You are at : Search > Articles Search Results

Articles Search Results

545 Articles and 56 related Products found for intrusion

Tyco holds live demonstrations for dealers and integrators in Spain

Tyco holds live demonstrations for dealers and integrators in Spain

Editor / Provider: Tyco | Updated: 10/22/2014 | Article type: Security 50

Tyco Security Products recently conducted a series of technology events in Spain. The multi-day sessions hosted in late September and October provided educational opportunities to dealers, integrators, monitoring stations and their customers on both current products and new technologies implemented by Tyco Security Products.

These free events allowed more than 150 participants to meet with the sales and technical teams from the various Tyco Security Products brands, partake in discussions, and provide feedback on the company's offerings, integration plans and product roadmap. Live demonstrations of security solutions from Tyco Security Products alarm and intrusion brands (DSC, Sur-Gard, Visonic, and Bentel Security,) as well as access control brands for video surveillance (CEM Systems,Kantech, American Dynamics and Exacq Technologies) complemented the presentations.

“With stops in Madrid and Barcelona we brought the latest product information directly to our customers and provided them the ability to experience first hand the many synergies within our portfolio,” said Ángel Vázquez, Regional Sales Director – Europe, Tyco Security Products. “Offering an up-close look at these technologies that span access control, video and intrusion, attendees were able to determine how best to configure a state-of-the-art security system, whether for their clients or for their own business.”

The meetings highlighted several product introductions, including PowerSeries Neo from DSC, the industry's most comprehensive hybrid intrusion detection system, Visonic's innovative PowerMaster 33 wireless intrusion system, and the ABSOLUTA 3.5 G3 intrusion panel from Bentel. In access control, the innovative Intevo Compact platform from Kantech offers integrated access control, video and intrusion to the small and medium business market. American Dynamics presented its growing portfolio of IP HD cameras, including the cost-effective Illustra Flex series, the Illustra Compact series for discrete surveillance and the 180 to 360-degree Illustra 825 fisheye camera for active surveillance environments as well as the powerful victor and VideoEdge 4.5 network video management solution. Sur-Gard displayed the SG System 5, a new IP and analog compatible monitoring receiver. From Exacq Technologies, attendees experienced the exacqVision Edge solution, a full-featured server software that runs directly on an IP camera or encoder without the need for a separate server.

 Hikvision adds Ultimate Gain Glass to EXIR network bullet cameras

Hikvision adds Ultimate Gain Glass to EXIR network bullet cameras

Editor / Provider: Hikvision | Updated: 10/17/2014 | Article type: Security 50

Homes, offices and small-to-medium enterprises are set to benefit from the addition of Hikvision's advanced EXIR Bullet network cameras to its easy IP solution line-up. The DS-2CD2T series of 2- and 3-Megapixel cameras feature high-performance LED light sources and a revolutionary rectangular lens for seamless HD formatting but now boast Infrared Gain Glass for ultimate light transmittance and unparalleled levels of night-time surveillance.

The DS-2CD2T series also features 3D DNR and DWDR image enhancement technology, dual video streams, Power over Ethernet capability and an IP66 environmental protection.

Improved infrared light transmittance
Both the 2 and 3-Megapixel DS-2CD2T series cameras use specially coated Infrared Gain Glass for improved infrared light transmittance. This delivers even clearer images and is especially well suited to applications that require high resolution images to be captured in low-light environments. With an IR range of up to 80 metres from its four EXIR LEDs, the DS-2CD2T-I8 is ideal for perimeter intrusion detection, especially at night time.

EXIR Technology
The DS-2CD2T series also incorporates Hikvision's EXIR infrared array technology to provide industry-leading illumination in any low- or zero-light environment. Benefiting from an advanced, highly efficient light source that provides up to 30% more illumination efficiency compared to other LEDs and a revolutionary rectangular lens for uniform scene illumination and seamless HD formatting, Hikvision's EXIR cameras deliver the most advanced levels of night-time surveillance available on the market today.

Part of Easy IP Solution
The DS-2CD2T series Network Bullet EXIR cameras are part of the Hikvision's Easy IP solution, boasting Easy Installation and Easy Viewing with the combination of Hikvision Plug & Play NVR and video surveillance software.

Installation is a simple 2-step process that's even easier than Analog - plug the camera(s) into the NVRs PoE port(s), then connect the monitor and you're ready to enjoy HD video recording instantly without IP address forwarding. Easy Viewing allows you to watch and play live video anytime and anywhere. Users just need to simply download the Hikvision EZVIZ smartphone app for free, by scanning the QR code on the back of camera through EZVIZ app, live video viewing and playback will be available over the internet remotely. It's completely configuration free and it's that easy!
Enabling users to excellently monitor environment day & night, this new EXIR camera series gives users the confidence that their property is securely protected.

Available models
DS-2CD2T22-I3 / DS-2CD2T22-I5 / DS-2CD2T22-I8 - 2.0 MP EXIR Network Bullet Cameras.
DS-2CD2T32-I3 / DS-2CD2T32-I5 / DS-2CD2T32-I8 - 3.0 MP EXIR Network Bullet Cameras.

Nedap keyless drug storage for Darent Valley hospital

Nedap keyless drug storage for Darent Valley hospital

Editor / Provider: Nedap | Updated: 10/15/2014 | Article type: Commercial Markets

A hospital obviously needs to rely on safe storage for their drugs. Nedap enables to do so in cost effective, user friendly and keyless way.

‘Before, all of our 65 nurses owned mechanical keys to the 16 cupboards in our ITU ward. In a busy environment like this, the cupboards are sometimes opened 100 times a day. The locks wore out regularly and consequently the nurses bent or broke their keys all the time. Patient safety always comes first, and we had to be confident that the cupboards were secure at all times. We also had to comply with the national NHS policy to securely store the drugs. That's where Nedap came in.' --Tara Laybourne, Manager ITU ward Darent Valley hospital

Patient's safety comes first
‘In the busy environment of our ITU ward we have nurses working in shifts and visitors walking in and out. Consequently, the policy of the NHS trust is that we need to securely store our drugs. Before, we used key based cupboards to do so. Each of our 65 nurses owned a key to operate them, sometimes up to 100 times a day. As a result of the intensive use, the locks wore out regularly. Sometimes the nurses couldn't lock the cupboards properly anymore and bent or broke their keys as a result. Patient safety always comes first, and we had to be confident that the cupboards were secure at all times. We also had to comply with the national NHS policy to securely store the drugs. That's where Nedap came in.'

Recommendation for Nedap
‘When we asked our partner Carillion, facilitator of the NHS trust fund buildings, about a solution to comply with the NHS security policy, they recommended Nedap. They worked with Nedap before in other NHS site projects, for example NHS Crawley & Horsham hospital. Carillion had heard about the locker management functionality of Nedap's security management platform AEOS. They told us that this solution could help us solve our key-management problem in a cost effective way. Not only for us, but also for Carillion themselves,' says Tara.

No more key management
‘Because the mechanical keys and locks wore out all the time, Carillion had to come over very often to replace them. Also, every time you copy a key, the key gets worse. Eventually it didn't fit the lock anymore. It was an ongoing problem. That's why we chose AEOS Locker Management,' says Tara. ‘The main reason is that the locks can be operated with badges instead of keys. All of our nurses now have one single badge which operates every drug cupboard on the ITU ward.'Also from a maintenance point of view the electronic locker management solution is very cost effective; locks and keys don't have to be replaced anymore and as the locks are wired, there's no need to replace batteries. Tara says: ‘Generally, the solution serves a good purpose and is worth for money.'

Track and trace access
‘Apart from the fact that we can now secure the access to the cupboards, we can also track and trace who's accessed the cupboards at what time. That's also one of the reasons why we've chosen for AEOS Locker Management. According to NHS policy, we have to keep our drugs securely stored. They regularly perform audit trails to check if we comply to the policy. In case of an audit trail, we can easily prove that only authorized persons had access to the cupboards,' says Tara. AEOS Locker Management provides access control on micro level. Via an easy to use web application, accessible via every web browser, users can easily define who should have access to which lockable compartment at what time. When asked about the user friendliness of the system, Tara says: ‘We're happy about the system, but still finding our way around it though. Sometimes, when we issue a new badge to a new colleague, we accidently issue a visitor badge instead of an employee badge. Consequently, the new colleague can't open the cupboards. Then we know that we did something wrong. With a few mouse clicks we can fix our mistake; the system is easy to manage. To keep the process of managing the cupboards secure and clear, only myself and someone else are authorised to manage the system and assign badges. In case both of us are out, the others have an algorithm to check user history if necessary.'

User experiences
When asked about the cooperation with Nedap and its certified Business Partner, Tara says: ‘The cooperation was good. Nedap was available to come over in case of an event. For example, one time, the cupboard wouldn't close. It turned out that the hinges where dislocated. Because the nurses lean on it all the time, we had to renew them. So, it wasn't really due to the system. In the past keys were sometimes lost or misplaced. Since the installation of AEOS Locker Management, they never lost a badge, so that's a great benefit too.'

Future proof
Darent Valley hospital is now ready for the future. In case more drug cupboards should be equipped with Nedap's electronic locks, they can be integrated into the existing AEOS Locker Management system with a few mouse clicks. Because the hospital opted for the solid AEOS security management platform, they can also choose to add on functionalities like access control, intrusion or video management later on. For now, they only use the locker management functionality of the platform and they only pay for the locker management feature they use.

Darent Valley hospital
Darent Valley is a modern hospital in Kent offering professional care, exceptional quality. We provide patients with the latest technology for their treatment in safe, comfortable and clean surroundings. The hospital's team of around 2000 professional and friendly staff provides care for patients across a full range of day-patient, inpatient and out-patient care. We work closely with our local community to improve the standards of our services and welcome all patients both locally or further afield.

 

Nedap modern access control for the Protestant hospital

Nedap modern access control for the Protestant hospital

Editor / Provider: Nedap | Updated: 10/15/2014 | Article type: Commercial Markets

When ‘Christoph 7', the hospitals' quick response emergency team, rushes to an emergency such as a heart attack or a stroke somewhere within the hospital, there is no time to be lost: in the most serious case it can be a matter of life or death. Saving lives has absolute priority and requires unhindered access. The access control management system must therefore be prepared for this eventuality.

So the Team has its own special ‚Christoph 7‘ cards: held in front of any card reader they initiate elevator priority control. The elevator that is specially reserved for the emergency team is ordered to the appropriate floor. Only when a Christoph 7 card is used, the elevator will go to the selected floor with priority. The team can release the elevator for normal operation using the same card. This is just one of many features that the new access control system provides for the Protestant hospital in Mülheim. The system has been realised by the local company GST Gesellschaft für Sicherheitstechnik. Paving the way for flexibility
The foundation of the system goes back to an investment decision made in 2008. Back then the hospital changed from the outdated old system in a migration process to Nedap AEOS.

This comprehensive software-driven platform manages all the security requirements of one or many buildings. As well as access control, this includes identity and authorization management, IP video management and intrusion detection. Add to that the supervision and reporting with web-based alarm administration via a web-based, system-independent graphic interface. The Salto off-line system has been fully integrated into the AEOS security management platform and thereby enables the homogeneous administration of all components, people and functions. AEOS manages a total of 1,580 off-line lock systems. It manages all online doors and online functions, the access doors, the off-line lock system, room doors, patient cabinets and containers, employee cupboards as well as mobile care and food trolleys. New cards including photos are issued using the AEOS software. An ID card can be created on the card printer for every data record in the system and assigned to the corresponding person.

People instead of ID carriers
A particular advantage of the AEOS platform lies in the fact that it is not based on ID carriers but people. The difference is immediately noticeable, for example, if a card is lost. The entire employee record must not be re-entered in the system just because a persons' identification number is missing.

‘This particular criteria can be the deciding factor when choosing the system, above all if there are numerous locations at which the ID features must be distinguished‘, says Dietmar Vetten of GST. This fact permits the issue of multiple identification devices per person. For example, some people have two ID cards in one, that are valid in different hospitals. The cards replace the previously common bunches of keys. They don‘t just open doors and cabinets. Also, the elevator can be controlled with them. Meanwhile long-range readers have been installed near the elevators: these recognise when a bed is moved close to the elevator and permit priority use. The authorization can also be organised differentially so that a priority usage is only available if a member of staff arrives with a bed. If he is alone he will be treated like every other member of staff.

Emergency door monitoring and canteen trolleys
Applications of the security management system can be found everywhere. All doors that are on escape and rescue routes within the hospital are connected to AEOS. Alarms can now be alerted at a central point and forwarded, whereas they used to be raised by pressing an emergency button. The connection also prevents doors being opened without permission. If this happens an alarm is raised in AEOS so that the door can be closed again. An additional connection to the video surveillance system is also planned. The scope of the Nedap software reaches even as far as the catering service: the central food supply service is organised in this Mülheim hospital. The deep frozen food is delivered to the kitchen, divided into portions and stacked in the canteen trolleys. It is then thawed and carefully warmed up on the ward so that it doesn‘t arrive on the plates lukewarm, or even cold, because of the long transport distances. Each of these canteen trolleys has a transponder that automatically opens the door as it passes over the inductive loop in the floor directly below. In this way it is not necessary for a member of staff to manually open a door with their card and the kitchen remains accessible to authorised persons.

Central location – preferred parking
For shopping-lovers it is very practical to use the car park of the centrally located hospital, and so some employees had the idea of using their ID cards outside normal working hours. This is now prevented by a connection to the AEOS software, as Dietmar Vetten of GST explains: ‘The installer has fitted a card reader to the parking lot barrier that is connected to the AEOS system. This has saved having three separate proprietary parking management systems'. The parking spaces can be of ‚mixed‘ use according to an algorithm – that is, by visitors and by staff. The software shows the current occupancy status of each. If one of the staff park there too long an email is sent to the facility management personnel.

Although all the staff from the stand-by team has authorisation for the parking lot, only the person on duty can park there during his shift.

Optimum cooperation
With regard to the implementation of all these systems, no better praise can be given by the customer. This applies not only to the support by GST but also, as Georg Thies and Klaus Domscheit emphasize, for the ‘very good teamwork between Nedap and Salto'. The Salto striker portfolio, that has meanwhile been in use in the hospital for four years, provides an off-line product choice that is hard to beat. Good products alone are not decisive but also good communication within the triangle of manufacturer, installer and customer / user. As Axel Schmidt of Salto points out, this has already been tested ‘in hundreds of joint projects in Europe and worldwide'. During this time the cooperation has been optimised, as Christian Nagel of Nedap confirms: ‘Our emphasis is on the integration of our software because we have an open platform, therefore we work together with experienced partners on a longterm basis.'

Understanding “Real” PSIM

Understanding “Real” PSIM

Editor / Provider: Israel Gogol, a&s International | Updated: 10/15/2014 | Article type: Hot Topics

PSIM (physical security information management) software is a rapidly growing segment in the security market. Its core strengths lie in the ability to integrate disparate systems, creating an intelligencebased situation picture and supplying operators with active policy management. As the market learns more of the benefits PSIM they have the potential to go beyond security and turn into a complete site management platform.

The world market for PSIM (physical security information management) software in 2013 was estimated at US$160.3 million by IHS Research. Despite being a small segment inside the larger security market, PSIM has enjoyed rapid growth — it is estimated to continue growing at 20% and higher growth rates until at least 2018, according to IHS. Price and also end users' level of understanding of PSIM solutions are still main barriers limiting PSIM growth. In addition, the PSIM market's long-term growth is also limited by “competing products successfully being deployed in the mid-tier, a market that has historically been out of reach for the high-end PSIM software platforms due to their prohibitive price tag,” IHS commented.

What is a "Real" PSIM?
PSIM is a software platform that collects and manages information from disparate security devices and information systems into one common situation picture. These can be traditional security sensors like video cameras, access control, intrusion detection sensors, as well as “non-conventional” systems such as networks and building management systems, cyber security hacking alerts, and even weather feeds. A true PSIM solution is vendor and hardware agnostic, giving users the ability to integrate legacy systems and the flexibility and the choice to use best-of-breed technology in the future without limitations.

Being a relative newcomer to the security sector, and displaying a fast growth rate, there is confusion regarding what constitutes a “true” PSIM solution and how it differs from other command and control systems, video management software (VMS), or other security platforms, some of them offering their own integrations between different systems.

The main benefit of PSIM lies in its integration capabilities, being able to connect with existing and planned systems without being “locked-in” to any specific vendor. Usually VMS systems or access control systems use proprietary technology. In these cases, extending a system can only be done by the same vendor. Integrating with a legacy system provided by a different vendor could prove difficult, forcing replacement of existing systems.

In addition to this unique integration capability, PSIM offers another strong differentiator: PSIM is an intelligencebased solution. Collecting and correlating information from different sources means alerts are only raised on events that are important. “A true PSIM has the ability to identify unfolding events, manage them effectively, and mitigate their risk. For commercial, critical infrastructure, and homeland security markets, PSIM provides situation management and establishes the foundation for organizations' operations,” said Jamie Wilson, Security Marketing Manager for EMEA at NICE Systems.

A third important differentiator is the ability to provide active management of events, improving operational efficiency. By using adaptive workflows, the operator knows what is happening, where it is happening, and what needs to be done. Step-by-step action plans can be created to address different situations. This is vital in both making the operators job easier, but also in ensuring the company is following corporate safety and security policies every time and complying with local rules and regulations. “Without adaptive workflows, all you have is a lot of interconnected systems and you are solely reliant upon the experience of the operator to be able to coordinate the management of the incident,” added Wilson.

Adlan Hussain, VP of Marketing at CNL Software emphasized that dynamic workflows can change based on the time of the day, the threat level, and the number and types of alarms in the system. “This is what makes a PSIM solution an intelligence-based system and not a mere check list of processes to follow,” he explained.

These benefits, combined with growing connectivity, change the way corporations work. PSIM allows for a more centralized command and control, without being tied to a specific site. “In the past the security surveillance and sensors' monitoring had to be on-site at the place of the event. Today we can disconnect between the surveillance and the site. The benefit of a PSIM system is not only in connecting different sites, but thanks to the ability to display the same information in different languages we can connect a company headquarters in Europe with a site in Africa,” explained Hagai Katz, VP of Business Development for Magal Systems. “This connectivity allows the company headquarters to quickly address issues and make sure that the initial response is the correct one. A company can extend the benefit it gets from a PSIM system beyond safety and security. Other company procedures can be incorporated into the SOP, for example, making sure a proper media response is prepared by the PR function. In that sense a PSIM system also contributes to the company's risk management.”

Who should install PSIM?
From the technical point of view, PSIM solutions are intended for easy integration. It is therefore meant for cases when there are several legacy systems that need to be integrated, when there are several control layers (e.g., local and national), and when there are many sensors, or when future integrations with additional systems are needed.

PSIM is mostly needed for critical sites with high security requirements and large sites with many systems/ sensors. It is therefore mostly relevant for national infrastructure, large corporations, government buildings, mass transportation, and city protection projects. All these already have existing legacy systems and can benefit from integration. A city, for example, can integrate video footage from public space video surveillance cameras and traffic control cameras creating a unified situation picture in the control room.

Obstacles Facing Adoption
Though the benefits of PSIM seem natural and logical, there are still many barriers to its adoption. Some are due to lack of buy-in by different stakeholders that refuse to give up control of their systems and information; some are the result of past failures.

One of the biggest challenges faced by PSIM vendors is the availability of IT savvy channel partners. “Limitations to growth are predominantly around the current education levels within end users, consultants, and integrators,” explained Hussain,” We are working hard to increase education levels within each of these groups, and have created programs to address some of these challenges.”

Growing Connectivity and Greater Industry Cooperation
“With everything today moving at light speeds towards connectivity via the network and the Internet, PSIM is also migrating and expanding towards the ‘Internet of Things' via the information management aspects of PSIM,” said James Chong, Founder and CTO of Vidsys. “The open architecture and browserbased PSIM technology is enabling the software platform to rapidly and literally connect with almost any IP-based device, application, and system using open standards and protocols such as XML, SOAP, HTTP, SMTP, and others.”

Recent updates in PSIM software functions and features include integration with mobile devices, allowing ground forces to share and receive information through smartphones and tablets. In addition, there is an industry move towards greater connectivity with other business systems such as HR systems, internal directories, visitor management systems, building automation systems, RFID, intelligent transportation, and more. These will create opportunities for other benefits to be realized from PSIMs beyond safety and security.

“I think people are realizing that PSIMs can provide a lot more than just physical security,” said Michael Mesaros, Group Product Manager at Proximex, a Tyco Security Products brand. “We're being asked by customers to integrate with all kinds of systems — elevators, building management systems, luggage conveyors, and even environmental controls in airport jet ways. There is a combination of market forces at work and PSIMs must be capable of leveraging this data for more and more systems as it becomes available.” He pointed out that Proximex has worked to make their PSIM easier to integrate with — for example, by implementing APIs based on REST (representational state transfer), a standard integration in the enterprise IT world. “Following these standards opens up a lot of avenues for customers to integrate social and web solutions.”

toward greater connectivity and easier integration. CNL has created a PSIM driver development community, which allows other development houses, product vendors, and security integrators to create drivers to connect systems to CNL's PSIM platform. This allows fast production of drivers, and allows product vendors to create their own drivers if they are not able to share their SDK or APIs. In the past five years, CNL has also been running a technological partner program.

Another initiative to foster interoperability between manufacturers and establish industry standards is the Physical Security Interoperability Alliance (PSIA) led by companies such as Cisco, Tyco, Hikvision, and Kastle Systems. PSIA's mission is to develop specifications for physical security technology that will enable plug-and-play interoperability across the security ecosystem. This will make the integration of different systems under a PSIM solution quicker and easier.

Integrating Predictive Capabilities
PSIMs can go beyond event management and post-event investigation. The ability to integrate with media broadcasts, open source intelligence systems, and other information analytics gives PSIM a predictive capability, as well as a strategic advantage in predicting and preparing for incidents.

Earlier this year, Vidsys and HP Autonomy announced a collaboration to develop a solution that combines VidSys' PSIM with HP's advanced information analytics platform. “Social and broadcast media play an increasingly significant role in helping anticipate and mitigate potential security incidents around the world. The nature and profile of threats are constantly changing and this new generation of adversary often leaves a different digital footprint, creating potential gaps in traditional threat detection approaches,” said Chong. “The combination of a vast array of information, including social media chatter, video surveillance footage, emails, case files, criminal records, and physical location data help identify potential threats and take actions to neutralize the danger.”

PSIM to Offer Holistic Management
The benefits of PSIM, especially its ability to incorporate non-security systems, hold within them the promise of expanding beyond physical security and delivering comprehensive information management. A good example is seaport management, explained Katz. A PSIM system can make sure that an incoming truck is cleared quickly using LPR sensors for the truck and a biometric sensor for the driver. The containers can be recorded and stored according to their final destination and video surveillance can make sure the goods are not damaged. Since everything is audited by the system, the port can accurately bill the clients according to how long the cargo was stored before it was loaded on the ship. Usages like this, according to Katz, show how “PSIM allows combining these different work flows into one single story.”

All in all, the data gathered from security systems, combined with other systems can turn a PSIM solution into a comprehensive site control platform; thus demonstrating that PSIMs are not for security alone. In the future, PSIMs will allow for a more holistic management approach, combining safety, security, and management.

Milestone Systems navigates new sales channels with Netgear and Zucchetti

Milestone Systems navigates new sales channels with Netgear and Zucchetti

Editor / Provider: Milestone | Updated: 10/7/2014 | Article type: Security 50

Milestone Systems has just announced a close relation with Netgear enabling over 10,000 Netgear resellers and more than 2,400 partners to sell solutions with Milestone XProtect. Moreover, Zucchetti is now a certified Milestone access control partner, which allows Netgear partners to deliver complete physical security information management (PSIM) solutions.
Netgear designs the network infrastructure capable of supporting IP security from small-sized businesses to large corporate surveillance systems with up to 1,000 cameras. Solutions based on the Netgear infrastructure are flexible and reliable, offering a solid base for building dependable security solutions. This allows Netgear partners to introduce more powerful solutions to the Italian market based on the benefits of Milestone products:

• Milestone XProtect VMS is powerful, reliable and easy to use, having proven itself in more than 100,000 installations worldwide. Based on a true open platform, XProtect enables integration with the industry's widest choice in cameras and best-in-class business solutions, such as access control and video analytics. The software is compatible with more than 3,000 encoders, IP cameras and digital video recorders (DVRs), from almost 150 different suppliers worldwide. Milestone strives to continuously increase its compatibility with new devices. 

XAtlas , the multi-platform security management system designed by Zucchetti Axess, allows access control integration, workplace security, time and attendance data collection, anti-intrusion and firefighting integration, video surveillance, vehicle transit management and company canteen and parking management.

"This partnership is very exciting to us, as it opens a whole new channel for us. Italian IT professionals will be able to use a world-class network infrastructure component and access control software to build value-filled PSIM solutions using leading open platform video management software," says Claus Rønning, Director Southern Europe & DACH, Milestone Systems. "The ability to integrate Zucchetti's and Netgear's extensive partner network into the Milestone partner ecosystem will expand our combined market reach. This is truly a forward-looking partnership"
The new partnership is already stirring up excitement at Netgear and Zucchetti. "Netgear is synonymous with quality and reliability. We are confident that all Netgear partners will seize the opportunity to increase their skills in the field of security, providing solutions that include Milestone video management system. We are also confident that the market will surely obtain benefit from this collaboration, "says Stefano Barbieri Regional Sales Director CBU, Netgear Italy.
"The benefits for end users will be remarkable, starting with the fact that the access control functionalities of Xatlas software will be directly accessible through the XProtect platform interface, with modular and scalable settings, according to specific requirements" stated Domenico Uggeri, Zucchetti Vice President.

Tyco and Universal Security Systems earn highest cetification on C.CURE platform

Tyco and Universal Security Systems earn highest cetification on C.CURE platform

Editor / Provider: Tyco | Updated: 10/6/2014 | Article type: Security 50

Software House, part of the Security Products business unit of Tyco, is pleased to announce that two systems integrators in the UK have achieved Enterprise Level Certification, the highest level of certification and training on the Software House C•CURE Security and Event Management system.

With this certification, Total Security Protection and Universal Security Systems join an elite group of integrators as part of the C•CURE Partner Program who hold C•CURE Enterprise Level Certification. Installers who earn this highest level of certification have undergone a lengthy and highly technical training program on the C•CURE 9000 platform. C•CURE Partners must also demonstrate expertise in IT expertise and certifications including Microsoft and Cisco certifications along with skills in networking, SQL Server and database administration.

“Total Security Protection and Universal Security Systems have undergone an extensive training program and have proven their capabilities over the past two years in delivering and maintaining complex integrated solutions with C•CURE 9000 at the core,” said Alan Riegler, Sales Director, Tyco Security Products, U.K. and Ireland. “With their Enterprise Level Certification, Total Security Protection and Universal Security Systems have positioned themselves to handle the most advanced, technologically-challenging projects in the industry.”

Total Security Protection, a leading independent integrated security system company based in Watford, has built a reputation for using the latest security technology, for following high installation standards and providing outstanding aftercare service. The company has worked across a broad range of business sectors, including M&E, data centres and government sectors. Total Security Protection supports systems on a national and international basis.

Universal Security Systems, an established security systems integrator based in East London, serves a broad range of clients, including IBM, Standard Charter Bank and the London Stock Exchange. It has won several prestigious industry awards, including the ‘Integrated Security Solution of the Year Award' and ‘Large Security Installer of the Year Award.' Its clients are primarily medium and larger sized organisations located in Europe or the Middle East who require protection for major, prestigious and/or multi-site property estates.

The C•CURE 9000 system provides a holistic, video-rich perspective of managing access control, video, and intrusion using a deeply embedded victor unifying client. victor is Tyco Security Products unifying solution that provides an integrator's customers with a unique management platform that links events from access control, video systems and other integrated applications through one feature-rich interface. Users can manage events through a PC, Web client, victor client or the new C•CURE Go mobile client.

How security enhances metro emergency management

How security enhances metro emergency management

Editor / Provider: William Pao, a&s International | Updated: 10/6/2014 | Article type: Hot Topics

Taking public transportation has become a normal way of life for people constantly on the go. Yet despite various safety measures implemented by the operator, disasters, whether natural or caused by human, occur from time to time. Luckily, today's security technologies have evolved to enable better emergency management for operators, and passengers can travel with peace of mind.

Public transportation has become a common way for people to commute, travel, or get to wherever they want to go. According to figures provided by UITP in 2013, 148 cities in the world have a metro system, carrying a total of 150 million passengers everyday. As for buses, 32 billion passenger journeys are made in a year worldwide — that's roughly 56% of the 60 billion for the entire public transportation system.

But, while operators around the world work hard to make sure their public transportation systems are safe, major accidents still happen from time to time. Also, due to public transit's open nature and the fact security checks are less stringent than air travel, metros and buses are easy targets for terrorist attacks. The 2004 Madrid train bombings and the 2005 bombings on London's subway and bus systems are two horrific examples in recent times. Against this backdrop, security plays a major role in emergency management. Take the 2005 London bombings as an example. Immediately after the first bombings on July 7, law enforcement officials searched for suspects via videos taken by the roughly 6,000 cameras deployed throughout the London Underground. Four days later, the images were discovered, and the identities and backgrounds of the four suspects were found. They were arrested within a week.

For today's metro operators, they can be aided by the latest developments in security technologies, including PSIM, PA, intercom, and intelligent software such as VCA to deal with emergencies even more efficiently. With these technologies in place, operators can detect threats, act upon them, and respond to incidents quickly.

VCA : Detecting Threats Early
A major component for preventing disasters in public transit is early detection of threats. Unattended bags, individuals loitering on the platform, or unauthorized entry into tunnels may lead to disastrous consequences if not dealt with in time. In fact, the U.S. Department of Homeland Security allocates millions of dollars annually to support the deployment of tunnel intrusion detection.

An effective tool that can help operators detect threats early is video content analysis (VCA), also known as video analytics, which has become more advanced and intelligent. Among the things that VCA can do are passenger counting to avoid overload, facial recognition to identify potential terrorists, and detecting objects left behind to prevent bomb explosions. Today's VCA can be embedded directly into surveillance cameras. “This enables the cameras to automatically alert the security center in case of, for instance, unauthorized access at rail yards, bus depots, or tunnels. As a result, the transit authorities can get early warnings for potential incidents such as graffiti, metal theft, sabotage, or tunnel trespassing,” said Patrik Anderson, Director of Business Development for Transportation at Axis Communications.

While VCA is claimed to have various intelligent functions, overreliance should be avoided. “Analytics is in most cases not designed for 100% accuracy and cannot completely replace security staff,” Michael Port, Head of Technology at SeeTec, reminds.

PSI M: Responding to Incidents Faster
Physical Security Information Management, or PSIM, is an effective incident-response tool that has been deployed in numerous public transit systems around the world including those in Washington D.C., London, and Moscow.

PSIM's value is twofold. First, it allows the consolidation of disparate metro command and control subsystems, such as security, operation, emergency, and even maintenance into one centralized room. “This consolidation in which police, emergency forces, and metro operation team share the same room and use PSIM as the glue that provides common operating pictures has proven to have drastic effects on metro organizations' ability to respond quickly in a collaborative manner to unfolding situations,” said Udi Segall, Director of Business Development at NICE Systems.

Secondly, once a threat is detected or an accident has already happened, PSIM provides instructions on how to respond, based on pre-defined standard operating procedures. “It provides operators with step-by-step guidance on what to look for, who to contact, how to respond, and when to escalate an incident. It is also helping to create meaningful reports on long-term trends, so future investments can be targeted to risks,” said Adlan Hussain, VP of Marketing at CNL Software.

According to Hussain, deploying a PSIM platform across an enterprise is unlike any other physical security investment in that it reaches across more stakeholders within an organization. “Time and effort need to be given in order to create the processes for managing incidents. Some of these processes may cross departments, so it is important to work with all stakeholders on their expectation from the system,” he said.

Cameras and Storage
Surveillance cameras are now installed in trains and buses throughout global public transit systems to step up security. In particular, network or IP cameras can offer high-resolution images, some up to 6 megapixels, delivering crystal-clear videos that can help improve surveillance efficiency and enhance targeting of suspicious objects or individuals.

As video data generated by IP cams get bigger, network video recorders (NVRs) in trains or buses must have better storage management capabilities. With event recording, “users can first configure the event tags, such as motion detection in the form of line crossing or intrusion detection. When the event is triggered, the video recording is activated,” said Jianjun Pei, Director of Traffic Solutions at Hikvision.

Soft Power: VMS
Video management software nowadays can automatically detect and configure cameras, analyze and process videos generated by hundreds if not thousands of cameras deployed throughout a metro system, provide centralized control of these videos, and give operators greater situational awareness.

VMS products are also highly integrative and can combine with access control, fire detection, and other building automation technologies. “This way, situational awareness is dramatically improved for safety staff. They will be able to assess a situation much more effectively using live video feeds from the area where alarms are triggered,” said Jens Johansson, Transportation and City Surveillance Sales Manager at Milestone Systems. Despite the advances in network technologies, there is a sense of reluctance for some metro operators to migrate their legacy systems to IP. “It may be a challenge for transit authorities to make sound investment cycles towards the new level of public transport security offered by open network video technology. However, as major cities around the world have begun their journey towards a better way to manage incidents, transit authorities can turn to their fellow peers in other cities to learn,” Anderson said.

Breaking the Sound Barriers
Besides visuals, sounds, such as gunshots, glass breaking, or even passengers gasping in horror, can also indicate something is going wrong.

Consider a recent and less devastating example of how operators can be alerted through sound. On August 26, a woman taking the Taipei metro alleged a male college student of “touching” her. A passenger who saw this pressed the emergency call button and notified the operations command center (OCC) of the incident. When the train rolled into the next stop, police went into the car and took the suspect away.

Today's intercom and public address (PA) systems have become more network-centric and can help enhance incident management for metro operators. According to Simen Kjellberg, Commercial Product Manager for Rail and Metro at Zenitel Group, modern intercoms or emergency call points (ECPs) have become more complex yet powerful. Supported with audio analytics, they can detect gunshots, glass breaks, and various forms of aggression, and then trigger cameras and send the feeds back to the command central. Active voice cancelling filters out background noises, which can be louder than people talking. “This way, the elderly with weak voices can be heard even if a train is passing,” Kjellberg said.

With open duplex conversations, both sides can communicate simultaneously rather than one person speaking over a uni-direction link. Automatic gain control automatically adjusts the volume level of people's voice even if they are up to five meters away. “In case of a conflict, with people being pushed away from the ECP or injured people lying on the ground, they can still be heard,” Kjellberg said. As for PA, one of the most important breakthroughs is its integration with radios carried by field personnel, who can listen to PA broadcasts through their devices or better, make announcements through their radios that can be used like a microphone.

Increasingly Wireless
Wireless technologies have advanced significantly and can allow transmission of huge amounts of video data to the OCC seamlessly, even from moving trains. Charlie Chen, Sales Engineer at Oring Industrial Networking, said for ground rail systems, wireless transmission is easier to implement. “Access points can be put in the train and every 300 meters along the track to make sure that transmission is smooth and uninterrupted,” he said.

Yet concerns have been raised over connection dropouts in tunnels, especially at sharp turns. Cosimo Malesci, VP of Sales and Marketing at Fluidmesh Networks, said this is a non-issue, as long as the implementation is done correctly. “We have done a lot of tests in tunnels on moving metro vehicles, and it works properly. Of course, the number of radio in curvatures should be higher than in straight lines,” he said.

Sit Back and Relax
Security technologies nowadays are evolving to help prevent and respond to emergencies. While they are not 100% effective, and while challenges still remain, they are being deployed in a growing number of metro systems and have proven effective in helping operators gain situational awareness and protect passengers' lives and assets. To make sure passengers can sit back and relax on metros and buses, investment in security overhaul and upgrades is justified.

Tips on Surveillance Deployment on Trains or Buses
The most ideal spots to install cameras are entrances and exits of buses and trains, since “every suspect has to enter or leave the vehicle,” said Michael Port, Head of Technology at SeeTec, adding cameras should also be distributed equally along the vehicle axis. In general, four to six cameras are the ideal number for installation on each bus or metro car.

When purchasing cameras, the user should identify their overall objective. “Should a particular camera make it possible to identify individuals? Or recognize? These two use cases result in different requirements on the camera in terms of resolution and low-light characteristics,” said Jens Johansson, Transportation and City Surveillance Sales Manager at Milestone Systems.

“The selection of lenses and field of view of each camera should be considered so that one can clearly identify the person. Several lenses may be needed in various locations in the vehicle,” said Patrik Anderson, Director of Business Development for Transportation at Axis Communications.

Panoramic cameras are ideal, as they are able to cover a wider range of a given area. As an example, Dallmeier's panoramic solution was deployed by South Africa's metro system, which faced the problem of vandalism and theft on trains parked at the rail yard at night. With the solution, which uses several lenses with different focal distances, more areas can be monitored and suspects identified, resulting in a reduction in crime.

Software House launches network-ready all-in-one solution

Software House launches network-ready all-in-one solution

Editor / Provider: Tyco | Updated: 10/1/2014 | Article type: Security 50

Software House, part of the Security Products business unit of Tyco announces the introduction of victor Unified SiteServer, a unified access control and video network appliance.

Using a deeply embedded victor unifying client, victor Unified SiteServer takes a holistic video approach of managing and monitoring access control, video, and intrusion from one database all from one easy-to-use box. The victor Unified Client is a new client choice which can be run in parallel with existing C•CURE 9000 client choices, providing the increased functionality of combined client features. The victor Unified SiteServer is pre-installed with all the software needed for a convenient, quick and easy way to manage and monitor the various activities related to access control, video and intrusion. The unified appliance supports the latest versions of C•CURE 9000, victor Unified client and VideoEdge NVR software.

“victor Unified SiteServer takes an all-in-one approach that not only harnesses the full power of the access, video and intrusion systems from Tyco Security Products, but does so in a time-optimizing, resource-maximizing, and money-saving way,” said Jason Ouellette, Product Line Director – Access Control, for Tyco Security Products. “With victor Unified SiteServer, you can quickly drill down to get the specific details of a C•CURE 9000 access control event and its associated video all in one convenient interface".

Through victor Unified SiteServer, users can perform specific system tasks such as badging, dynamic mapping, advanced reporting, custom application layouts, video smart search and analytics for improved situational awareness. The pre-configured database of readers, doors, controllers and cameras significantly reduces set up time, as does the easy-to-follow start-up wizard.

Key features of victor Unified SiteServer include support for up to 32 access control readers and 32 IP cameras; a 240 GB solid state drive for enhanced system reliability; two independent Ethernet LAN ports for flexible network configuration; and a health dashboard that monitors critical activities such as network bandwidth, memory and system functionality.

For customers with many geographically diverse sites, the victor Unified SiteServer can provide local, on-site reliable operation and facility control. Each victor Unified SiteServer can then communicate with the main, centralized server that provides efficient global system management of the entire enterprise system.

EL.MO NETPLUS adopts expandable modules with high interoperability

EL.MO NETPLUS adopts expandable modules with high interoperability

Editor / Provider: Sponsored by EL.MO. | Updated: 9/29/2014 | Article type: Hot Topics

EL.MO. SpA, the Italy-based surveillance manufacturer has brought together the best of technology applied in the safety field in two products— Villeggio and NETPLUS system. EL.MO.NETPLUS, the new hardwired/wireless (with RIVERRF and HALENTE concentrators) intrusion detection control units features 8 triple, double balanced / NC / fast on board inputs, expandable to 16 with split function.

Highly expandable platform
NETPLUS system uses the hardware platform equipped with expansion modules based on Plug&Play principle. It is expandable up to 104 inputs with RIVER series concentrators. Extremely modular, it can grow dimensionally and functionally according to the environment in which it operates. It has a RS485 serial line for the connection of the TRES01485 and TRIAL detectors, RIVER concentrators, and up to 16 control devices such as TATTILO, TATTILOPLUS and ANIMA touch screen keypad, NIRVA and MIDAS keypads, the RS485 I8 serial bus inserters, the ETRZENITH and IZENITH key point flush-mountable box and the PASSLIGHT additional system status indicator.

The completeness of the EL.MO. range is not just complementary, but optimally allows NETPLUS to integrate with a large number of devices. NETPLUS offers unlimited possibilities of management through remote devices, such us traditional telephone, mobile telephone, smartphone, tablet or PC. The applicative field of the remote management includes vocal interaction or via SMS, and involves the management of intrusion detection system and the management of other areas. NETPLUS systems is integrated with management, centralization and supervision and supervision infrastructure of e-Connect systems.

Thanks to this platform, end-user, installers, maintainers and service companies can control, manage and easily communicate with their intrusion detection system through smartphone, tablet and PC anywhere, anytime via internet.

The high interoperability of NETPLUS applies not only tothe modern communication media but also to building automation in civil and industrial environments, based on KONNEX BUS thanks to the suitable optional module.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page