You are at : Search > Articles Search Results

Articles Search Results

1174 Articles and 81 related Products found for detection

Lithuania to equip embassies with MorphoTOP fingerprint scanners

Lithuania to equip embassies with MorphoTOP fingerprint scanners

Editor / Provider: Morpho (Safran) | Updated: 3/5/2015 | Article type: Security 50

Morpho (Safran) has signed a contract with the Lithuanian government to deliver 145 MorphoTOP optical fingerprint scanners. This is Morpho's first direct contract with the Information Technology and Communications Department to the Ministry of Internal Affairs.

Lithuanian embassies will use the MorphoTOP terminals to process all visa requests. In practical terms, they collect photos and fingerprints from all those requesting visas. This biometric data is stored in a secure database, and can be compared to previously stored data. The database is available to border control authorities in countries that are part of the Schengen Area. When a traveler enters this area, authorities can check their identity to ensure that it is the same person who received a visa, thus limiting fraud.

This system is part of VIS (Visa Information System), a European project that allows Schengen countries to exchange visa data. Commissioned in October 2011, the VIS is designed to strengthen security at borders.

Jacques van Zijp, Vice President of Morpho's Europe Business Unit (BU) in the Government Identity Solutions division, explained, "Morpho already has Lithuanian customers in the telecom and explosive/chemical detection systems sectors. But this is the first time the Lithuanian government has placed its trust in our identity management solutions”.

The government's purchase of MorphoTOP terminals was partly financed by the European Commission's External Borders Fund (EBF).

Must-know: How to choose the right combination of VMS and VCA

Must-know: How to choose the right combination of VMS and VCA

Editor / Provider: Israel Gogol, Freelancer, a&s International | Updated: 3/3/2015 | Article type: Tech Corner

As video content analytics (VCA) becomes ubiquitous, end users are faced with more and more options regarding their choice of systems. Should they opt for an open platform or choose a bundled solution? What are the implications of different technologies used in VCA? a&s looks at several issues that can help choose the right system.

End users today can choose between vendors that offer their own VMS and proprietary video analytics or a VMS vendor that integrates third party analytics. “There are credible arguments for either option but the devil is in the details,” explains Dr. Sadiye Guler, Founder and CEO of Massachusetts-based intuVision.

“For systems integrators and users, having a combined VMS and VCA solution - if nothing else - is convenient. On the other hand, having the flexibility to choose the most suitable VCA product for requirements at hand is only possible if a VMS system can integrate with multiple third party VCAs; we all know there is no silver-bullet VCA solution that suits every application,” added Guler.

OPEN PLATFORM ADVANTAGES
An open platform VMS allows for a mix-and-match approach to best answer end-user needs.

“Best of breed approaches offer more flexibility and there are many specialized VCA solutions available. VCA providers often have profound knowledge of vertical applications and offer adaptations of their VCA solutions for larger installations,” said Joacim Tullberg, Product Manager for Video Management Systems at Axis Communications.

“By choosing an independent, open platform VMS that integrates with multiple third-party video analytics, customers have many more options available than one single vendor with their own VMS and VCA could ever have - the open platform VMS even allows video analytics from multiple vendors to be used together, for example, license plate recognition (LPR) and face recognition. Another example: I have seen some customers request smoke or flame detection capabilities,” said Reinier Tuinzing, Strategic Alliances Manager for the Americas at Milestone Systems.

Furthermore as new technologies and algorithms are developed, an open platform allows the end customer to remove one analytics vendor and replace with another that better meets their needs over time and as new innovations come to market. An open platform VMS also enables integration with multiple third-party systems like laser perimeter detection and access control software, along with the video analytics. The opportunity for end users is that they have many vendors with many capabilities to choose from.

When selecting a vendor, the end user must be very specific about what they want to do with the analytics. “For instance, what do you want to do with the LPR? Are you going to connect to the regional motor vehicle database or the national database; will you build your own database for a home owner association, or are you looking to build your own database for a hotel; is this for cars running at speed or in a parking lot; will the cameras be situated on a pole or at bumper level? All the factors will help you to select the right vendor,” added Tuinzing.

Users who buy from two vendors need to review the level and quality of the integration between the two systems. They should also explore the track record of the two vendors working together by looking at reference customers, and verify the companies' support models.

For example, “at Verint, we provide a solution from one of the best VCA suppliers, and at the same time, we take full responsibility over the integration and the pre-/post-sale support, in effect supplying a one-stop shop for our customers,” said Guy Shahmoon, Senior Director of Product Management at Verint Systems.

PROS AND CONS OF CLOSED PLATFORM SOLUTIONS
Most VMS are designed to work with their own VCA and/or third party software, however there are some advantages when the customer uses VCA from the same vendor, such as: deeper integration and a lower total cost of ownership, explained Doron Girmonsky, Head of Technology and Innovation for Security Group at NICE Systems.

When coming from the same vendor, VMS and VCA integration is more profound. More information can be used since the solution has the “internals” of the analytics, such as object parameters (size, directions, etc.), common routes, etc. From a cost perspective, the analytics can run on the same server as the VMS and does not require additional servers. Having less servers is an important cost saving factor, added Girmonsky.

The advantage for a VMS vendor who integrates with third-party VCA is that each developer is specialized in their respective field. However, full integration is not guaranteed, especially when new features and updates are introduced. Having multiple vendors in the solution poses a challenge when identifying the source of problems, stated Maor Mishkin, Product Champion of Video Analytics at DVTel. On the other hand, a potential downside of closed solutions would be that the VMS or VCA could not be switched if either had a problem, added Mishkin.

“Users who buy a solution from one vendor with proprietary VCA must make sure that the analytics solution is comprehensive and supports many types of rules, is easy to install and calibrate (this is a key factor), and provides accurate results. Customers should ensure that the company intends to continue to develop and support analytics as part of their core technology offering,” detailed Shahmoon.

End users should always seek out the combination that works best for their specific application and environment. For example, video analytics designed for perimeter security needs are very different than those that are ideal for the retail environment. When it comes to video analytics, there is no one-size-fits-all solution, so it is important for users to work closely with their integration partners to select a solution that works well for their unique needs. Also, users should feel free to evaluate various systems to ensure their chosen analytics solution is highly reliable, summarized Mishkin.

OPTEX secures data center from perimeter to data cable

OPTEX secures data center from perimeter to data cable

Editor / Provider: OPTEX | Updated: 3/3/2015 | Article type: Security 50

Data centers need to be as secure as a fortress to avoid any intrusion, unauthorized access and any attempt to tamper with critical data or equipment that ensures smooth operation. Looking at the generic layout of data centers and the type of intruders, no less than seven physical layers of access should be secured.

Starting at the perimeter, where fence and walls without an additional security system can be defeated. If they are it is crucial to track the whereabouts of the intruders using in-field detection. Building roofs and skylights can also represent a weak point to access the building and need appropriate protection too.

Security breaches can also happen with people who have access to part of the data centre building venturing into unauthorized areas, including people trying to piggyback authorized staff in critical areas. Finally the most critical assets, the data, could be physically accessed or tampered with, either at the server racks point or at the data cable one.

OPTEX intrusion detection solutions including its fiber, laser, 3D thermal or video analytics based technology can help secure any layer of access to data centers.

FLIR thermal cameras help to protect the perimeter of Oubaai Golf Estate

FLIR thermal cameras help to protect the perimeter of Oubaai Golf Estate

Editor / Provider: Sponsored by FLIR Systems | Updated: 3/2/2015 | Article type: Residential & Consumer

South Africa's Garden Route is world famous. It is a popular and scenic stretch of the southern coast of South Africa. It includes towns such as Mossel Bay, George, Knysna, Oudtshoorn, Plettenberg Bay and Nature's Valley.

The area is renowned for its magnificent mountains, indigenous forests, lakes, lagoons and rivers. It is along the Garden Route, in Heroldsbay that the spectacular Oubaai Golf Resort is situated. Recently, The Oubaai Homeowners Association, as part of a five year integrated security plan, has installed 6 FLIR Systems thermal imaging cameras to form part of its active protection plan for its residents, members and guests.

Oubaai Golf Course: designed by Ernie Els
The Oubaai Golf Estate is an exclusive residential development set in the heart of the spectacular Garden Route in South Africa. The development comprises of 450 residential units consisting of 128 Village apartments and 322 single residential properties. Inside Oubaai, the Hyatt Regency Group is constructing a luxurious 100 bedroom hotel which is to open in 2010.

Oubaai Golf Club is a Championship Golf Course designed by the South African golf superstar Ernie Els. Els is one of the most successful golfers in the history of the game, having won more than 60 tournaments since turning professional in 1989, including two US Opens and an Open Championship, and a record seven World Match-play titles. Ernie has occupied a place in the world's top-10 for over 730 consecutive weeks, more than any other currently active golfer. Els himself has placed Oubaai as his favorite course in the world. Oubaai is a beautiful piece of real estate. There are spectacular views of the Outeniqua mountains, the Gwaing river and its' sweeping valleys and the Indian ocean. The estate borders on the Indian Ocean and the Gwaing river just 18km from the picturesque town of George. Herolds Bay, the nearby beach is famous for body boarding, swimming, surfing and sunning.

Security is of extreme importance
“Although the Garden Route is a relatively safe area to live, definitely compared to other parts of South Africa, at Oubaai we do not want to take any risk.”, explains Mr. Louis Olivier, Estate Manager at Oubaai. “We want all residents, their guests, and all people that come here to enjoy a round of golf at our magnificent course, to feel safe and secure. Therefore we have taken all the necessary security measurements and installed state-of-the-art security equipment.”

A complete security network
“Security at Oubaai starts with ones arrival at the main entrance.”, says Andre Steenkamp Regional Manager of Holbert Boikanyo Technologies, initiator and co-designer of the Oubaai Security System. “Not only are CCTV cameras installed at the entrance but biometric readers are in place to ensure accuracy of the access control function. No one enters Oubaai before their fingerprint is taken. If they are not a resident and/or a bona fide registered guest on the system, they may not enter. We will notify the people they are coming to visit and they need to confirm that they are expecting a visitor.”, Andre explains.

Different technologies for perimeter security
“But securing an estate of this magnitude means more than just installing equipment at the entrance gate. Without installing ugly fencing, we want to be sure that the entire perimeter is monitored and that we are aware of everyone that is approaching the estate's boundaries. In order to secure the perimeter, I did a thorough study and compared different technologies. Although cost is important when evaluating different systems, my main goal has always been to provide Oubaai with a good solution. In my opinion, saving money on security is not always the best option.”, Andre continues.

Fences
“Although we are using fences at some parts of the perimeter this is not always the ideal solution. Fences are costly to install since much civil works are required. Furthermore, they are not always the most aesthetic solution at a luxury estate like Oubaai. We also need to keep certain areas of the fence open since animals need to be able to move freely from one area to another. They do not care about whose property the land is and need to be able to roam around freely.”

“Furthermore, if you want to see what is happening around the fence, it needs to be complemented by CCTV cameras. In order to see during the night, CCTV cameras need light. Installing light poles everywhere around the fence is definitely not the correct way to go for an estate like Oubaai. Lighting is considered to be too intrusive by the residents.”

Infrared illumination
“Another technology application we have looked at to secure the perimeter, definitely during the night, is infrared illumination.” Infrared illuminators beam infrared radiation into the area in front of a camera. The infrared beamers are often placed around the lens of the camera. The infrared radiation is reflected by objects and human beings and converted to an image which can be displayed on a screen.

“The initial cost is reasonable but you need to take into account that you need to replace the beamers regularly. Furthermore, if you want some good range performance, you need to install powerful beamers which consume a lot of power.”, Andre continues.

“And infrared illumination has another major disadvantage. Oubaai is situated close to the sea and we are very often faced with very foggy conditions. When you switch on the infrared illuminators they worsen the effect of the fog. You can not see anything anymore.”

Radio Frequency Intruder detection (RAFID)
“Another technology I looked at is RAFID.”, says Andre.

RAFID uses two specially designed cables – one transmitting a radio wave, while the other receives that wave. Changes in the amount of signal passing between the transmitter cable and receiver cable are analyzed by a signal processor. If the amount of signal changes, this means that someone or something is between the two cables and an alarm will go off. Due to the difference in the signal strength, the system can detect whether these changes are due to the presence of a human, a small animal, … “RAFID is a more aesthetical solution than fences but it is a fairly expensive system. Not only are full civil works needed to install the cables, once in operation the system requires a lot of maintenance. And although the system can make a difference between a man and a small animal entering the security perimeter, a lot of false alarms can happen. This means that the RAFID needs to be complemented with a CCTV system so that an operator can determine if an alarm is false or not.”, Andre explains.

Thermal imaging cameras
“I first came into contact with Mr. Tinus Diedericks of Timeless Technologies when I was gaining information about a scanning system that can penetrate fog. Also this technology was not exactly what I was looking for and furthermore it is extremely expensive.”

“Tinus explained me that he is a distributor of FLIR Systems thermal imaging cameras in South Africa and demonstrated the cameras at Oubaai. I was extremely impressed and learned more about the technology. That the cameras are performing well during a clear night was immediately clear to me but I was especially interested in their performance in foggy weather conditions.”

“Together with Andre we made an initial study of how many cameras would be needed to secure the perimeter.”, explains Mr. Diedericks of Timeless Technologies. “Andre's initial plan was to install a large number of fixed mounted, short range cameras along the area. We looked at it together and quickly found out that it would be better to install a limited number of longer range performance thermal imaging camera of which the majority needed the be installed on a pan/tilt. Although we needed to use more expensive thermal imaging cameras to do this, the total investment would be a lot cheaper. Furthermore, since we needed less cameras we did not have to install so many poles to install the cameras on. This again saved money. ”

FLIR Systems thermal imaging cameras secure the perimeter
“Today we have completed the first phase of the installation.”, Andre Steenkamp continues. “Along a big part of the perimeter we have installed multiple FLIR Systems thermal imaging cameras.”

“Three FLIR Systems PTZ-50 MS thermal imaging cameras are installed. The PTZ-50 MS contains a thermal imaging camera and a daylight camera. Both are mounted on a robust pan/tilt so that we can look at every direction we want. They provide excellent range performance since they can detect a man-sized target at a distance of practically 800 meters.”

“At a longer stretch of the perimeter, we decided to install a FLIR Systems PTZ-35x140 MS thermal imaging camera. The PTZ-35x140 MS is equipped with two thermal imaging cameras. It detects man-sized targets at a distance of over 2 kilometers and has the ability to zoom in on suspect activities. It also contains a daylight/lowlight camera which we can use during the daytime. We have installed the PTZ- 35x140 MS in the center of the perimeter. Since it is installed on a pan/tilt, we have the ability to see whatever direction we want. We can see the fence, accross the fairway towards the river, as well as a high risk area along the sea. ”

“For two very short stretches along the perimeter we opted for a fixed mounted PatrolIR thermal imaging camera. It is always overlooking the same area. Although its range performance is a lot less than the one of the other installed cameras, it is exactly what I need to guard two very short lines along the perimeter.”

“Most of the thermal imaging cameras are installed on a pole. Thanks to excellent range performance of the FLIR Systems thermal imaging cameras we did not need to install too many of them. Aesthetics are important here at Oubaai. In order to avoid installing poles as much as possible, two of the thermal imaging cameras have been installed on a house. We communicated with the owner, and he preferred that we installed the cameras on his house instead of on a pole. Not only does he not have a mast blocking his view, it is probably the best protected house in the estate as well.”

Thermal imaging, more than security only
“The main reason for purchasing the FLIR Systems thermal imaging cameras was securing the Oubaai estate. Once they were installed it became clear however that they can have another, sometimes live saving, capabilities.”

“Just underneath Oubaai is the sea. People tend to stand on the rocks while fishing. They sometimes forget that the sea is dangerous. Tides can come up very quickly and big waves can be formed. These waves can easily hit people of the rocks, into the sea."

"When an accident happens and we are aware of it, we can easily turn the PTZ-35x140 MS in the direction of the sea. We will communicate with the National Sea Rescue Institute (NSRI) which sails out with special rescue boats to save the person. We can spot the person floating in the water with the thermal imaging camera, almost 2km away and direct the crew of the boat in the right direction.”

Thermal imaging cameras work in all weather conditions
When asked about the performance of the thermal imaging cameras in foggy weather conditions, Andre is very clear. “The performance of thermal imaging in foggy conditions is extremely good.

Although the thermal image is slightly obstructed by the fog and we are not getting the same high quality image that we see during clear weather conditions, we still get good range performance. A person walking around in the fog will be hotter than the cold surroundings. Since the thermal imaging cameras are producing an image based on the small temperature differences they are detecting, we can clearly see people walking around. We might not see all the detail, but we will certainly see that a person is there. And that is the most important thing.”

“For detecting intruders in total darkness, in practically all weather conditions, there is no better technology than thermal imaging. Different estates have come to Oubaai already to look at the performance of the FLIR Systems thermal imaging cameras and they were amazed when they saw the clear images they produce. Some other estates along the Garden Route are thinking about installing thermal imaging as well.”

Feeling save at Oubaai
“Sometimes when I walk through Oubaai I see houses with the doors wide open. Sometimes expensive material is just standing unprotected in gardens. When we notify the owners that they forget to close their home they are often very surprised. They do not normally do this. To me, it is however the best proof that all the security we have at the gate and alongside the perimeter works. The FLIR Systems thermal imaging cameras definitely contribute a lot to the safety and security we have here at Oubaai.”, Andre concludes.

Holbert was the first technology installer to utilise FLIR Systems thermal imaging cameras on estates of this magnitude, within the Republic of South Africa. The system is user friendly and maximizes the technical aspects without compromising on the staffing quotient, ie. enough guards, but not too many, which is the design approach that Holbert follows in its estate solutions. The relationship between Timeless Technologies and Holbert Boikanyo Technologies is very unique where the distributor and integrator join forces in the research, design, project management and implementation of a tailor made solution for the customer. As the systems and technologies are installed and implemented, Holbert aligns itself with an organization that can monitor the system and utilise the imaging to its maximum outputs, ie. specific control centre operations. This ensures a total turnkey solution and peace of mind to the customer.

Axis launches rugged cameras designed for outdoor use on vehicles

Axis launches rugged cameras designed for outdoor use on vehicles

Editor / Provider: AXIS | Updated: 3/2/2015 | Article type: Security 50

AXIS P3905-RE is an outdoor-ready camera addition to the family of compact, rugged and discreet cameras of the AXIS P39-R Network Camera Series. They are all specially designed for onboard video surveillance in or on buses, trams, subway cars and other rugged environment vehicles.

Axis Communications announces AXIS P3905-RE Network Camera. It is designed to be mounted on the exterior of a vehicle, increasing safety onboard and to simplify incident investigations. For example, the camera can be used for rearview surveillance alongside the vehicle outer surface, or down mounted over a door. It could also be used as a forward-facing camera.

AXIS P3905-RE has passed the demanding IP6K9K tests. It withstands tough conditions such as vibrations, shocks, bumps and temperature fluctuations as well as normal maintenance of a vehicle like washing.

“AXIS P39-R series is specially designed for onboard use in a variety of vehicles. It delivers high image quality in HDTV resolution, and edge storage for demanding customer requirements. The cameras also feature an active tampering alarm function for the detection of tampering attempts such as blocking or spray-painting. AXIS P3905-RE Network Camera is a natural extension in this series. It comes ready in a rugged outdoor housing and offers a cost-efficient and reliable installation. It is ideal for buses, trams, trucks and emergency vehicles” says Erik Frännlid, Director of Product Management, Axis Communications. “Axis’ Corridor Format that gives a vertical image format is naturally supported and is perfect for these kind of applications” he concludes.

AXIS P3905-RE comes with a 6 mm lens that provides a 55° horizontal field of view optimized for the typical use of survellaince alongside a vehicle. If a wider field of view is required, the housing also allows customer to change to a 3.6 mm lens offering an 87° horizontal field of view. The new outdoor housing is offered as a separate accessory to AXIS P3904-R and AXIS P3905-R that comes with the 3.6 mm lens at delivery.

All AXIS P39-R cameras are available with either a male RJ45 connector or a rugged M12 connector. The cameras provide a pixel counter for verifying that the pixel resolution of an object meets specific requirements.

The new AXIS P3905-RE is available through Axis’ distribution channels.

GEUTEBRUCK launches Easy Server G-Scope/6000

GEUTEBRUCK launches Easy Server G-Scope/6000

Editor / Provider: GEUTEBRUCK | Updated: 2/27/2015 | Article type: Security 50

G-Scope/6000, the Easy Server in the G-Scope video management family, is a fully functional server, "out of the box". It is as easy to install and to use as a PC. When the reliability of server technology is required, but the level of complexity and flexibility need to remain easily manageable, GEUTEBRUCK's G-Scope/6000 is the perfect fit. Just take it easy.

Its performance meets the high standards of the G-Scope family. The 64-bit G-Core video engine combined with the integrated GPU acceleration guarantees 3 times faster image processing, while the dual database architecture ensures rapid access to memory images and a high level of protection against tampering. Integrated video analysis rounds out the package: Activity Detection for motion-triggered recording or also for motion detection in indoor areas along with scene validation for monitoring the cameras are standard features. Options such as powerful video analysis for outdoor security applications and automatic number plate identification for access control expand the features to meet any wishes.

Reliability and redundancy are an integral part of the Easy Server: Redundant power supply, SSD for the operating system and integrated RAID system provide a level of availability equivalent to that of an IT server. With its high level of expandability, the G-Scope/6000 can fulfill demanding tasks with just a single device: 8 hard disk slots provide storage capacity for up to 42TByte in RAID5; up to 64 IP and 16 analog camera inputs make it possible to secure larger objects. The G-Scope/6000 can of course be integrated into any network, to secure even larger areas or distributed sites, for instance.

Samsung Techwin increases flexibility of iPOLiS mobile app

Samsung Techwin increases flexibility of iPOLiS mobile app

Editor / Provider: Samsung Techwin | Updated: 2/26/2015 | Article type: Security 50

Samsung Techwin announced that iPolis Mobile for Android & Apple iOS devices has been upgraded and can now support playback directly from SD cards inserted into Samsung Techwin cameras.

The added flexibility offered by this enhancement to the iPolis Mobile app is likely to be of particular interest to users who wish to remotely retrieve recorded video of specific incidents captured by a small number of cameras installed in their home or working environment, as it negates the need for a DVR or NVR to record and store the video.

The free iPOLiS Mobile app can be downloaded from the Android Play store and iTunes. It can be set up in less than a minute, after which users are able to view streamed video from their selected camera via a wireless or 3G network. Key features include auto detection for adding new devices and ‘Event’ search to provide easy access to recorded video.

Bank Rakyat Indonesia Implements IP Access Control System

Bank Rakyat Indonesia Implements IP Access Control System

Editor / Provider: Genetec | Updated: 2/23/2015 | Article type: Commercial Markets

Bank of Rakyat Indonesia implemented the Synergis IP access control system to restrict access to vulnerable areas and extends BRIZZI one-card application to include employee access.

Business Challenge
Incorporated in 1895, Bank Rakyat Indonesia (BRI) is one of the largest government-owned banks in Indonesia. Today, BRI has over 10,000 outlets serving 30 million retail clients and a growing corporate clientele. BRI's headquarters is located in Jakarta and serves as the center of their national operations in a state-ofthe- art 35-story building.

As one of Indonesia's largest banks, the organization places a very high importance on security; not only to ensure its proprietary business information stays safe, but also to protect employees and visiting clients. With the aim of enhancing the security of their headquarters, BRI was looking to expand its physical access control system.While server rooms were restricted with a stand-alone access control system, the technology was extremely basic and could not accommodate their plans to implement access control enterprise-wide. BRI also wanted a more advanced and feature-rich IP-based access control system to protect main entrances and exits and other sensitive areas.

An open-architecture system was also important to accommodate device selection and other systems integration in the future. With the help of local integrator Golden Solution Indonesia, BRI chose Genetec Security Center, the unified security platform with Synergis IP access control. According to Mr. Yusuf, Head of Security at BRI, “Security Center met all of our needs in terms of system functionalities within our budget. It also gave us the flexibility to leverage advanced card technology for a unique one-card application with our BRIZZI payment card.”

One-Card BRIZZI Application Showcases Innovation and Simplicity
Today, Security Center manages 114 doors throughout BRI headquarters, securing access to server room areas, offices, and VIP guest locations. HID Global VertX controllers and readers were chosen to secure all doors. The Synergis IP access control system is also managing 12 tripod barrier gates at the main entrance of the headquarters.

Since all employees and some customers already carry the BRIZZI payment card from BRI, the bank wanted to leverage the flexibility of the system and the hardware to use this card for access credentials as well. Today, the 32-bit smartcard not only serves as a pre-paid debit card but is also used by employees to access various areas of the office building.

“The BRIZZI card is designed to serve multiple functions including a prepaid debit card for purchases and for road tolls from merchants who are affiliated with the bank,” said Mr. Yusuf. “By choosing Synergis and HID, we were able to add the access control application within our headquarters. This makes it easier for our employees who now only have to carry one card and this also helps us build on this bank-affiliated innovation.”

Granular Access Privileges and Visitor Management Secure Vulnerable Areas
In order to ensure employees only have access to the areas and floors that are necessary to their functions, BRI was able to create access control groups and pre-assign specific access control privileges to each group for easy cardholder enrollment. Special after-hour privileges are provided to senior-level employees who may require access beyond regular office hours.

The ability to pull detailed access control reports from Synergis has been instrumental to the security team at BRIZZI. During any active investigations, access control event reports provide a clearer timeline of when events might have occurred. Creating monthly reports on visitor access, event logs, and system health status have become routine for the BRI security team.

For clients and business affiliates who visit the headquarters regularly, the built-in visitor management feature in Synergis has facilitated the check-in and check-out process. “The enrollment process for our visitors is quick and easy, and having the ability to assign access control rights ensures our most vulnerable areas will always be secure.”

Growing Into the Future Without Restrictions
Beyond ensuring BRI headquarters are safe from any potential vulnerabilities, the security department is exploring the use of Synergis for a time and attendance application that will involve multiple departments.

Integration with video surveillance and fire detection systems are also on the horizon for BRI. Since Security Center is a unified platform, BRI is looking forward to managing all security and business systems from one easy-to-use solution. Syncing events and alarms with video will further simplify investigations for the security team. BRI is also looking to upgrade access control at other locations and centrally manage these sites from the main headquarters by implementing the Genetec Federation feature.

“ Synergis IP access control is a very effective product and has met all of our needs in helping us secure our headquarters. We look forward to expanding on the system by adding more advanced functionality, systems integration, and other sites. The Genetec solution has given us the freedom to grow, without restrictions, so we know our investment is protected,” Mr. Yusuf concluded.

Philippines: On the fast track to success

Philippines: On the fast track to success

Editor / Provider: Lisa Hsu, a&s Asia | Updated: 2/20/2015 | Article type: Hot Topics

The Philippines have defeated all odds and will make a remarkable recovery in 2015 despite the impact of natural disasters over the past few years. Economic growth is back on track, with public-private programs that will help boost the growth of the private sector, and big events happening this year will fuel the growth for security.

This year will be a positive year for the Philippines, with a forecast GDP growth of 6.8 percent, fueled by inflow of foreign direct investment and remittances. Impacted by a string of natural disasters in the past two years, including Typhoon Haiyan in 2013, the strongest typhoon to ever hit land, the Philippines still managed to achieve a 5.3 GDP growth last year. According to BDO UniBank, the biggest likely change for 2015 will be accelerated implementation of infrastructure projects under the government's public-private partnership (PPP) scheme. Moreover, as the world's largest center for business process outsourcing (BPO), opportunities will present itself with more demand for security and protection for data and employees who work at unruly hours.

Uncertainty for 2016 Elections
Presidential elections will be held in 2016, which may lead to postponement of some projects. Some investors may delay key decisions till a new government is formed and wait to gauge what the future policy environment will be before launching major projects. At the same time, nearing the upcoming election, talk of more projects and activities from the government to gain more votes will hopefully turn into real projects, as growth initiatives must continue. According to Rosalie Real, Project Manager of CBR2 Marketing, “Some agencies will hurry up and purchase before elections, while others who are either indecisive or have no final requirement yet will have to wait after the election is over to continue their projects.”

According to Matthias Boehm, Country Manager of Bosch Security Systems, the elections are considered to be “hot months” in security and safety; most projects are still being rolled out, while some are put on hold.

Security Growth Benefits From Economy
The Philippines has recently been named one of the fastest growing economies in Southeast Asia, and the security industry has benefitted from this trend. “The security industry matures almost every day. As we integrate electronics to this field, the security industry then takes a bigger leap, which opens up many possibilities for surveillance, access control, finger prints, face detection, voice recognition, and building management systems (BMS), etc. If we look at it on a general basis, growth for the industry doubles every year,” said Zel A. Ortiz, Sales and MD of Alcon Philippines Technologies and Solutions.

2015 is a busy year for the country, with events that will be sure to fuel the growth of security. The Asia-Pacific Economic Corporation (APEC) Summit will be held in Manila this year, which the country will appoint a large amount of the budget to security, as it is a main concern. “We are preparing for important visits in 2015, particularly for the APEC summit, for which reason our airports are already in the process of renovation. Entertainment facilities such as casinos and resorts are also in progress in several parts of the country, but predominantly in Manila,” said Boehm.

Also this month, Pope Francis will visit the Philippines to give blessing to the country that suffered from Typhoon Haiyan, which will urge the country to be more aware of security, and take extra precautions by upgrading their current systems at crowd drawing events during the Pope's visit. The Pope's decision to ride in an open vehicle instead of a bulletproof, enclosed "popemobile" poses as a security challenge, and the country has issued additional security forces to ensure protection, including additional soldiers and maritime security surveillance.

“No CCTV, No Permit” Fuels Growth
The policy “no CCTV, no business permit” implemented in 2014, is an essential driver for the security industry, especially surveillance growth and security awareness. With law enforced to mandate surveillance systems as part of business owners' security measures, the public will soon realize the importance of monitoring their premises that can not only deter criminal activity, but also catch culprits.

The policy is implemented in most of the major cities in the Philippines, requiring new and existing businesses to install surveillance systems on their premises in order to obtain business permits. Establishments such as banks, shopping malls, service stations, super markets, money changers, 24-hour convenience stores, schools, fast food restaurants, car dealerships, and other crime-vulnerable establishments such as jewelry and pawnshops, hotels, game and amusement establishments, and health clubs are under the ordinance to install surveillance cameras in order to continue their businesses. “The new legislations implemented by local government units all over the Philippines have definitely placed importance on security, particularly in the use of surveillance systems as a preventive measure against crime. It is now a matter of strictly implementing this policy that will define the standard for surveillance with help of video surveillance manufacturers. This way, more options will be made available to SMBs and will then spur growth in the sector,” Boehm explained.

“No CCTV, no business permit” has set the standard for surveillance systems as the policy has specified a range of requirements for surveillance placement of cameras inside and outside of the establishment, hardware requirements that are needed to record incidents and clearly identify culprits, as well as suitable storage memory that can store the footage for forensic evidence. “The policy will push surveillance growth because it can greatly reduce petty crimes in SMB sectors like supermarkets, convenient stores, etc., and at the same time it helps to contribute security in the public,” said Ortiz. Moreover, in order to push the growth of surveillance in the Philippines, education is essential to allow consumers to know what is appropriate for their requirements. “We manufacturers have to keep educating SMB customers what will be their benefit when they deploy security surveillance systems, or they will simply install no-use cameras just to meet regulation, which is not beneficial at all,” Masami Eguchi, GM of APAC at Panasonic System Communications stressed.

As growth for surveillance is fueled by the policy, business owners have started to realize the importance of video surveillance for their establishment. “Since the government issued a video surveillance requirement, most business owners at first resolve to buy cheap surveillance products just for compliance. Later on as they experience the importance and what good quality products could bring, they are adapting to change. IP cameras and HD-over-coaxial products are fast becoming popular. Consumers learn by asking about resolutions, clarity, and infrared for night viewing. The Philippine government offices, schools, private businesses will surely evolve to upgrading their system these coming years,” said Real.

Private Sector Takes the Lead
Recently, growth in the private sector has been booming with the help of PPP projects. As a result of the government's agenda in the development and implementation in infrastructure, project demand is high. “Mid-high projects have been stronger driven from the commercial sector, e.g., hospitality and gaming that needs security in their operations, which are verticals driving the security industry in the Philippines. It will continue in 2015 with commercial projects from the private sector driving forward,” said Sunny Kong, Director of Sales in APAC at Milestone Systems.

According to Eguchi, though the current market size in the Philippines is still small, it has extremely high growth. “Panasonic would like to contribute to the commercial sector, such as retail stores, and banking,” he added.

Projects to Improve Tourism 2015 is “Visit the Philippines” year, a campaign designated to bring in more tourism to the country, with a target to reach 10 million tourist arrivals. To promote this, there is a need to improve facilities for airports, hotels, residential, commercial, and entertainment establishments that will help bring in more tourists within the year, which will also further boost the security market. According to Tamir Ginat, Senior VP for APAC at IndigoVision, some of the big projects going on that will boost tourism in the Philippines are casinos, smart city projects, the Philippines international airport, and the Philippines light rail transit (LRT).

According to Ivan Tjahjadi, Country Manager of ASEAN at Axis Communications, “To date, the highest growth for us is manufacturing, transport and commercial projects. These industries now require more security and intelligence in their system. Integration also is a big factor since most of them have old systems running.”

Residential Boom
In recent years, various verticals have been growing, especially the residential sector which continues on its cycle of boom as a result of rising demand, capital growth, and rental yield. Developers are committed to addressing the problem on housing shortage. Lately, the trend now is to build mix-use township projects in order to house various types of establishments.

“In all these constructions, security will definitely have a big part to play in ensuring the safety of the general public,” said Boehm.

All Eyes on Philippines
All eyes are on the Philippines as it continues to grow at an optimistic pace, with the help of the BPO industry and government spending for PPP. Additionally, the “no CCTV, no business permit” policy will be a crucial factor that can help the security industry in the Philippines to grow awareness and promote growth. The Philippines will see a prosperous year as it goes on the fast track to success.

Riding on security solutions to safety

Riding on security solutions to safety

Editor / Provider: William Pao, a&s International | Updated: 2/20/2015 | Article type: Commercial Markets

While security products can help with theme park management, operators still rely on them for the original purpose that they were designed for: keeping premises safe and secure. Products and solutions, such as video surveillance, access control, and RFID can help operators achieve their security objectives.

For amusement parks, they deal with several types of security concerns. The first is the protection of premises from various harms. “As like any pubic commercial business, threats that have the potential to prevent or hinder the achievement of objectives that the business needs to perform, for example processes to keep the business financially safe and compliant from potential threat sources, can range from vandalism, terrorism, criminal activity, and asset loss and safety,” said Pedro De Jesus, Channel Manager for Security at Gallagher.

Another concern is ensuring the safety of visitors, some of whom may enter or exit rides from the wrong side or wander off to restricted areas. Locating missing children or members of a group is another primary focus. To address those concerns, security products and solutions are deployed, offering vital and much needed assistance to operators as they strive to build an overall safe environment.

Preventing child abduction and theft
Video surveillance plays a vital role in keeping amusement parks safe, especially when it comes to detecting and deterring crime. “A premier form of electronic surveillance, video provides real-time monitoring of situations, both at the location and remotely,” said Craig Dahlman, Director of IP Camera Products at Pelco by Schneider Electric. “Video security is a proven solution that can offer a complete answer for protecting customers, co-workers, and employees while additionally offering a watchful eye over property.”

Cameras are installed at various points in the park as well as at entrances to prevent various crimes, such as child abduction, although the mere presence of cameras should serve as a deterrent. “Visible installation of cameras and the knowledge that there is a video surveillance system is mostly sufficient to repel potential kidnappers,” said Roland Feil, Director Sales at Dallmeier Electronics, adding that high-definition cameras offering crystal clear images can also help investigate theft and shoplifting, which can be quite rampant at theme parks. Another important value of video surveillance is it can help operators request the necessary compensation should something happens. “It provides indisputable documentation of an event. While serving as a visual deterrent to crime, it gives park managers and security and safety professionals the tools they need to validate liability claims,” Dahlman said.

Locating lost visitors
Tracking lost children or members of a group over a large space like theme parks can be a daunting challenge. RFID, which entails communications between a tag and a reader, can be utilized for this purpose. “It keeps children safe by determining where the child last used the RFID credential. The child's credential can also be programmed not to work without being tagged in tandem with the parent's credential,” said Scott Lindley, President of Farpointe Data.

RFID not only can track lost visitors but also park employees as well. “They can be used to track lone workers, perhaps maintenance workers working in remote parts of the park outside of opening hours, to ensure that staff are accounted for and located, so emergencies can be spotted more quickly,” said John Davies, MD at TDSi.

Better yet, RFID can be integrated with other technologies, such as video analytics, to offer visual verification of the missing person. “Passive RFID tags can allow wearers to be tracked at specific portals throughout the park. While passing through those areas, images can be logged to validate the wearer's location,” said Larry Bowe, President of PureTech Systems. “On a more advanced level, the use of active RFID tags or small GPS transmitter could allow map-based tracking throughout the park and provide the ability to instantly swing a PTZ or zoom a high-resolution fixed camera directly to the child or person in question.”

When looking for lost visitors, every second counts. Video surveillance technologies nowadays have video forensic capabilities that enable quick retrieval of critical video data. “With metadata, which adds sense and structure to video surveillance, it is possible to immediately retrieve the correct evidence of hours of recorded materials in a couple of seconds,” said Pieter van den Looveren, Manager of Marketing Communication for Video Systems at Bosch Security Systems. “Today's video forensic tools can include details on age, clothing color, gender, and even geographic vicinity, allowing a user to literally enter a video search looking for a ‘small male child, wearing a red shirt last seen in the area of a particular ride during a specified time frame,'” Bowe said. “Video clips meeting these requirements can be quickly provided to security for a timely analysis.”

Detecting suspicious objects
While the technology is nothing new, detecting unattended or suspicious items by way of video analytics continues to be a popular application for theme parks, which might be targets for terrorist attacks. “With the help of modern video content analysis, it is possible to issue an alarm if any objects remain within a certain area for a predefined period of time,” Feil said. “The systems can also prevent the blocking of escape routes, fire rescue paths, or approach roads for ambulances by parked objects, which could have very serious consequences in case of an emergency.”

Intrusion detection Perimeter protection is a major concern, especially during the night when theme parks are closed. Delinquents, thieves, or burglars trying to climb over the fence and get into the park need to be kept out. Video analytics and cameras are deployed for this purpose, keeping parks safe and sound after business hours.

“Intelligent video can determine, for example, if an object approaches an area, from which direction it is coming, or how long it stays in a certain area,” Feil said. “This means that intruders can be detected early on and an alarm can be triggered. Comprehensive validity checks reduce false alarms, which may be triggered by leaves swishing in the wind or animals, to a minimum without missing ‘real' alarm messages.”

Video recording during night time, when everything is dark, presents a daunting challenge. Luckily, advances in lowlight and thermal technologies have solved this problem. “Today's thermal imagers have become very affordable, and as video analytic technology continues to improve, protection ranges increase greatly,” Bowe said. “The ability for video analytics to utilize a single camera for distances from hundreds of meters to kilometers makes implementing measures for night time surveillance more effective and more affordable.”

Access Control in critical areas
Like any other businesses, theme parks can step up access control through multifactor authentication, or a combination of tokens, passwords, or, for entry into more critical areas, biometrics. “Biometrics is typically used throughout high security or restricted places, for example head-end sever rooms, cash holding rooms, and security operations,” De Jesus said. “Access to these areas can be controlled to ensure only those staff that are appropriately qualified or trained can gain access.”

Access control management software can offer rapid authorization or removal of access when required. “Examples include contractors needing access to service the rides or attractions, or temporary staff no longer needed to work in restricted areas,” said Davies.

Ensuring safety of equipment
Finally, security products can help ensure that rides and other types of equipment are in good shape. “Video analytics is desirable for monitoring abnormalities, for example smoke, breakage of a gear, movement of a critical component, or overheating through the use of thermal cameras. They can even be used to ensure certain safety procedures are being followed,” Bowe said.

Safe and fun
People come to amusement parks to relax and have a fun day with their family and friends. They can't have fun if constantly being bugged by worries that something might happen. With various security products and solutions in place, operators can strive to make their parks as safe as possible and offer the ultimate visitor experience.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page