F-I (W) 1.3MP IR Cube Camera 
Nextchip AHD 
Hikvision DS-2CD2432F-I (W) 3MP IR Cube Camera 
Nextchip NVP1914 Video Decoder 
Samsung SHS-P718 Push Pull Smart Door Lock 
DSC PowerSeries Neo HS2-Series Control Panel

Besides, we have more products for access control, intrusion detection, and key components:

COMMAX CDV-35A Video Door Phone
Nextchip NVP1918 Video Decoder
Chuango CG-B11 Dual Networks Alarm System
Sony Exmor CMOS Sensor

To conclude, according to the click frequency* of each product during 2014, Hikvision and Nextchip are the biggest winners in last year, taking two seats in this annual ranking respectively. Overall speaking, the click frequency in total is mostly contributed by the readers in American sector and Asian countries, by 40.37% and 30.77% respectively. A similar tendency can be seen for most of the products listed. However, above all, several products have also successfully drawn the attention of Europeans: two cube cameras from Hikvision, an alarm system from Chuango, and a control panel set from DSC are all having people around the world carried away!

 

* Please note that the above statistics are not based on the sum of clicks but the accumulation of IP addresses.

>>>Top10 rankings for Novemver 2014

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page
Sign Up for Free
Weekly e-Newsletters
  • Headline
  • Trending Tech
  • Hot News
  • Product Highlights
  • Success Stories

Featured Suppliers