You are at : Search > Articles Search Results

Articles Search Results

1313 Articles and 369 related Products found for access control

Lincoln's Inn Fields deploys access control system from ACT

Lincoln's Inn Fields deploys access control system from ACT

Editor / Provider: Access Control Technology | Updated: 9/30/2013 | Article type: Government & Public Services

Capital Fire and Security have completed installation of an access control system at a site in Lincoln's Inn Fields where lawyers have been practicing for over 600 years. The Grade-II listed building, in London's largest public square, is now fitted with hardware from Access Control Technology (ACT).

4 New Square, a set of chambers for prominent barristers, is located next to the Central Criminal Court of England and Wales, commonly called the Old Bailey. Using ACT's proximity readers and door controllers, 4 New Square has added access control to over 100 doors.

The building hosts meetings between clients, solicitors and barristers for the most high-profile legal cases in the world, with many of the barristers being Queen's Counsel. After a demonstration, the client saw the benefits of a centrally controlled card-based access control system as opposed to traditional key-based systems. Flexible security is paramount, especially in an environment where lawyers working in the same building frequently appear on opposing sides of the same case.

Capital Fire and Security chose an ACT proximity reader with the ability to read highly secure and versatile smart-card technology, the ACTpro DESFire EV1 1040. This choice of advanced reader allows the client to use the same cards with time and attendance and PC logical access systems. With architectural integrity a major consideration, the ability to install the readers as either flush or surface-mounted ensured the installation had minimal architectural impact.

To complement the choice of readers, ACTpro 4000 door controllers have been fitted in the operational and administrative areas of 4 New Square. Used in conjunction with ACTpro door stations, these controllers can support 60,000 users and 1,024 user groups. The ACT hardware uses low bandwidth and auto-discovery for easy installation and maintenance, alongside advanced features such as timed anti-passback and counting areas.

To complement and manage the access control system, ACT's latest software platform, ACTpro Enterprise, is being used at 4 New Square. This role-based system is designed for the increasingly complex demands of a modern access control system. The design principle behind ACTpro Enterprise segregates different functionality by the user's role – such as the installer, the security guard and the system administrator – to ensure minimal accidental system changes and system maintenance. The modules within the application are called ‘ACTinstall', ‘ACTmonitor' and ‘ACTmanage'. The flexibility of ACTpro Enterprise is demonstrated with the integration of third-party products on this site such as the intruder alarm system.

ACTpro Enterprise has been designed to give users a familiar web-browser experience using hyperlinks, ‘backwards' and ‘forwards' buttons and powerful search functionality.

Ian Wheeler, IT Manager at 4 New Square, said: “ACTpro Enterprise allows us to assign rights based on roles, zones and time of the day. With ACT's access control system, a lost card is easily removed and a replacement issued straight away.

Flexibility, paired with ACTpro Enterprise's powerful reporting ability, means ACT access control really is an all-in-one solution for us.”

Capital Fire and Security design, supply and maintain access control, CCTV, and fire systems throughout London, working for clients in sectors including retail, banking, education, theatre and office management. The company is accredited by the National Security Inspectorate (NSI), the United Kingdom Accreditation Services and the Safe Contractor scheme.

UK telco EE adopts Nedap AEOS access platform

UK telco EE adopts Nedap AEOS access platform

Editor / Provider: Nedap | Updated: 9/27/2013 | Article type: Security 50

Everything Everywhere, the UK's most advanced digital communications company, plan to expand throughout the UK and they are confident that by choosing AEOS, they have a future-proof security system that can grow and expand as they do.

After a lengthy selection process, EE selected Nedap because of the modern, versatile design of their access control platform – AEOS. Unique within the marketplace, AEOS is a powerful software-driven platform that couples functionality and powerful hardware, tailored for individual configurations. AEOS can be adjusted and expanded to meet future expectations.

Security and scalability can be found in many systems but the versatility to connect and configure more than just access control on a single controller impressed the EE team that have an eye for value and future usability. EE can access system their new system anywhere due to the 100% web-based interface and have saved from not installing client software at any site.

The installation of the project is to be carried out by Nedap's partner Reliance High Tech and the 3-way partnership of manufacturer, integrator and customer will combine to map out the future security for Everything Everywhere.

Asia Update: NEC, Toshiba and others to supply aviation security infrastructure in Myanmar

Asia Update: NEC, Toshiba and others to supply aviation security infrastructure in Myanmar

Editor / Provider: Sumitomo | Updated: 9/26/2013 | Article type: Hot Topics

Sumitomo together with NEC Networks & System Integration Corporation, Toshiba and Morita Corporation concluded an agreement on September 10 with the Department of Civil Aviation, Ministry of Transport, Republic of the Union of Myanmar on the “Project for Improvement of Nationwide Airport Safety and Security”.

This Project is designed to help improve aviation safety at Myanmar's major airports (Yangon, Mandalay, Nyaung U, Heho, Thandwe, and Dawei). To satisfy the International Civil Aviation Organization (ICAO) safety standards, equipment such as Doppler VHF radio range beacons and distance measuring equipment, flight procedure design systems, various aeronautical lights, and communication control units will be supplied to improve air traffic safety; and fire engines, X-ray screening machines, explosive detection devices and other equipment for airport security will be installed as necessary.

The Project is expected to enhance Myanmar's airports' capacity to handle the burgeoning air traffic in the region by improving the safety and reliability of air transport and establishing more efficient air routes.

Aviation demand in Myanmar is increasing each year in both the number of passengers and the volume of cargo. It is viewed that the country's aviation sector will most certainly increase in importance as it achieves greater economic development; however the installation of aviation safety facilities and airport security equipment is severely delayed.

Many local airports in particular still do not have adequate radio navigation facilities, and aircraft rely on low-precision instruments or visual contact, making it difficult to cope with sudden changes in the weather or other contingencies.

Furthermore, some local airports do not have adequate detection equipment for explosives and many improvements in the inspection procedures are necessary. In view of these circumstances, the government of Myanmar requested to the Japanese government for continued assistance in airport/aviation security and the provision of urgently needed equipment. In response to this request, an exchange of notes took place between the governments of Myanmar and Japan on March 22, 2013, with a grant agreement concluded between the Japan International Cooperation Agency (JICA) and Myanmar that pledged 1.233 billion yen in Official Development Assistance (ODA). The Civil Aviation Bureau of Japan's Ministry of Land, Infrastructure, Transport and Tourism has also been supporting aviation infrastructure upgrades internationally since 2011 through various meetings and conferences, and they're expected to start up medium- to long-term assistance programs for Myanmar.

Sumitomo Corporation as the prime contractor for this Project will be responsible for overall coordination. Myanmar is positioned as one of the company's key business regions in Sumitomo Corporation's medium-term management plan. Involved in businesses such as the creation of an industrial park in the Thilawa Special Economic Zone, Sumitomo Corporation in May 2013 received an order with NEC and other partners to make urgent improvements to communications networks, followed in June 2013 by an order for a project to improve railway safety and service, the company has been comprehensively engaged in a full range of infrastructure construction and improvement efforts in Myanmar.

It is also steadily building up a record of performance in the area of air traffic control systems, receiving orders in November 2010 from the Philippines and in August 2013 from Laos. Sumitomo Corporation will continue to seek orders for air traffic control projects in Asia and elsewhere to further boost aviation safety.

NEC will be providing the Project with Distance Measuring Equipment (DME) for radio measurement of distances between aircraft and aeronautical stations, while NESIC will be developing the relevant systems for radio communications and undertaking a full spectrum of tasks in building airport/aviation security infrastructure.

The NEC Group has been involved in the construction of Myanmar's communications infrastructure for 35 years, including telephone switchboard equipment, radio communication devices, satellite earth stations and broadcasting systems. An NEC branch office opened in Yangon in February 2013, which, in conjunction with execution management by NESIC (Thailand), a NESIC's Thai subsidiary, is putting in place the structures needed to support the development of communications networks in Myanmar.

As noted above, it joined with Sumitomo Corporation and others in a project to make urgent improvements to communication networks, receiving orders to build fiber-optic backbone communications networks linking three cities in Myanmar as well as LTE communications infrastructure within these cities.

In August 2013, NEC also opened an office in the capital city of Naypyidaw. In addition to undertaking the Project, NEC aims to assist with the future needs of Myanmar's public offices, local companies and other customers by, for instance, providing international communications networks via seabed cables, ICT infrastructure for rapidly developing industrial parks, disaster prevention solutions, security and e-government solutions, as well as servers and other high-volume retail items.

Toshiba will contribute to the Project by supplying three major airports, Nyaung U, Heho, and Thandwe, with Doppler VHF omnidirectional radio range (DVOR) beacons, the Project's principal air navigation systems. Toshiba has extensive experience in supplying air navigation systems in Japan and overseas, and continues to promote technology innovation that helps to improve air traffic safety and efficiency.

Toshiba Group has sold home electronics to Myanmar from its base in Singapore since the 1980's, and in social infrastructure, the company provided equipment for the Sedoci Hydropower Plant in 1985. Most recently, Toshiba Asia Pacific opened an office in Yangon in April 2013 that will allow Toshiba will establish a stronger presence in the country and support Myanmar's economic development.. Toshiba will strive to further contribute to Myanmar, and internationally, by providing high-quality, high-performance air navigation systems.

Morita under this Project will be in charge of providing aircraft rescue fire fighting vehicles and equipment for Yangon, Dawei, Nyaung U, and Heho airports. In line with its slogan of “protecting human life and Mother Earth,” Morita develops, manufactures and sells a broad range of products, including aircraft rescue fire fighting vehicles and other fire trucks (pumper trucks, ladder trucks, rescue vehicles, and fire engines for industrial complexes).

Since its establishment in 1907, Morita as a top manufacturer of fire-fighting and disaster-prevention vehicles has been in great part responsible for the development of fire-fighting technology in Japan, and its sales efforts now extend beyond Japan to countries in Asia, the Near/Middle East and Africa. The foundations of the Morita Group's business lie in its full-hearted commitment to manufacturing and, as it takes on the challenge of manufacturing products of even higher quality, it will be safeguarding the air gateways into Myanmar through this Project as the country pursues rapid development.

By building airport/aviation security infrastructure in Myanmar, where continued economic development is anticipated, Sumitomo Corporation, NEC, NESIC, Toshiba and Morita will work to complete this Project promptly to enhance the country's infrastructure safety and reliability. These companies also intend to cooperate in drafting proposals for upgrading aviation security infrastructure at other major local airports not covered by this Project.

Honeywell releases more value with managed access control system

Honeywell releases more value with managed access control system

Editor / Provider: Honeywell | Updated: 9/25/2013 | Article type: Security 50

Honeywell has released the WIN-PAK CS 4.2 managed access control system, which lets security dealers provide a wider range of value-added services to all types of organizations while reducing their installation and service costs.

WIN-PAK CS 4.2 takes the complexity and cost out of maintaining an access control system by moving the operating software and server hardware from the customer's site to the dealer's data center, providing operational cost savings and reducing capital expenses for dedicated computers or servers. Dealers benefit because they can create new sources of recurring monthly revenue (RMR) by delivering more value-added services to their customers including photo-ID badging, video verification of alarms and events, and enhanced report functionality from the new web interface.

“Companies want to simplify their security management and increase the value it brings to their businesses, and managed security services can help achieve this goal,” said John Smith, senior marketing manager at Honeywell Security Products Americas. “Having to dedicate security staff to manage the system, create photo-ID badges and provide updates to the access control software and server hardware are all time-consuming tasks for staff. WIN-PAK CS 4.2 lets dealers take these tasks off their customers' hands and payrolls while helping streamline business operations. These services are also a great way to create long-lasting customer relationships and reduce attrition.”

*Photo-ID Badging as a Service: Badge printers are expensive and cost-prohibitive or organizations with fewer than 100 employees. By providing badging services, security dealers can reduce the investment it takes for organizations to issue photo-IDs to employees. It's a service that provides more value to the customer by streamlining business operations and strengthening security procedures.
*Redesigned Web-based Interface: The new web-based interface provides users with the required functionality to manage day-to-day business without the hassle of installing expensive onsite software. Through the web-based interface, organizations can monitor their system's status, control doors, manage users, create customized report templates and automatically run reports, access video tutorials, and generate card audit trails and operator action reports.
*Video Verification: Video verification allows dealers to receive access control alerts and notifications tied to video events. Dealers can determine whether the alert is a potential threat and dispatch the appropriate authority to handle the situation. This can save organizations money by reducing false alarms and reduce law enforcement response times by verifying that the threat is real.

Axis enters into physical access control market with door controller

Axis enters into physical access control market with door controller

Editor / Provider: Axis | Updated: 9/24/2013 | Article type: Security 50

Axis Communications enters the physical access control market by introducing a network door controller with built-in web-based software. AXIS A1001 Network Door Controller is a complement to Axis' existing portfolio of innovative network video products and creates unique integration possibilities for partners and end users.

Axis Communications enters the physical access control market by introducing a network door controller with built-in web-based software. AXIS A1001 Network Door Controller is a complement to Axis' existing portfolio of innovative network video products and creates unique integration possibilities for partners and end users.

“Bringing product innovation to the physical access control market is a natural step in Axis' development as there is a strong connection between access control and video surveillance. As the market leader in network cameras, Axis plays an important role in driving convergence to IP-based products in video surveillance. We now apply that expertise in IP technology to the physical access control market in the same way. The physical access control market is primed to make the shift to open IP technology,” said Ray Mauritsson, President and CEO, Axis Communications.

AXIS A1001 Network Door Controller is the first non-proprietary and open IP-based access controller on the market. It is a platform for two different solutions. AXIS Entry Manager (AXIS A1001 with built in software) is a ready-made solution for small- to mid-sized businesses—such as offices, industries and retail stores—with typically 10 doors and basic access control requirements.

For larger enterprise systems, AXIS A1001's open application programming interface enables Axis' Application Development Partners (ADP) to meet specific customer requirements. Initially, Axis ADP partners Aimetis, Genetec, IMRON, Milestone Systems, Next Level Security Systems and OnSSI are engaged in the development of solutions, which include video integration and advanced access control functionality.

Initially, Axis launches AXIS A1001 Network Door Controller in the US market in Q4 in 2013. The United States was an early adopter of network video technology and is also a huge market for physical access control. The value of the global physical access control market is about USD 3 billion (2012) and will increase to approximately USD 4.2 billion by 2017, which represents an annual growth of 7 percent, according to market research firm IHS.

“Axis started its innovative quest back in 1984 by developing protocol converters and then continued to printers and storage devices before inventing and launching the first network camera in 1996. Although we now enter the physical access control market, our focus will continue to be on network video products. We expect physical access control sales to represent a small, but important, part of our total business,” said Mauritsson.

Further features of the AXIS A1001 Network Door Controller include:
* Open architecture that allows easy integration of video, intrusion detection and other systems.
* Support for Power over Ethernet to reduce the need for separate power cables and proprietary cables.
* Cardholder data and system configurations are automatically stored and synchronized between controllers and the units can be managed from any computer in the system.
* Enabler for an ‘edge' solution with one controller for each door and a fixed price per door. It is fully scalable, eliminating the traditional central controller multiple of 4, 8, 16 or 32 doors.
* Support for most existing reader protocols and reader types, and standard IT and security equipment such as door locks and door position sensors.
* The installation wizard and the color coded connectors help users to complete the installation and verify that door locks, readers and other equipment are connected properly.
* The API is designed for compliance with ONVIF Profile C, which will enable interoperability between clients and devices of physical access control systems (PACS) and network-based video systems.

Honeywell upgrades NetAXS-123 Access Control System with EVL technology

Honeywell upgrades NetAXS-123 Access Control System with EVL technology

Editor / Provider: Honeywell | Updated: 9/24/2013 | Article type: Security 50

Honeywell announced a technology upgrade to its NetAXS-123 web-based modular access control system to make it easier for small to mid-size businesses to secure their doors. Ethernet virtual loop (EVL) technology uses a single IP address to talk to multiple control panels, making installation fast and simple. This allows dealers to drive down at-the-door costs by using their customers' existing local area networks (LAN) with Power-over-Ethernet (PoE), eliminating the requirement to run a dedicated wire loop to each control panel.

“Running wire takes time and money, so being able to use an existing LAN greatly reduces labor and material costs for both the security dealer and their customers,” said John Smith, senior marketing manager at Honeywell Security Products Americas. “NetAXS-123 with EVL technology gives dealers, especially those already offering IT services, a seamless way to deliver access control technology to small and medium-sized businesses.”

Through EVL and the LAN, dealers no longer need to configure each NetAXS-123 control panel individually. Instead the control panels are automatically discovered and linked together. As a result, dealers are able to connect multiple NetAXS-123 panels and automatically issue updates to the entire system, such as access card additions and rule changes.

NetAXS-123 control panels also drive down at-the-door costs by eliminating the need for multiple cables to be installed and run from a distant location. The new control panels provide a streamlined solution allowing cables to be installed just a few feet from the control panel for the lock, reader, egress and door contact. The benefits to dealers are lower installation costs and faster install times. NetAXS-123 also features options not found in most access control systems including elevator control, multiple input and output add-ons and integrated IP digital video tied to access control events.

Honeywell protects French retailer Jardiland with intruder and access control system

Honeywell protects French retailer Jardiland with intruder and access control system

Editor / Provider: Honeywell | Updated: 9/18/2013 | Article type: Commercial Markets

The Situation
Situated in the heart of the ZAC Porte Sud Retail Park, the Jardiland store was built in 2010 and opened later that year. It boasts 5,000 square metres of floor space comprising several secure areas including warehousing, offices, interior and exterior sales areas, and covered gardens. The store manager at Jardiland Orange, Mr Michel Bonifazio, who is also responsible for several other franchised Jardiland retail outlets (Istres and Grans), wanted the security system in the new store to manage intruder detection and access control with audio verified alarm triggers. To meet insurance requirements, the site also required monitoring by an APSAD-certified alarm receiving centre (ARC). In addition, Mr Bonifazio needed a solution that would protect the store during the day from the risk of armed robbery, reassure staff, ensure public safety and protect the stock.

The Solution
With experience and knowledge of Honeywell GalaxyR systems, Mr Bernard Gayraud, the manager of GT2S, recommended the GalaxyR Dimension integrated intruder and door control security solution. “We also have a good supplier, ADI Global Distribution,” said Mr Gayraud.The GalaxyR Dimension GD-96 control panel, certified NF&A2P type 3, was selected for the installation. Honeywell's two-way voice speakers with microphone that link directly to the ARC are integrated into the solution and provide the necessary audio verification to detect and distinguish genuine intruders. In addition, the Galaxy Dimension system manages access to the store and offices, and other high risk areas using proximity readers from Honeywell's OmniProx range. Badges are used by staff and other personnel and contractors depending on their security levels and access requirements. For example, cleaning contractors' badges are activated to enable access only during certain times. Overall, the Galaxy system manages access to the site for around 30 separate badge holders with schedules set up through the system to ensure that only certain people have access to the site outside business hours. the audio enables verification. At the end of the day, the system is reliable and we recommend it.”

The Benefits
Simplicity of system use

“The solution provides a complete intruder system with integrated door control all of which is managed by a single piece of software - the Galaxy User Management Suite – which is greatly appreciated,” added Mr Gayraud. The store manager can easily control the arming and disarming of the security alarm system using the Galaxy MK7 LCD keypad, and because it is connected to the ARC, the ARC operator is immediately notified when the system is armed. The store is open seven days a week, and therefore permanently secure.

Optimum security provided by audio verification
Twelve intercom terminals distributed at strategic points throughout the store ensure that the site remains connected to the ARC. Any suspected intrusion can therefore be detected and rapid site intervention initiated if a break-in is confirmed by the store manager or the Police. “The performance of the Honeywell audio verification system is superior to that of other brands,” states Mr Gayraud. “If the audio verification solution were not in place, it would not be possible to analyse accidental alarm triggers, particularly during the night,” insists Mr Bonifazio. “For example, if either a bird or an animal escapes from its cage in the pet department and triggers an alarm via a motion sensor, the audio enables verification. At the end of the day, the system is reliable and we recommend it.”

Flexibility and ease of installation
“Because the Galaxy system is compatible with almost any badge reader technology, we could directly and easily connect badge readers with door controllers,” emphasises Mr Gayraud. The Jardiland access control is secured by five proximity readers and two door controllers across the site. “With its dual bus, the Galaxy solution could be run in two directions in the building, which simplified the cabling work in the Jardiland store,” added Mr Gayraud. Galaxy Dimension GD-96 control panel manages around 90 zones on the Jardiland site.

Compatibility and adaptability
The Galaxy solution was also able to accommodate Jardiland's requirement for panic buttons at each till point. GT2S was also responsible for the installation of the perimeter devices in the store. A total of 12 Honeywell DUALR TEC dual-technology motion detectors were installed to protect the sales floor, and an additional seven to protect the office area. A crucial element of the system design was to protect the store garden area where it was essential to be able to detect and identify real break-ins in an area where the volume of plant stocks varies frequently.

A complete solution meeting both retail and wholesale requirements
The Galaxy Dimension range provides a comprehensive solution which is key to its popularity. It offers door control security, IP and RS232 interfacing and audio verification. It can monitor up to 520 zones, and the number of bus control units can be increased to four which helps simplify the design and cabling Mr Gayraud also praised the new Galaxy TouchCenter touch screen keypad due to its user friendly design and functionality.

CEM Systems protects Honeydew Dairies facilities with AC2000 access control system

CEM Systems protects Honeydew Dairies facilities with AC2000 access control system

Editor / Provider: Tyco Security Products | Updated: 9/17/2013 | Article type: Commercial Markets

CEM Systems, part of Tyco Security Products, announces that Honeydew Dairies has selected CEM's AC2000 Lite security management system to secure its factory and warehousing facilities in Nottingham Road, South Africa. The system was supplied by CEM Approved Distributor, Mustek Ltd, and installed by CEM Installer Brandfin Trade.

“Brandfin immediately chose CEM access control as the best overall solution for the job” said Alistair Mingay, Managing Director, Brandfin Trade.“CEM's AC2000 Lite system was selected by Brandfin as it not only offers integrated biometric security for staff and visitors, but also offers us the capability to integrate with future Time & Attendance systems.”

CEM AC2000 Lite system installed at Honeydew Dairies is supported using CEM's industry leading S610f fingerprint reader. The reader has been installed at turnstiles on site to provide biometric access control at the pedestrian entrances to the site. The S610f is an intelligent IP card reader and offers three levels of security – card, PIN and biometric. As an integrated solution the S610f reader eliminates the need for a separate biometric system as fingerprint templates are captured at the same time as other cardholder details are enrolled on the AC2000 system. The S610f reader successfully provides multiple layers of access control at the factory.

AC2000 Lite is an ideal solution for Honeydew Dairies” said Andrew Fulton, Director of Global Sales, CEM Systems “Not only is it easy to install, it is affordable and provides a range of powerful software features and functionality such as ID badging and Central Alarm Monitoring to enhance site operations on a daily basis”.

The system at Honeydew Dairies utilises powerful AC2000 software modules including CEM's AC2000 VIPPS (Visual Imaging and Pass Production System), which allows factory security to produce colour coded passes and access rights for administrative, warehouse and factory staff as well as day visitors. AC2000 T&A (Time and Attendance) module has also been installed offering easy to read reports of employee IN and OUT times.

Using the AC2000 AED (Alarm Event Display) module, Honeydew Dairies management team has a graphical display showing all access control points and activity on the system. This real time display alerts personnel when a controlled goods door is opened and allows them to critically stop unauthorized exit or entry.

Alongside the AC2000 system, Brandfin installed automated gates for vehicle access as well as various turnstiles to control access into the different zones of the factory. The vehicle access is also monitored by a mixture of PTZ (Pan Tilt Zoom) and fixed video cameras which integrate with the factory control room to allow or deny access to arriving vehicles.

The installation at Honeydew Dairies was carried out smoothly and efficiently by CEM Installer, Brandfin Trade. Brandfin Trade were selected to install the system because of their wealth of experience in supporting I.T as well as cameras, access control, integration, and control room monitoring. Brandfin Trade was aided in the installation of the Honeydew and have proven competency in the CEM AC2000 product range through certified training at the CEM head office.

Established in 1994, Honeydew Dairies has grown from a small dairy farm to a large dairy producer with depots throughout the region and a fleet of 80 transport vehicles.

Comparison of NVRs, edge storage, and cloud storage

Comparison of NVRs, edge storage, and cloud storage

Editor / Provider: Alyssa Fann, a&s International | Updated: 9/17/2013 | Article type: Tech Corner

Back then, analog cameras were connected to DVRs, but the migration toward network-based cameras is followed by the migration of video recording media to digital hard disk drives. These options include PCbased NVRs, standalone NVRs, edge storage, and cloud storage. In line with this growing trend, IMS Research (an IHS company) had forecasted that network storage will account for over 30 percent of world video surveillance storage revenues in 2013. As the second half of the year progresses, the market will bear witness to this development.

Selecting the optimal storage option is crucial. “A properly designed storage system built for the unique requirements of IP video surveillance can offer a more robust, scalable, and cost-effective solution. Additionally, a properly designed storage sub-system can help customers take full advantage of the benefits of higher resolution and real-time video produced by today's advanced IP cameras,” stated John Minasyan, Senior Product Manager of IP Video Management Systems at Pelco by Schneider Electric.

NVRS
Advantages
NVRs can be either PC-based or standalone. Storage technology can be chosen freely from different storage systems supported by either Microsoft Windows or Linux. This allows the system integrator or end user to choose the storage system that best fits their needs and budgets. NVRs are scalable and expandable to storage demands, and performance of the storage system can be tailored to the exact needs of the surveillance system. Finally, storage redundancy technology can be used to ensure that the storage system is always online and that recorded data is not lost.

“NVRs are best deployed by organizations that possess IT skills, and have the resources and network infrastructure. Organizations that regularly purchase network equipment and have established relationships with IT providers can leverage buying power, share resources, and expertise,” noted Mike Scirica, VP of Marketing and Sales at WavestoreUSA.

Disadvantages
There are a number of circumstances when video will fail to record. For example, at the front end, video will not be recorded if the connection to the camera is down. Neither will video be recorded if the recording or storage solution is down at the back end, which might occur due to a system failure or routine maintenance. There are, however, failover recording solutions to protect against this.

EDGE STORAGE
Advantages
Edge storage is recording at the edge of the Ethernet network as opposed to transporting the data across the network to a centralized NVR. Essentially, the concept is the ability to decentralize storage and disperse them amongst cameras. It works by recording video directly to a storage device such as an SD/SDHC card inserted into the cameras, built-in flash memory or small hard drives. Edge storage brings another option to the possibilities of surveillance architecture. “By supporting low-bandwidth monitoring with highquality, local recordings, users can optimize bandwidth limitations and still retrieve high-quality video from incidents for detailed investigation,” said Jarmo Kalliomaki, Product Manager at Axis Communications.

The three main benefits of edge storage are: decentralized storage,redundancy, and low bandwidth. Decentralized storage eliminates the need and cost for an onsite server, NVR or PC for recorded video. It provides failover recording if the camera loses connection with the central server.

Disadvantages
Some argue that edge storage can be unreliable as cameras can fail or be stolen. If all recordings are stored within the camera, that inevitably means all recordings would be lost. Moreover, “there is a limit to the capacity of video recordings in edge storage, such as seven days or even less, depending on SD card capacity and recording settings," said Evelyn Kao, Product Manager of Surveillance Business Division at QNAP Security. "Hence, this option may not be entirely suitable for applications where the law may require video storage for up to 30 days. Also, end users are often unaware that SD cards have a lifespan and when that is up, video will not be recorded. Unfortunately, they often only realize after an event that video had failed to be recorded."

Other disadvantages include not being able to view recorded video from the camera if there are interruptions to the network connection, not being able to control video recording via a central recording server, and possible challenges in terms of integration with third-party solutions, such as access control or building management to control recording based on events. Also, if there are numerous cameras, retrieval, playback of recordings, and investigation may be slower and it is more cumbersome to have to retrieve storage from multiple locations.

CLOUD STORAGE
Advantages
Cloud storage is often offered to the market in the form of Video Surveillance as a Service (VSaaS). This service allows end users to eliminate hardware investment because video and audio is stored and recorded in the cloud. “VSaaS is a purchased service with a periodic fee to the video service provider. On the other hand, the investment for the cameras and internet traffic demands are reduced. The maintenance and storage is outsourced to the service provider,” said Kalliomaki.

According to a new research report from TechNavio, the market growth for VSaaS is forecasted to grow to US$1.6 billion by 2016, driven by video analytics software offered by vendors. The inclusion of video analytics software will increase the value proposition of VSaaS.

Disadvantages
However, opinion on cloud storage is divided. Although low upfront investment and low maintenance costs are appealing to many residential and smaller businesses, many security industry players feel that cloud storage is more suited to smaller-scale, non-high security applications. “VSaaS is more popular with residential and smaller business customers, as it provides the flexibility of remote management, yet the security of data and bandwidth challenges remain issues for medium to larger organizations where security is often mission critical,” noted Brian Song, MD of IDIS Europe.

"There's the issue of introducing third party cloud storage, and right now, there seems to be a skepticism regarding storage of private and potentially sensitive image data with a service provider,” added Song.

Bandwidth still has its challenges, especially when end users require full HD real-time monitoring and recording. For such requirements, “each camera needs to transmit more than 20 Mbps and even though networks can support 1 Gbps, image data can only transfer at around 600 to 700 Mbps, so potentially end users are restricted to a maximum of 35 cameras in the cloud and that is when network is optimized,” commented Song on bandwidth requirements of network cameras.

STORAGE METHODS
With current technology, there are now several ways to store recorded audio and video:
*  Centrally in the surveillance system's recording servers using a dedicated storage system, whether server-based, PC-based, or standalone NVRs.
* At the edge of the surveillance system in the cameras' onboard storage device.
* A combination of edge storage and NVRs.
* Cloud storage.
* A combination of NVRs and cloud storage.

An experienced system integrator would be able to assist end users in their storage selection. Budget, features, requirements, scalability, and reliability are all important considerations. The weight of each of these considerations will decide the storage option or combination of storage options.

Data centers: Security without compromise

Data centers: Security without compromise

Editor / Provider: Tevin Wang, a&s International | Updated: 9/19/2013 | Article type: Commercial Markets

Digital information is becoming ubiquitous while connected devices proliferate with ever-faster transmission speeds. These factors continue to influence rising demand for data centers. Cisco forecasts global data center traffic to grow fourfold and reach a total of 6.6 zettabytes annually by 2016 and global cloud traffic to grow sixfold with a 44 percent combined annual growth rate (CAGR), to reach 4.3 zettabytes by 2016. The growth does not stop at data traffic.

 

According to IDC Research, the size of US data centers will increase significantly, growing from 611.4 million square feet this year to more than 700 million square feet in 2016. Data center security has become one of the highest network priorities. Companies that operate their own data centers will spend an average of US$17 million on security products in 2013, according to Infonetics Research.

 

Main concerns

The main concerns of a data center are the intentional acquisition of personal or corporate data by unauthorized people, according to Kenneth Mara, President and CEO at World Wide Security. Sabotage, theft, and uncontrolled access to a data center's assets pose the most immediate risks.

 

Patrick Lim, Director of Sales and Marketing at Ademco Far East (an Ademco Security Group Company) agreed. “The main concern is the amount and variety of people that access the data center. In an Internet Data Center (IDC), there are many different customers, each with their own staffs accessing the data center and racks. To make matters more complex, some of these data centers have their own contractors for equipment and technical support. All these varieties of activities and visitors create massive access control challenges.”

 

Another primary concern for a data center is the upstream and downstream fiber, which must be protected as well as the protection of the environmental systems which support the data center such as power, backup power, heating and cooling systems, added Jeff Slotnick, CSO at OR3M.

 

Perimeter security

The primary goals of the outer layer of data center protection, perimeter security, are the three D's: deter, detect, and delay. As an example, a perimeter fence equipped with sensors can serve as the first detection point for intrusion. This perimeter fence detection system can be integrated with intrusion alarms, limited access control points, high-definition video surveillance, and motion-activated security lighting. Security personnel will then be able to pinpoint an intrusion and immediately access the network's security system.

 

Vehicle and personnel barriers are adopted to prevent physical access to the data center while personnel barriers can be used to prevent unauthorized entry, including tailgating, added Benjamin Butchko, President and CEO at Butchko Security Solutions. For instance, retractable crash barriers can be used at vehicle entry points. In situations when extra security is needed, barriers can be left up by default, and lowered only when someone has permission to pass through.

 

Besides site-hardening strategies, a perimeter video surveillance system can also be used to detect potential threats and intruders. Cameras can be installed around the perimeter of the data center, at all entrances and exits, and at every access point throughout the building. Motion detection technology, for instance, can trigger alarms, while video content analytics can identify objects left behind to quickly spot potential threats. These technologies make the surveillance system more proactive to detect potential security breaches. Furthermore, video footage should be digitally recorded and stored offsite.

 

Security inside Data Centers

Although data centers house the data, applications, and access critical to many businesses, the layout of most large data centers is similar. “There is a security/reception area that the user enters to gain access to their system. Upon check-in, they go to the lobby. From there, they go through a sally port to get into the secure common area,” said Emily Flink, Marketing Manager, Biometrics, Ingersoll Rand Security Technologies. “What this means is that, at the end of the lobby, they must be identified as authorized to enter the sally port room. Upon entering it, the door is closed. At the end of the sally port room, there is another identification authorization performed before they can go through that door to the secure common area. At this point, they can go to their own cage or vault, where they will again be identified as authorized before going through.”

 

If a breach has occurred at the perimeter or from inside, the layer of protection for facility control is created to prevent further access, “Data centers typically have a large number of infrequent users. This is especially true of independent data centers which have large numbers of customer users who only occasionally visit the site. Therefore, the system has to be easy to use but cannot rely on cards which can be easily transferred from person to person,” added Flink.

 

RSVP Only

A solid visitor management system compliments and is a precursor to the physical access control system. “Visitor management includes all workers and visitors being issued badges that have

built in access codes for various doors and areas on each badge. This prevents accidental access to areas,” Mara said. “It is very important to have those working in the facility pass background checks prior to employment.”

 

Mere access control is not enough. Indoor surveillance for identification and monitoring, as well as multiple ID verification methods are a must. Surveillance deployment and integration with access control can inhibit illicit activities and provide an extra layer of security. An integrated system can rapidly verify tripped alarms, which allows for a speedier response. “Integrated video is a standard demand now for data centers,” Lim said. For example, video surveillance can verify the identity of a person entering an unmanned access control point by capturing video as the person swipes his access card. It can also account for instances of tailgating.

 

Computer Room and Cabinet Control

While the physical security layering makes unwanted entry from “outside” a data center facility more and more difficult, inner layers are often ignored. “Personnel security programs are generally not robust in private industry for employees or contractors. Gaining data center insider access is a fundamental strategy for industrial espionage attacks,” Butchko said.

 

The insider threat is huge, especially in areas such as government or corporate espionage. A survey by Cyber-Ark showed some stunning numbers:

*  85 percent of employees admit to knowing that downloading corporate information from their employer is illegal.

*  25 percent of employees say they would take the data anyway, regardless of penalties.

*  41 percent of employees admit to having taken sensitive data with them to a new position.

*  26 percent of employees say they would pass on company information if it proved useful in getting friends or family a job.

 

Although the insider threat can be the most elusive, security within the inner layers of data centers, such as the computer room and cabinet controls, can help secure the core of data. This starts with people recruiting. “Good internal security starts with hiring the right people. This requires a strong Human Resources program working in conjunction with the Chief Security Officer to insure proper and complete background checks are accomplished on all employees, contractors, and laborers which have access to sensitive areas of the facility. In my opinion, a good upfront background check, in most cases, will prevent a majority of internal breaches,” Slotnick said.

 

“Another area of consideration when dealing with the internal threat is how the Human Resources Department and the Security Department work together to insure terminations with dignity to prevent workplace violence or a malicious system attack. Part of the process for a quality access control program is to know which employees, contractors, and service personnel are no longer employed so their access permissions can be removed or modified. This includes the return of all access control and identification cards. In my opinion, this is a significant communications gap in most organizations where someone's status has changed and the security personnel have not been informed or kept in the loop.”

 

Enhanced Security with Multi-Factor Authentication

Inadequate authentication methods lead to sensitive information being compromised. Ultimately, the primary concern of core data center security is access control to the server farms. “The large halls which contain the servers need to be closely monitored to ensure only authorized individuals are permitted entrance and then only at authorized times” Slotnick said. “This requires a

complex system of easy-to-use access control features.”

 

“At data centers, assured authentication begins by accepting the reality that no one single form of authentication by itself is 100 percent. Even biometrics (including DNA matching) is not perfect,” said Phil Scarfo, VP of Worldwide Sales & Marketing at Lumidigm. “Statistical error rates, however, are substantially reduced when multiple forms of authentication are employed. The use of biometrics as an additional tool or second factor greatly enhances the ability to get closer to 100 percent in the continuum to assured authentication. The reason for selecting biometrics as one of the two factors is clear. Knowing ‘who' is the goal of assured authentication and biometrics is the only form of authentication that is focused on the identification of the individual, not something they have or something they know.”

 

Lightening Up

Preventing a fire is crucial in a data center. “There should always be a business contingency plan for emergencies. Advanced fire systems, which detect heat and smoke, long before a fire breaks out should be part of a company's fire safety plan. These advanced warning systems can reduce the overall cost of repairs and downtime,” Mara said. “Backup servers off-site at multiple locations will help to protect against a fire which could not only pose a threat to overall operations but also to an operational shut down for periods of time.”

 

Technological advancements in security devices, such as surveillance cameras, video management and recording platforms, and intelligent access control hardware and software have enhanced the possibility of a totally secure data center. However, successful implementations of a central management system rely not just on subsystem integration, but also on effective communication throughout an organization.

 

First Page< Prev< | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 >Next >Last Page