You are at : Search > Articles Search Results

Articles Search Results

2438 Articles and 238 related Products found for software

Systems integration in banking sector: tricks to crack the hard nut

Systems integration in banking sector: tricks to crack the hard nut

Editor / Provider: Prasanth Aby Thomas, a&s International | Updated: 5/26/2015 | Article type: Hot Topics

Financial institutions are at the heart of contemporary global economy. Modern corporates that are accustomed to the convenience of transnational trade and commerce would never function without the support of banks that are working around the clock. Customers used to the convenience of accessing cash any time and making cashless transactions too would be at a loss without them.

The banks, on their part, are going all out to make sure that they are able to reach each and every possible customer. To this end, they have embraced technology and made use of the internet for electronic, and more recently, mobile banking. In the U.S. alone, despite the slow growth of the financial sector post the financial crisis, the year 2014 saw banks put up a strong performance in terms of assets and liabilities, according to the US Federal Reserve.

Concerns on a Lukewarm Approach to Security in Banking
Yet, despite such an aggressive financial rebound and its subsequent contribution to the GDP, banks continue to be a dismal vertical for the security industry. Even with the sensitive nature of their business and risky character of their transactions, banks have largely abstained from adopting modern video surveillance technology.

To most systems integrators (SI), this attitude is illogical. Banks are willing to move ahead with Internet and mobile banking but are reluctant to make use of similar technology to make their systems secure. According to Bob Mesnik, President of New York-based SI Kintronics, convincing banks to improve their security is an uphill task.

“They are reluctant to spend money in security and we have not found any way to convince them otherwise,” said Mesnik. “The larger banks don't seem to care at all about security, which is very strange. Outside the U.S. there is more interest at smaller banks, but in this case they are mostly interested in monitoring performance of their employees.”

Mesnik's complaint echoes sentiments from several other SIs across the industry. Major reasons often attributed to this reluctance from banks are concerns on safety and cost effectiveness. But even when these apprehensions are put to rest, banks are not enthusiastic to move forward.

Understanding the Challenges in Financial Sector
But this is not to say that banks have totally remained off limits when it comes to upgrading their video surveillance systems. Numerous case studies from manufacturers as well as SIs show instances where banks have moved forward to IP technology and felt it was worth spending money on. Tyco, a company with significant experience in the vertical, explained the challenges that SIs face when dealing with banking sector clients.

“Clients are working with tighter budgetary constraints and have to prioritize those projects which are deemed absolutely necessary, whether this is due to replacing dated security installation, meeting regulatory demands or responding to business expansion strategies,” said Chris Jones, Regional Global Account Manager for Installation & Services at Tyco Asia Pacific.

“A number of clients are also outsourcing their sourcing or procurement departments. These companies are more aggressive in their scrutiny and more likely to prefer to go to tender to encourage competitive pricing.”

Aidan Anderson, Security Consultant at Red Leaf Consultancy in UK, elaborated this point further. According to him, not all SIs are aware of how the banking sector operates and how they view physical security.

Although from a security-industry perspective protecting bank assets may be seen as a priority, banks are more likely to think in terms of controlling certain identified risks. Security is only one among these risks, the others being liquidity, capital and regulatory. Methods of controlling risks may include upgrading systems and equipment, but it might just as well be adopting certain procedures or buying insurance products.

“Within a bank, security is generally seen as another department, rather than a special case and as with all departments any investment has to provide returns, whether those are measured in terms of increased revenues, cost savings, process efficiencies or a reduction in headcount,” said Anderson.

“The challenge for systems integrators is to work with potential clients to establish how their products could, in terms of risk and for the security department, provide benefits to the extent that the business will invest in them, rather than the competing requirements of all other departments.”

Paul Bremner, Senior Analyst for Video Surveillance - Security Services at IHS, who works closely with the systems integration community, added a few more variables that impact security related decisions in banks.

“The banking sector itself can be divided into different sectors, there are the retail branch locations, the distribution centers, and the corporate offices; each of these has different requirements with its own unique challenges,” said Bremner.

“For an integrator trying to win business in this sector, it is important to understand that the level at which the decision to install or retrofit a security system can vary at each of these locations.”

The decision to hire a particular SI would also depend heavily on where it is taken. If the decision is made locally, it could level the playing field for regional as well as national level SIs. But if the decision is taken at the national level, then banks are certain to choose SIs with a national presence and relevant experience.

“This makes having a large geographic footprint an important selling point for an integrator looking to win business across the entire banking sector,” Bremner pointed out. “Another requirement from an integrator that goes hand-in-hand with this large footprint is a proven track-record of servicing these financial institutions.”

 

Banks to Favor Surveillance Beyond Security
The technological developments for banking security are not unique to the sector, but their applications are. According to Paul Bremner, Senior Analyst for Video Surveillance - Security Services at IHS, banks tend to proceed with investment decisions in new security equipment and solutions after considering the ROI and reduced operational costs it may bring. Among this, reducing operational cost is mostly about bringing down the headcount, but in terms of increasing ROI, banks are interested in business intelligence analytics.

According to a survey from Cisco, 43 percent of US customers believe their primary bank does not understand their needs. Thirty one percent feel their bank is not helping them reach their primary financial goals.

Banks are increasingly aware of this gap in their service and are actively seeking a solution. This requirement, coupled with a rising need to increase efficiencies of the branches and do more with less, clearly paves the way for banks to utilise their surveillance systems for analytic data.

“Technologies such as business intelligence analytics can help a bank's branch locations improve their operational metrics, such as queue line monitoring,” said Bremner.

“This allows the bank to create staffing models which are in tune with the flow of customers throughout the day, preventing the bank from being overwhelmed. Technology such as this is helping banks improve their customer's waiting times, while also optimising their staffing schedules.”

 

Improvised Marketing Strategies to Win Clients
Considering the trend of banks preferring experienced, national-level companies, it's natural that banking sector appears like an uphill task for most SIs. But analysts suggest companies to rethink their marketing strategies to improve their presence in the market.

At present sales strategies are centered on the promotion of equipment and software packages as separate solutions, with integration referring to how the separate components are installed together. Some focus is also given to interoperability and lower downtime with the capacity to remotely repair most faults. While these may work in a number of sectors, it wouldn't make a mark in the banking sector unless the product being sold is unique.

“However where there is a leading strategy, it is working with potential clients to design systems,” Anderson said.

“This does require a great deal of time and effort by the systems integrator, as it might not only be the security department that has to be engaged, but the IT department and perhaps other equipment suppliers. The overriding advantage in doing this is obvious but for the systems integrator who has put the work in, the outcome might not necessarily be the right answer for them.”

A key point that Anderson makes here is that even though systems integration on its own will help reduce costs even after the initial investment, its impact is not significant when compared to a security department's or the organization's budget. Hence the focus should be on generating opportunities that reflect the ongoing business need of matching their strategy, understanding what their driving factors are and creating solutions that not only focus on integrated systems but how that could be used with other security functions to create a winning position.

Elaborating on the reasons for Tyco's success in this business sector, Jones indicated that the crucial point was enterprise solutions that would integrate several platforms deployed for security surveillance in accordance with the client's requirements. The company's PSIM solution has been instrumental in this aspect.

“Tyco's PSIM solution can provide an open platform for integration to get a centralized view of security activity,” Jones said. “Its ability to turn disparate information sources into real-time actionable intelligence, analyze the situation to obtain timely and accurate insights, and automated workflow results in quicker and more effective incident response and resolution which enforce incident response processes, mitigate risk and reduce operational costs.”

Some systems integrators are also trying a more traditional approach of adding values to their services to increase their clients. George Zarifopoulos from the Marketing & Communication Department of Athens-based SI, Takis G. Zarifopoulos, said his company offers a free maintenance contract for a specific period of time.

“Giving two years period free maintenance, directly adds more fidelity and reliability in our projects,” Zarifopoulos explained.

Security Systems Tailored for the Financial Climate
According to a report from Ernest and Young, the major trend in the banking sector for 2015 will be to increase profitability but not look for large revenues. To this end, banks will need to reinvent themselves, with leaner, more flexible business models that can survive a slow global economic growth.

A modern video surveillance system that goes beyond offering security and aids in enhancing the bank's business would be an ideal solution to bank's requirements to survive the weak economic climate. At the same time a tailored and customized marketing strategy that projects the advantages beyond security would be what SIs should focus on to make their mark in the banking sector.

VIVOTEK upgrades its central management software VAST to version 1.10

VIVOTEK upgrades its central management software VAST to version 1.10

Editor / Provider: VIVOTEK | Updated: 5/25/2015 | Article type: Security 50

Fulfilling its commitment to enhance the performance of VAST, VIVOTEK is pleased to announce the release of VAST Version 1.10. In this version, VIVOTEK introduces new advanced features to VAST users, specifically, Logical Tree and Standard VCA Event Integration.

VAST is VIVOTEK's self-developed professional video/central management software for managing IP surveillance products.

Designed with intuitive functions and features, VAST provides unlimited supports to cameras, servers and clients in a hierarchical system structure, efficiently and effectively monitoring, recording, playback, and event trigger management.

The new Logical Tree and Standard VCA Event Integration features in VAST Version 1.10 facilitate installers and system integrators to build robust surveillance systems with ease.

 Logical Tree: Previously, camera lists were only presented as non-hierarchical devices names. In Version 1.10, users can categorize camera lists based on personal requirements and preferences, enabling them to create hierarchical lists that increase the ease of accessing cameras at all sites.

 VIVOTEK On-camera VCA Event Integration: VIVOTEK has launched the self-developed video content analysis (VCA) application package, which includes three key functions: Field Detection, Line Crossing Detection, and Loitering Detection. In Version 1.10, the VCA package is fully integrated into the VAST platform. In addition to receiving standard VCA events, VAST can now directly show event rules in live view mode.

Grundig's versatile EX-SDI hybrid DVR works with EX-SDI, HD-SDI, 960H and 760H camera technologies

Grundig's versatile EX-SDI hybrid DVR works with EX-SDI, HD-SDI, 960H and 760H camera technologies

Editor / Provider: Grundig Security | Updated: 5/25/2015 | Article type: Hot Topics

Grundig has launched its new 16 channel EX-SDI (Extended Serial Digital Interface) hybrid DVR, the GRX-K4416A. The DVR records EX-SDI on all channels, but has the flexibility to record HD-SDI, 960H analogue and 760H analogue video streams simultaneously. CCTV systems using the DVR can include a combination of all coaxial-based video technologies, so existing and previously installed cameras can be re-used. The DVR will automatically configure each channel to suit individual camera video stream technologies.

EX-SDI technology, like HD-SDI, enables the transmission of HD digital video, in real time, over coaxial cable. Whereas HD-SDI has a 100m transmission limitation using RG59 coaxial cable, EX-SDI will transmit 330m.

This extends to 670m if the higher quality RG11 cable is used. Image quality is better than IP in live and similar to that of IP record mode. The DVR uses the simple, point-to-point installation method of analogue.

The new Grundig DVR provides comprehensive functionality for CCTV applications of all sizes and complexities. Its can be controlled using Grundig Control Center software, allowing cost-effective, EX-SDI, HD-SDI or analogue camera systems.

Grundig's Control Center software allows remote access to the DVRs for set up and configuration. It uses an Internet Explorer web browser for live viewing, playback, search, backup and remote configuration. Grundig's GD Viewer app also allows convenient viewing by iPhone or Android smartphones.

EX-SDI enables installers to offer customers a cost-effective, digital upgrade to analogue systems, saving money by re-using the same coaxial cable infrastructure.

Music festival safety is coordinated with Milestone video

Music festival safety is coordinated with Milestone video

Editor / Provider: Milestone Systems | Updated: 5/25/2015 | Article type: Commercial Markets

Milestone Systems open platform IP video management software (VMS) is a core technology in the mobile event incident command unit developed by Unified Command as a temporary security operation center (SOC) that moves from one event location to another.

“Milestone VMS technology helps us unify all the facets of complex events into one centralized command. That coordination enables us to respond more effectively to emergencies. We're able to quickly dispatch the right people to the right places, which makes events safer for everyone,” says Chris Gandy, Chief Technology Officer, Unified Command.

The company hires local law enforcement, dispatch and emergency service personnel for 40–50 big events across the U.S. each year, such as the music festivals Hard Summer and Outside Lands, Coachella and Stagecoach. In 2013, Chris Gandy joined as chief technology officer. With nearly two decades of experience as a police technical detective in a major metropolitan police force, he has worked with video surveillance for years.

Freedom of Choice in the Components
Gandy's list of must-haves for a VMS solution was extensive, from overall video stability to ease-of-use, to robust mapping capabilities – all based on a truly open platform. Milestone XProtect®, his ultimate choice, met all requirements and exceeded most.

“A lot of manufacturers force you to buy their hardware, but with Milestone I use a Dell server, my own networking equipment and whatever kinds of cameras I want. I don't like being locked into a certain make and model of camera or a specific brand of hardware: I make my own choices.”

Fast Deployment and Response
Gandy reports that the ease and speed for Milestone to be deployed makes it an attractive solution, especially in an industry where speed matters. “We go into a field in the middle of nowhere, put up cameras and the next thing you know we've got eyes on more than 100 acres. For the people operating the system, it's very user friendly and easy to learn.”

The primary benefit is better overall response to incidents that happen at events: overflowing trash cans, lost items, clogged entry and exit points, unruly and potentially dangerous crowds and serious medical emergencies.

“By putting everyone in the same virtual room through access to a top quality video solution, everyone involved in the event's success is able to read off the same page. Without this way to coordinate, you would have all different facets operating separately,” Gandy says. “The Milestone VMS helps put the right people into the right places. Since we can all communicate with each other directly, we respond more quickly.”

For example, when a call comes in that someone has passed out, the dispatcher in the command center uses the call's point of origin to identify the closest camera and directs that camera to scan the crowd to the person needing attention. The dispatcher gives the exact location to the medics - which is critical when it's dark out, strobe lights are running and there are no cross streets for reference points. As a result, the medics quickly get assistance to those in need, not wasting precious time searching a crowd of thousands.

The incident command team proactively scans video for potential problems. When people appear to have consumed too much alcohol or other substances, or crowds gather near perimeters perhaps preparing for “fence crashing”, Unified Command operators use the camera coordinates to direct security staff to the exact location, fast.

Efficient Ease of Use, Interactive Maps Give Pinpoint Precision
The complexities of managing incident response for changing event venues leave little – if any – time for training. Gandy reports that the Milestone VMS is very easy to use. “We can bring up multiple customized views for display on computers, mobile devices and the XProtect Smart Walls. It's a big issue with a lot of security systems to know where the cameras are to get the live view quickly, but the interactive map in Milestone takes care of that: operators just click on an icon and a separate window pops up with the camera feed of that view.”

Gandy begins each event by putting a location diagram into the software and placing an icon for each camera on the computer-generated map. This eliminates the need for staff to look up confusing camera identifiers like North Parking Lot Facing South, which means nothing to dispatchers who don't work in the area every day.

Mobile and Wireless for Situational Awareness
Unified Command takes advantage of mobile and wireless capabilities to coordinate among the locations within an event. Using the Video Push feature in the Milestone Mobile client, cell phone cameras can record video at points not covered by the network cameras and stream (‘push') those images back to the command center via wi-fi. Milestone Mobile also streams video to iPads that Unified Command assigns to event managers, enabling ‘views of the entire festival they can carry in their back pocket'.

Gandy says the Milestone wireless support makes it possible to set up the command center physically removed from the heart of the event. This ensures that staff can focus on coordinating services rather than protecting themselves during an emergency. “Anyone we have connected to the event's security network can easily and quickly see exactly what's going on anywhere without having to get to the command center,” he says. “That frees all of us up to focus on resolving whatever the situation may be.”

FLIR presents affordable TCX Security Camera

FLIR presents affordable TCX Security Camera

Editor / Provider: FLIR | Updated: 5/22/2015 | Article type: Hot Topics

FLIR Systems will presents its new TCX Thermal Mini Bullet camera at this year's IFSEC exhibition in London. The FLIR TCX security camera combines 24/7 high-contrast thermal video and high-performance built-in video motion detection with a level of affordability that the industry has never seen. FLIR TCX is powered by the company's revolutionary Lepton camera core.

New TCX Thermal Mini Bullet
FLIR TCX outperforms visible-light security cameras by providing the advantage of seeing clearly in complete darkness without any illumination, in bright sunlight, through smoke, dust or even light fog – enhancing accuracy and dramatically reducing false alarms. Flexible for integration in any environment, indoors and out – even in temperatures as cold as -40°C – FLIR TCX is ideal for ensuring safety of public buildings, industrial facilities, large and small businesses, or residential areas. Featuring both intrusion detection and accurate video alarm verification in one device, FLIR TCX supports lighting control, people counting, retail traffic flow, and queue management, and enables a whole range of other applications including:
* Intrusion/presence detection: vehicles, people, animals
* Video alarm verification
* Night vision – 24/7 CCTV
* Residential security
* Short-range perimeter security
* Safety and fire assessment

“Whether you're a small business looking for intrusion detection and video alarm verification, a retail company looking for a solution to monitor customer traffic flow, or a small business trying to prevent break-ins, the TCX Mini Bullet is an extremely accurate solution,” said John Distelzweig, Vice President and General Manager of FLIR Security. “As a leader in thermal security, FLIR is advancing the technology in such a way that makes thermal cameras accessible for anyone.”

Full line of security products
At IFSEC 2015, FLIR will also present a number of innovations, which the company has recently added to its full line of security cameras, recorders, and software. One of these innovations is the FLIR FX, a compact, versatile Wi-Fi-enabled HD camera that integrates unique cloud-based analytics and flexible application-specific mounts. FLIR FX optional accessory mounts facilitate use in an array of applications including in-home monitoring, outdoor security, sports activity and vehicle dash-camera recording. Users can stream live video to a smartphone or tablet, record video to a Micro-SD card, review events that are recorded utilizing motion detection algorithms, communicate with two-way audio, and quickly review hours of video with FLIR's Cloud-based RapidRecap™ capability.

Defining a well-integrated access control management system

Defining a well-integrated access control management system

Editor / Provider: William Pao, a&s International | Updated: 5/21/2015 | Article type: Hot Topics

A major trend in access control is its migration to IP. In fact, IP-based access control is now seen in most new buildings and projects around the world. According to IHS, IP-based access control accounted for nearly 60 percent of the market in 2014 due to a ramp-up of new constructions, in the process contributing to a 7.6 percent growth of the industry. As for this year, IHS's initial estimates put growth at 8.8 percent. In terms of regions, growth in North America may drop a bit, while APAC and Latin America are expected to pick up steam, according to a previous interview with Tyco Security Products.

Central to IP-based access control is the access control management system, which, when integrated with other subsystems, can do much more than merely granting or denying access to users as they walk to a building.

What Defines Well-Integrated
So what makes an access control management system well-integrated? There are several criteria, for example the types of subsystems that can be integrated, the ability to have them interoperate smoothly, and the flexibility the system provides when it comes to supporting the types of hardware and credential. Finally, open standards are key to ensure interoperability, future scalability, and cost reduction.

Systems that Can Be Integrated
One factor to determine whether an access control management system is well-integrated is its ability to integrate with different types of subsystems. “There are several subsystems that can be integrated into the access control management software, which goes beyond granting or denying access to users. Elevator, parking, meal vending, CCTV, and student ID cards are all examples of the subsystems that can be integrated,” said Tom Su, Sales Manager at Hundure Technology.

Besides the aforementioned, today's access control management systems can also integrate with HVAC (heating, ventilation, and air conditioning) as well as telecommunications systems to save energy and provide more convenience for users.

“If the CEO presents his credential to the outside of the building, they will understand what areas of the building that CEO will get through to get to his office. There is no need to illuminate the entire building,” said Brad Aikin, Business Leader of Electronic Locks at Allegion. “The same thing extends over to telecommunications. When someone comes in, the system will transfer their out-of-office e-mail to in-office. It can not only adjust their e-mail status but also switch the forwarding to their desktop versus their mobile phone.”

 

Smooth Interoperability

A well-integrated access control management system can also allow the different subsystems to operate seamlessly at the same time, even to the point where “the customer cannot distinguish
the boundary between the systems,”
- said Daniel McVeagh, Senior PM at Gallagher.


“The best integrations which achieve this tend to exhibit the following traits: a comprehensive set of application programming interfaces (APIs), good integration documentation that allows the integrator to achieve a seamless and bug-free integration, a comprehensive testing process ensuring bugs and weaknesses in the integration are found before they reach the customer, and a track record of successful previous integrations.”

 

Compatibility With Different Hardware
A good access control management system should also be able to support different types of hardware and credentials.

“I think it is important for integrative systems that they can handle and integrate different types of hardware within the same system to be called well-integrated. For example, it should be able to handle different types of door controllers, as well as different readers and credential technologies to be truly integrative and offer the benefits of such an open system to the end-user/system owner,” said Ola Jönsson, Business Development Manager at Axis Communications.

“Depending on what region of the world or what vertical market, there are certain credentials that are prominent,” said Aikin. “I think it's very critical that the access control system be flexible to accommodate the credentials that the user has today, and also flexible enough to provide a migration path to what credentials will be in the future, whether that is near-field communication, or Bluetooth low energy.”

Mobile authentication by way of NFC or Bluetooth low energy can be supported by today's access control management systems as well. “The most basic approach is to replicate existing card-based access control principles: the phone communicates identity information to a reader, which passes it to the existing access control system,” said Eric Chiu, Segment Director of Physical Access for APAC at HID Global.

 

Openness Is Key
To enable this kind of integration, open standards are critical, ensuring that interoperability between disparate systems is achievable.

“Open protocols and agreed standards such as ONVIF have made it possible to integrate previously disparate systems and open up the possibilities of what a truly integrated security system can offer,” said Sarah Phillips, Product and Marketing Manager at TDSi. “Modern integrated access control systems offer a broad ability to work directly with other buildings control systems on this level rather than purely via hardware panels. For example the integration of intruder and fire detection systems directly into a centralized software platform gives greater situational control and automated responses to any issues.”

Openness, meanwhile, also ensures scalability, allowing users to add or integrate more systems into the access control management software, regardless of the brand. “Users also can simplify future infrastructure enhancements and modifications since they can invest in hardware platforms that are not tied to proprietary protocols and software,” said Chiu. “Basing solutions on an open architecture with standards-based APIs will enable customers to meet evolving requirements and future expansion needs while protecting the value of their overall investments.”

 

Access Control and Video Integration
Access control management systems integrated with videos is perhaps the most popular integration among users. Due to the increased situational awareness that they provide, such integrated solutions are seeing rising demands and applications, especially in areas that are more critical and sensitive in nature.

Rising Demand
Integration between access control and video is set to see rising demands. “I do think where there is video today, there is a desire to integrate it more closely with access,” said Aikin. “Today from what we have found, globally, the typical number of access points in a commercial building that have video and access management is 10 percent of less. With the devices becoming easier to deploy and lower in cost to acquire and manage, the market is able to deploy a credential reader or access control mechanism to the other 90 percent of openings.”

When access control and videos are integrated, no matter which one serves as the anchor platform, the two complement and add intelligence to each other. “When video is used as part of an integrated security management platform, it enriches the information provided by access control and intrusion detection, and vice versa,” said Arjan Bouter, Head of Sales at Nedap Security Management. “You get maximum control and protection of your premises and benefit from the unlimited scalability and extreme controllability.”

“While video management and access control have been integrated for some time, access control is now able to be deployed to more access points in the building, allowing a richer set of data to be used in video management,” said Aikin. “If you have access control tied to video, you are able to see what credential was utilized at what time of day and at what location, and that adds a lot of value in your video management. In the past, you were able to put an IP camera or Wi-Fi camera in, but you weren't able to afford to put a reader or access control device at that opening, so you had to scroll through footage and try to distinguish what was occurring simply based on the visual video. Now, because you are able to deploy access control at that portal as well, you're able to really connect it and sort it based on an audited event in a credential.”

Due to the increased situational awareness such integration brings, it is commonly used in higher security applications. “These include parts of a healthcare environment like pharmaceuticals or the maternity wards, where they are worried about infant abduction, and areas where there are sensitive assets or sensitive chemicals,” Aikin said.

 

Single User Interface
When videos and access control are integrated, they should be integrated on one single user interface to allow easy monitoring and control by the administrator.

“It is pointless to integrate video and access control if they need to be treated separately by the user,” said David Weinbach, PM at AMAG Technology. “While it may be logical to try to source all components from one supplier, that limits choice and may not allow an optimal solution. A better solution is one that allows different brands and multiple systems to be integrated in a way that makes the details of each transparent, and provides a consistent, common interface.”

Mobile Applications
Increasingly, video-access control integration will move towards mobile applications. “Mobile applications will become more widespread. That's the trend of the future,” said Su. “With video surveillance, monitoring of doors through one's mobile phone is now very common. If you integrate access control into it, you can control access from your mobile phone as well.”

College of Saint Rose secures open campus environment with Vanderbilt SMS Access Control System

College of Saint Rose secures open campus environment with Vanderbilt SMS Access Control System

Editor / Provider: Vanderbilt Industries | Updated: 5/20/2015 | Article type: Education

Customer
Located in the heart of Albany, New York’s capital city, The College of Saint Rose offers 4,500 students a rigorous educational experience that extends their learning beyond the campus to the vibrant urban environment in which they live. Fostering community involvement, The College of Saint Rose opens its doors to the public throughout the day, but in so doing, must be diligent in ensuring the safety and welfare of its campus members. With this in mind, The College of Saint Rose has deployed a comprehensive safety and security program that includes Vanderbilt Security Management System to manage access to key buildings across the 48-acre campus.

The Challenge
No campus is immune from threats of crime, violence and other disruptive behaviors. To ensure that every possible precaution is taken to protect the campus community, The College employs a highly visible uniform patrol and has installed the most advanced security technologies available, including a 400-camera surveillance network and an access control system. However, the existing access control solution did not pass The College’s new requirements for campus lockdown and had several software glitches that caused other performance issues. “As more buildings were added, we began experiencing more performance issues with the software,” explained Tara Steelman, One Card System Administrator at The College of Saint Rose. For example, buildings would not open or close when scheduled to and cards would open doors that they were not programmed to. According to Steelman, however, the biggest problem occurred during campus lockdowns when some buildings wouldn’t lock at all and some cards could still be used to gain access to unauthorized buildings. “The old system was antiquated, unstable and not very user-friendly.”

The College of Saint Rose began looking for a more reliable solution to improve their response in an emergency situation. From a technology standpoint, the new solution had to work seamlessly with The College’s existing campus administration systems, since the ID cards are used to manage meal plans, printing, library usage, account information and bus passes, in addition to building access. “The new access control platform needed to pull together all the data from our disconnected systems to help us secure the campus as effectively as possible,” stated Steelman. On the recommendation of Tutela, a provider of integrated security solutions and services, The College of Saint Rose selected the Vanderbilt SMS solution. “We selected Vanderbilt SMS because it easily integrated with our existing infrastructure, is easy to use, and delivers the reliability and performance we need in all security situations.”

Tutela, which won The College of Saint Rose business against three other partners because of their exceptional integrated system design capabilities and strong references, installed the Vanderbilt SMS on time and without any change orders. “Tutela has been selling and servicing Vanderbilt SMS systems for more than ten years so we knew they would do an excellent job designing, installing, and supporting our system,” noted Steelman.

The Solution
The College of Saint Rose has 141 HID proximity readers installed across the main campus and in several buildings off campus to provide authorized access to 11,000 cardholders. Two users have full rights to the solution with 11 others having limited access based on job responsibilities. Steelman manages the entire operation from one of 13 workstations. Vanderbilt SMS currently integrates with The College’s Enterprise Resource Planning (ERP), and housing management and ID badging systems.

The Results
Vanderbilt strategic partner SwiftData Technology, a customized data management solution provider, customized The College’s solution to ensure that relevant information could be passed from the ERP, housing, and ID badging systems to the Vanderbilt SMS access control database. The new platform was installed during the fall semester under an extremely tight timeline. The team also had to overcome installation issues left over from the previous system. “We had very few disruptions during installation, mostly it was smooth, swift and painless,” commented Steelman. “Not only did we save time during installation, we can now also update our software solution faster than before.”

Steelman and her team have found Vanderbilt SMS very easy to use. Security officers make the most of the solution’s rich feature-set, which includes unlimited reporting, detailed report scheduling, manual and automatic overrides, and a programmable flash for downloads and firmware updates. “Vanderbilt SMS software is very stable, extremely user friendly and offers several new features that our old software did not provide,” noted Steelman. “Because Vanderbilt SMS is so intuitive, we have seen a reduction in the amount of time needed to program access identities and policies at the beginning of each semester.”

One of The College’s main goals with the new solution was to improve data management across its campus-wide systems to improve efficiencies. Providing better access to more information in near real-time, the Vanderbilt platform has allowed The College to do just that. “I can easily get to the data I need when I need it, update the system on the fly and track historical data,” stated Steelman. “With deeper access to campus information, we can react faster to ensure the best protection possible.”

According to Steelman, Vanderbilt SMS has had a noticeable impact on security levels at The College. “I believe we will be able to increase the security of campus buildings by 100 percent when the system is fully functional,” asserted Steelman, who also expects a reduction in misuse and other disruptive behaviour associated with the access cards. “Vanderbilt SMS is much more reliable compared to our prior investment so I am confident that we will see a marked reduction in unacceptable behavior.” Steelman is also certain that they can react much faster — and more successfully — to lock down the campus in an emergency situation.

The College of Saint Rose has also gained several valuable business benefits since deployment. “The Vanderbilt solution was less expensive than the two other technologies we considered and will scale more cost-effectively as we grow,” confirmed Steelman. “We expect to achieve a long-term return-on-investment based on the reliability and stability of the Vanderbilt products.”

The College has also been able to reduce the man-hours needed to manage data across all platforms. “Vanderbilt SMS is far more efficient than our previous solution, saving my team a lot of time in administration and maintenance,” said Steelman. “As a single-source solution that integrates so easily with our other systems, Vanderbilt SMS will certainly help us cut down on support time and costs.”

Impressed with Vanderbilt SMS and the company’s support team, The College of Saint Rose plans to add new features as it expands across campus, including the Vanderbilt Guest Pass System, ID Badging and complete integration with its video surveillance platform. “Our strength as a college can be measured in part by our ability to respond in an emergency situation, so we remain fully committed to providing the safest learning environment possible,” concluded Steelman. “With Vanderbilt SMS, we are confident that we can respond quickly and effectively in any situation to ensure the safety of our students, staff and visitors.”

CEM Systems provide innovative security upgrade for London Gatwick Airport

CEM Systems provide innovative security upgrade for London Gatwick Airport

Editor / Provider: CEM Systems | Updated: 5/19/2015 | Article type: Infrastructure

CEM Systems, part of the Security Products business unit of Tyco, can announce that its long standing customer London Gatwick Airport has undergone a major upgrade of its AC2000 access control and security management system. The project was phased throughout 2014 and involved an upgrade of AC2000 Airport software, as well as the upgrade of more than 700 card readers throughout the airport terminals to support PicoPass smart card technology. CEM's revolutionary intelligent access terminal, emerald, has also been installed at Gatwick Airport, providing a modern, innovative solution that goes beyond access control.

London Gatwick is the UK's second largest airport, serving around 200 destinations in 90 countries, with more than 38 million passengers a year.

“Over the last year we have worked with CEM Systems to seamlessly upgrade our existing AC2000 security system, which has proven to be highly reliable and powerful. With a large system and the critical nature of the airport environment we needed a phased upgrade that ensured zero system downtime”, said David Rees, Business System Manager for Operations. “CEM support was second to none with the AC2000 Airport software upgrade performed remotely and quickly”.

“CEM Systems has been working in partnership with Gatwick Airport for over 25 years, during which time their AC2000 security management system has been continually upgraded and customized to meet their unique aviation requirements” said Philip Verner, Regional Sales Director, EMEA, CEM Systems. “This recent upgrade was a significant project that required all existing CEM S610e card readers to be upgraded to support highly secure PicoPass smart card technology. We are also delighted that our new CEM emerald IP access terminals have been installed to enhance operations at Gatwick Airport's arrival gates and to act as an information point for ID staff and flight agents”.

The first of its kind in the industry, emerald is a touch screen reader, door controller, VoIP Intercom and system terminal all in a single box. The innovative touch screen LCD greets cardholders by illuminating as they approach and provides a user friendly security experience. As an intelligent multifunctional IP access terminal, emerald provides London Gatwick Airport with more than access control at the door. Airport security can use remote apps on the terminal to update personnel records, perform reader maintenance and display airport adverts and messages.

Gatwick Airport are also using the unique emerald flight arrivals door mode, which enables flight arrival gates in both the North and South Terminal to intelligently route domestic and international passengers accordingly. Upon a valid card swipe, flight agents intuitively select a predefined flight carrier number on the emerald terminal. emerald then interlocks the appropriate doors to allow international passengers to be routed to passport and border controls, with domestic passengers simply routed to baggage collection.

With the major upgrade now complete, London Gatwick Airport has a truly innovative, future proof security platform that provides resilient access control, and improves card user experience at the door and enhances airport operations.

WD launches special HDD series targeting large-scale systems

WD launches special HDD series targeting large-scale systems

Editor / Provider: Prasanth Aby Thomas, a&s International | Updated: 5/18/2015 | Article type: Hot Topics

Western Digital (WD), the California-based manufacturer of storage solutions, recently launched its latest surveillance hard disk drive (HDD) series for large-scale surveillance systems that require large numbers of drive-bays and cameras.

Known as the WD Purple NV, this purpose-built line of 3.5 inch high-capacity, 4 TB and 6 TB HDD are an advancement over the company's standard WD Purple series, which can handle up to eight bays using its software vibration compensation system.

Beyond eight bays, software vibration systems are not effective. This is where the WD Purple NV becomes useful as it features a hardware vibration compensation system, the company explained while speaking to a&s at secutech 2015 in Taipei.

The new series are built to withstand the demands of continuous recording in complex systems, while ensuring minimum power consumption. Its high capacity also enables long video
retention periods for analysis and reference.

“Along the line that the standard WD Purple supports up to 32 HD cameras, the WD Purple NV supports up to 64, although depending on the system this number can go higher,” said Patrick Lo, Director of Marketing for Digital Video & Data Center Storage Division in APAC at WD. “The WD Purple NV is targeted at large systems while the standard WD purple is targeted at medium to small or even personal home surveillance systems.”

The company further added that the new drives are equipped with several of its exclusive features, including the Allframe technology that reduces video footage loss with proprietary cache policy management technology to help improve data flow and playback.

VIVOTEK wins privilege of providing Mongolia's Khan Bank surveillance systems

VIVOTEK wins privilege of providing Mongolia's Khan Bank surveillance systems

Editor / Provider: Sponsored by VIVOTEK | Updated: 5/18/2015 | Article type: Commercial Markets

Khan Bank: Helping Mongolia Grow Since 1991
Khan Bank is one of the largest commercial banks of Mongolia. It provides banking services to an estimated 80% of Mongolian households. Established in 1991, Khan Bank has continued to grow and expand its service since its inception. Today, Khan Bank has 535 branches throughout Mongolia and provides comprehensive banking services to individuals and companies. Never settling for the status-quo, Khan Bank has also continuously invested in technology to enhance the quality of service it provides its customers, such as an extensive ATM network covering Ulaanbaatar, aimag capital and major district centers and nationwide access to Internet Banking, Mobile Banking and Telephone Banking. Moreover, the rapid growth and development of Khan Bank is expected to continue as Mongolia continues to perform economically. This young bank is preparing to gallop, like Mongolia’s world famous horses, into the future.

The Challenge: Khan Bank’s Previous Security System Unable to Keep Pace. A Trial is Held to Determine the Ideal Solution.
In this climate of rapid growth and expansion, Khan Bank required a thoroughbred surveillance system which could keep pace with its changing demands and keep Khan Bank ahead of the field. At the heart of any bank is its ability to secure its customers’ property, and as such the safes at each of Khan Bank’s branches required the utmost level of security. Unfortunately, the bank’s previous security system was not able to keep up with Khan Bank’s security needs, leading to a need to revolutionize its entire security system. The bank needed high quality and high megapixel surveillance cameras not only for its central headquarters, but for every branch across urban and rural areas, and all ATMs in the Ulaanbaatar area.

In order to determine which surveillance system could provide them with the absolute best performance for this vast network, Khan Bank decided to run a trial between the leading providers of security systems, including VIVOTEK.

The Solution: VIVOTEK – Ahead of the Field and Ready to Help.
No stranger to a challenge, VIVOTEK, along with local distributor ITZONE LLC’s highly qualified and experienced engineers and sales team, were able to provide the strongest solution and exceed Khan Bank’s demanding expectations.

The broad coverage, high resolution, variable focus and specialized design of VIVOTEK cameras ensured that Khan Bank’s offices, branches, safes, ATMs and entrances could all be monitored on a secure and stable high-performance IP network system. Khan Bank, thoroughbred among Mongolian banks, had finally found a surveillance system that could keep pace.

High-Quality IP Cameras Secure a Vast Network of Banking Facilities.
The largest demand for coverage was found in the halls of Khan Bank branches. These wide spaces required cameras with extremely wide-angle coverage and high image quality, while also blending in with the interior design of the bank’s branches. For this task, ITZONE LLC chose VIVOTEK’s FE8174 for its combination of high coverage, high quality and low profile. The FE8174 is capable of 180 degree panoramic views while mounted on the wall, or 360 degree surround views if mounted on the ceiling. The FE8174 also offers a variety of display options including original surround view, panoramic view, and regional view for various mounting applications. In addition, in both the panoramic as well as regional viewing modes, users can utilize the ultra-smooth ePTZ function to easily zoom in and focus on a region of interest (ROI). All of these features mean that the FE8174 was able to provide superb coverage of all of Khan Bank’s branch halls.

The VIVOTEK FD8136 ultra-mini fixed dome network camera was chosen for this central task. Its tiny profile hides an incredibly high-tech camera, capable of producing high quality imagery in a variety of formats. For outdoor spaces, particularly the entrances of Khan Bank’s branches, more than fifty FD8371EVs were installed across its network, allowing high-megapixel coverage in difficult operating environments. The FD8371EV is ideal for such solutions, able to withstand Mongolia’s extreme weather conditions and safe from any attempts at vandalism or tampering.

To add to the functionality of their system, Khan Bank uses Milestone XProtect® Enterprise, which is an easy-to-use video management software platform designed especially for large-scale and multi-site surveillance applications. It supports intuitive control of an unlimited number of cameras for monitoring live video, recording, and sharing evidence. All the video captured across multiple branches can be transmitted back to the main XProtect management and displays in the central control room. The security staff can instantaneously view events at different sites via the unified, intuitive interface, increasing bank operational efficiency and speeding the reaction time whenever events occur.

The Latest Surveillance Solution, the Simplest Installation
Finally, this rejuvenation of Khan Bank’s surveillance systems, providing the bank with a total best-of-breed security solution, was able to be achieved remarkably easily. Thanks to VIVOTEK’s efforts to provide high-tech surveillance systems which are able to be installed easily and are also simple to maintain, Khan Bank’s new surveillance system not only provides remarkable advances in coverage and reliability, it also simplifies the entire process of surveillance and footage retrieval. As a result of this upgrade, Khan Bank can now feel free to expand and grow with Mongolia, safe in the knowledge that VIVOTEK is running alongside and keeping pace.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page