You are at : Search > Articles Search Results

Articles Search Results

479 Articles and 3 related Products found for transportation

Santa Fe Deploys Messoa Video for City Surveillance

Santa Fe Deploys Messoa Video for City Surveillance

Editor / Provider: Messoa | Updated: 11/29/2011 | Article type: Residential & Consumer

The city of Santa Fe is the 9th largest city in Argentina. Located near railroad terminals and ports, it is an important commercial and transportation center. Colonial buildings mixed with a bustling night life make Santa Fe a popular tourist destination. Santa Fe continues to grow and is getting more and more prosperous every day.

With a population of 450,000 and growing, city officials became concerned about security issues. The city was experiencing a growth in theft, vandalism and assault. One particular area of concern was downtown. Cameras were needed with the aim of enhancing security. They would have to be able to monitor the city live; including traffic control. Also, they would be used to track crimes and obtain video evidence. These cameras needed to be tough enough to withstand vandals and harsh conditions. Consequently, MESSOA was chosen as the preferred one in order to build a safer city environment.

One of the cameras chosen was speed dome security camera with low lux capabilities. A Sony CCD, 128X Wide Dynamic Range and Day/Night function with ICR ensures 24 hour monitoring in even the most difficult conditions. It uses a 36X optical motorized Sony zoom lens which allows it to capture details from long distances. Furthermore, high quality construction and a 750kg Vandal Proof and IP66/67 Weatherproof housing with heater and blower ensure that it works in all conditions.

The other camera was MESSOA IR camera. The camera is a security camera with IR LED and low lux capabilities. MESSOA Lumii II technology enhances sensitivity to deliver crisp images in even total darkness. It has 540 TVL resolution and a flexible 3.3-12mm IR-corrected varifocal DC Iris lens for different installation requirements. External focus controls make adjusting the varifocal lens simple. It is housed in a compact die-cast aluminum body with tempered glass, making it suitable for outdoor applications. A cable management bracket allows easy installation and maintenance.

The MESSOA dome camera is the ideal choice for the most challenging applications while the MESSOA IR camera is ideal for a wide range of indoor/outdoor video surveillance systems. The cameras were linked directly to the 911 system. Feeds from cameras on the street can be directly accessed by 911 dispatchers. Dispatchers can keep an eye on the crowds of shoppers and respond to emergencies within seconds. The cameras help gather evidence, improves response times and is a crime deterrent. They are fully operational and have demonstrated excellent functionality, performance and reliability.

Technology Trends: IP, Cloud and Intelligence

Technology Trends: IP, Cloud and Intelligence

Editor / Provider: a&s International | Updated: 11/23/2011 | Article type: Hot Topics

IP Fallout
IP offers tremendous benefits, but presents a high technology threshold to cross over. “The market is highly fragmented,” Holtenhoff said. “As the world moves to IT-fication, we're going to see shakeout.”

Scaling the IP learning curve can be lucrative but difficult. “Since the cost of entry to IP-based security is higher than it used to be with analog, there will be fewer players in the future as IP technology becomes more advanced,” Clocher said. “Only a few companies will be able to master this technology to the degree needed in the video security space.”

However, a steep learning curve for IP does not mean the security industry will wind up in the hands of a single company. "Our industry is specialist," said Charlie LeBlanc, President of Security Services for FrontierMEDEX, a US consultant.

"For a large company, it consolidates all that and reduces the ‘speciality' for efficiency. It's hard under one umbrella to be efficient and active with the client base."

More Than You Bargained For
The migration from analog to IP means security is no longer an isolated system but a business enabler. “What we learned in the past few years is people understand the value of IP-based solutions,” said Bill Stuntz, VP and GM of the Physical Security Business Unit for Cisco Systems. “You get information on the basic situation and better communication for first responders.”

As security goes IP, network administrators deal with more security management, introducing a new dynamic involving more stakeholders. “Over the next five years, the convergence of security and business operations management will in crease several-fold,” Koh said. “Business cost is increasing globally, and well -managed companies are on a constant lookout to improve processes.” The security platform, with a renewed focus on understanding more diverse customer needs and solving their business problems, will be key to achieving this.

More companies now extend the value of their offerings by addressing business efficiencies, not just security needs. When solutions not only improve security but also enhance the bottom line or business processes with concrete metrics, security proves itself to be a smart investment. The IP world operates on a larger scale, requiring a better handle on a wider range of organizational needs and “turf war.” “IP has greater benefits for multiple sites,” Stuntz said. “Those small sites will hold onto DVRs and stand-alone systems longer than large customers. The opportunity for growth is on the IT side.”

IP offers the ability to specialize through more data, for better management and know-how. “IP and integration have been around for a long time now, often used but never completely understood or embraced,” Hussain said. “Fortunately, time and money have been invested in creating systems that take the complexity out of integrations, allowing physical security information to be aggregated and managed. We see huge growth here in the next few years as organizations look to harness the power of these systems.”

Smarter integration promises to make security better. “The first set of the value proposition delivered to the customer is more effective security systems,” Stuntz said. “We can be tying the security systems into operations in a store. The same cameras used to protect the store at night could look at traffic or shoplifting patterns in the day. Customers can get multiple uses of the cameras, spread costs throughout department sand accelerate deployment.”

IP goes beyond securing an enterprise, producing a result that was not previously possible. “The same hardware, software and databases that comprise an access control system can be used in a manufacturing setting, for example, to integrate with plant automation systems in order to ensure that the right number of qualified personnel is logged in at assembly workstations,” McCaughey said. “IP makes this integration possible, achieving a new result that impacts the customer's bottom line.” Such business-security integration requires understanding customer operations and business requirements deeply.

Take retail. Management may be interested in understanding customer and employee behavior, or improving operational efficiency. “The key is minimizing the time and equipment on-site, while making it easy for a broader range of users to access the information they need on a range of devices — Web, mobile and so on — in a range of formats,” Brown said.

IP demand will grow in both the public and private sectors. “We see a decent shift from analog to IP-based security, and that's because, as SMBs and enterprises grow particularly in emerging markets, they realize the advantage of having safety and security based on IP as opposed to analog,” Kan said. “Governments are taking stringent measures to enhance security infrastructure. Additionally, large enterprises, transportation and educational institutions are investing in securing their premises from external threats.” [NextPage]

Technology Trends
As IP defines the future of security, technology developments are reshaped as well. PSIM, VCA and cloud-based services are three things that will influence the industry, if not the world.

PSIM as a term is relatively new, but has gained greater recognition in the past five years. Today, PSIM is in the early growth stage of its product life cycle, having passed through the development and market introduction stages but not yet reaching maturity, Hussain said.

Several criteria mark the early growth phase. First, increased sales have resulted in cost reduction from economies of scale. “Globally, the number of PSIM deployments have increased significantly over the last year,” Hussain said. “There are currently in excess of 400 deployments worldwide, and this number increases every week.”

Second, there is greater competition in this space. While not all solutions offer the same degree of integration, it reflects the market's need for true PSIM solutions, Hussain said.

Intelligent Video
The rise of HD imaging makes intelligent video all the more relevant. While more pixels may not necessarily make the algorithms more accurate, basic motion detection could significantly reduce storage costs by only recording in HD when something happens. If nothing occurs, the camera can record at a lower resolution.

VCA does not occur in a vacuum, as it requires some way to report an event. “Our view is that the algorithm is only half of the equation,” Holtenhoff said. “The ability to get benefit out of that is a VMS that leverages metadata.”

Analytics help make data more usable, processing information from cameras and storage. “What you have is a big warehouse of data, without the ability to search through the data or analyze it in real time,” Holtenhoff said. “It's like going to the library to find a book on Shakespeare, but there's no coding tool.”

Intelligent video is clearly a trend, enabling a camera to count people or monitor traffic. “You have one product, and if the processor is smart and flexible enough, you can generate multiple uses,” Clocher said. “One analogy is in the morning, I use my iPhone to listen to music, then call my customers when at the office, then in the evening my kids turn it into a gaming console. Finally, I use it to read my favorite newspaper. It's exactly the same for cameras. It can be for security; then you have an intelligent app in the camera. You can then differentiate and add features to the camera, thanks to software. This is what's happening today.”

The cloud concept is simple enough to understand, but devilishly tricky in the details. Present iterations are mostly private cloud offerings from vendors teaming up with alarmmonitoring companies for hosted video, access control or more holistic management solutions.

While there is palpable excitement, not everyone is convinced the cloud is the way to go. “Cloud and hosted services are OK for consumer business models, but not for professional ones,” Santambrogio said. Megapixel video over a wide-area network would not be practical, limiting use for enterprise users.

In his experience, customers prefer on-site storage for bandwidth and privacy reasons. “People don't like to store this kind of data in an unsecured data center,” Santambrogio said. In sensitive markets such as Italy, privacy would be the main argument against public cloud deployments.

The hype about cloud is offset by practical concerns. “Cloud is talked about, but the adoption rate is not as broad as people are saying,” Holtenhoff said. “There's a lot of pulp, but it hasn't delivered yet.”

While the kinks are being worked out, there is no denying that cloud deployments reduce upfront equipment cost. “We absolutely believe in a future with more video surveillance being delivered as a service based on a hosted model,” Mauritsson said. Axis will continue to roll out its hosted offering in more markets through partners.

CNL was among the first vendors to offer SaaS in 2004, which required a significant upfront investment in time and effort. “We still see them as an option for a large number of organizations, but this is still a real challenge for the enterprise-level solutions we are deploying through our channel partners today,” Hussain said. “There are no major technology barriers in the way, but how to operate, who will operate and how to deploy are still significant unknowns that need to be decided for this to become a reality.”

Honeywell has launched private cloud services in the U.S. through its various offerings. “Cloud is a technology trend for the central service model,” said Jerry Jia, Technology Director for APAC, Honeywell Security. “Every day, millions of events from customer panels go through the Honeywell private cloud.”

For Sielox, its hosted access control services have been a sustainable business model, especially for the company's business partners, said Karen Evans, President. Managed platforms eliminate the need for full-time IT professionals or investment in new hardware.

Cloud will figure prominently in the future. “A lot of excitement has been generated in the area of Web connectivity of field devices, such as sensors, based around the much discussed concept of the Internet of Things,” said Clemens Krebs, Head of Marketing Communications for Bosch Security Systems. Key standards bodies include the IP Smart Object Alliance and the Internet Engineering Task Force.

As the security industry shifts from explosive growth to a steadier pace, it is buoyed by companies committed to the long term. The recession proved that smart companies in step with customer needs and a continued R&D investment could help survive lean times. Security will also evolve into a business asset, creating lasting value. Overcoming the IP learning curve will be mandatory for success in the future, which in turn offers tremendous benefits. Convergence, change and customer service are the way forward for those willing to win.

Targeting Emerging Markets and Innovations

Targeting Emerging Markets and Innovations

Editor / Provider: The Editorial Team | Updated: 11/23/2011 | Article type: Hot Topics

Targeting Emerging Markets
The seemingly recovering yet shaky global economic conditions required security companies to tighten their belts. Top performers found success in emerging markets, and aimed to increase market presence in these regions through partnerships, acquisitions or new offices.

Assa Abloy saw 2 percent growth in EMEA in 2010, up from a -12 percent drop in 2009. The Americas division fell -2 percent due to the lack of new construction, which was better than its -19 percent slump in 2009. Asia Pacific saw strong growth in China, Korea, Australia and New Zealand at 14 percent growth, up from -1 percent in 2009.

Asia continues to be a growth powerhouse. For network camera leader Axis, its revenue breakdown by market in the Americas, EMEA and Asia were 47, 43 and 10 percent, respectively; growth by region was 26, 26 and 40 percent.

The ongoing shift in economic power towards emerging markets is a particularly important trend for Bosch. A new hub in China was established last year, adding to the existing 14 sales offices in this market with an additional 10 planned for this year. Bosch is also taking this strategy to increase market presence in other important emerging markets, such as Latin America.

RCG even restructured its board of directors and senior management to focus more on developing the Southeast Asia market.

Public Spending Steals the Show,Again
The biggest verticals in security are infrastructural assets that are exposed to an increasing number of risks, such as those from terrorist attacks.

This includes utilities, governmental buildings, public areas and transportation hubs. These verticals represent more than 50 percent of the total security market worldwide.

Infrastructure projects are key drivers for the high growth rates in emerging markets. This is most evident in the transportation and public safety segments, as shown by the Safe City initiative in China.

Renewed Focus on Customer Needs
Top performers continued to invest in product development, some even investing more. As the competition continues to heat up, companies are putting more effort into R&D to stay ahead of the game. New technologies and standards, as well as increased scrutiny from end users, can make or break a company if it just sits back and smiles.

Assa Abloy's product development focuses on increased customer value, aiming to improve cost-efficiency yet maintain higher quality and increase functionality. HID Global increased its activities in value analysis, which has led to significant cost savings in both the existing product range and the production of new products.

Companies offering high-end products began to cater to the midrange market, such as the new Honeywell SMB product line. These offerings increase cost-effectiveness. On the other hand, Hikvision expanded its offerings to be more comprehensive, including products that compete in the high-end market.

Hikvision recognized the dropping profit margins for low-cost DVRs, and did not invest significant capital in this space. Instead, it shifted its focus to complete end-to-end solutions. The strategy proved worthwhile, and it won them significant government projects in China.

Avigilon also provides an end-to-end video solution to customers, while each component in the system can also be sold separately. These components are versatile enough to be configured and deployed in many different applications. Avigilon also sells accessories to complement its system.

A common product platform with fewer, integrated components enables enhanced customer value and lower costs. It also raises the technology level of traditional products and offers customers higher security and better functionality.

Efficient product development with a strong customer focus is the strongest driver of organic growth. A complete solution gives customers a single point of accountability, ensuring confidence that their project will roll out smoothly with optimum performance and stability. Furthermore, customers are unwilling to invest heavily in security amidst economic uncertainties, which creates a demand for scalable systems with lower upfront costs.

Utilizing New Technologies
The proliferation of mobile devices and their ever expanding capability create opportunities to provide more value to customers, such as mobile phone payment systems, remote monitoring on smartphones and hotel access control solutions.

Mobotix introduced remote access control functions through integration with mobile devices. As companies struggle to balance cost and value, taking advantage of new technologies can be key for growth in a shaky economy.

Assa Abloy introduced RFID and wireless technology to hotel management, allowing guests to open door locks via contactless card soreven NFC-enabled mobile phones. While new hotel construction is slow, this new technology creates strong demand for retrofit systems.

RCG believes RFID technology can be utilized in various aspects of daily life, which creates numerous business opportunities. It is currently involved in an “Internet of Things” projects in Xiangyang, China.

Nedap Security Management also sees great potential in RFID technologies, as more applications rely on it. Accurate reading of RFID tags is more important than ever, and Nedap invested heavily to develop a new generation of RFID readers that allow RFID tags to be accurately read in even the most difficult conditions.

As Jerry Maguire so eloquently put it in the 1996 film, “Help me, help you.” This is probably how customers today feel. With the economic downturn, customers began to reevaluate their options to get the most bang for their buck. In shaky economic conditions, customers would rather spend on a great product that provides true value and scalability, rather than one that merely gets the job done for the time being.

An investment in security itself may be hard to justify, as the perceived threat is generally not as evident in the commercial world. However, vendors have seen success in providing for targeted markets specific solutions that also integrate into business operations.

The bottom line is that customers who have the resources are willing to spend when it makes sense. Vendors must realize that customer demand is more important than anything, and a gazillion new features do not amount to anything when the customers do not need them. Simple as it may sound, listening to the customer is something many companies find difficult to do.

In addition, factors like industry standards are reshaping and redefining the security industry in the form of convergence and consolidation. In the coming years, the company that can provide a truly integrated solution will rise above the competition, regardless of economic conditions.

New and different approaches and business models are emerging. More so than ever before, companies need to adapt and adopt effective methods that reduce costs, increase productivity and improved core competencies.

American Long-Haul Trucking Facility Deploys Avigilon Video Management for Staff Safety

American Long-Haul Trucking Facility Deploys Avigilon Video Management for Staff Safety

Editor / Provider: Avigilon | Updated: 11/17/2011 | Article type: Commercial Markets

Xpress Cargo staff seamlessly manages the Avigilon high-definition surveillance system using the Avigilon Control Center network video management software (NVMS) with High-Definition Stream Management (HDSM) technology. The commercial trucking company installed Avigilon HD cameras ranging from 1 MP to 8 MP to monitor activity at its main entrances and exits both inside and out, along with all major traffic areas to ensure maximum protection. Additional Avigilon HD cameras were installed in the parking lot to protect docked trailers and trucks from theft and damage, while several Avigilon HD dome cameras provide complete coverage of the warehouse. An Avigilon HD dome camera monitors the company's repair shop and outside employee lounge area. The company also added audio recording functionality in the dispatch office, repair shop, and drivers lounge area for added safety. Storing two weeks of continuous surveillance video, the Avigilon high-definition surveillance system is monitored live around the clock.

By installing Avigilon HD dome cameras, Xpress Cargo was able to achieve greater coverage with fewer cameras and lower installation costs. With indisputable evidence in hand, the company has also been able to reduce liability costs by 15 percent. The Avigilon high-definition surveillance system provides complete oversight of all trucks being loaded to ensure the proper handling of client goods and to confirm that safety and freight handling requirements are being met, helping to boost overall operational efficiencies. In addition, Xpress Cargo employees now enjoy a heightened sense of security while on the job.

With a fleet of more than 150 trucks, 700 trailers, and 25 years in the business, Indiana-based Xpress Cargo offers consolidated freight and expedited transportation services across the United States. Specializing in team transportation of dry goods, refrigerated goods, and specialty freight, Xpress Cargo manages up to 375 trucks on the road at any given time, traveling from coast to coast. To protect its valuable assets, facilitate cargo management, and maintain employee safety, Xpress Cargo has deployed the Avigilon high-definition surveillance system at its 20,000 square foot

Industrial Facilities Adopting Advanced Security for Efficiency Gains

Industrial Facilities Adopting Advanced Security for Efficiency Gains

Editor / Provider: a&s International | Updated: 11/15/2011 | Article type: Commercial Markets

The industrial sector was negatively impacted by the economic downturn due to lower consumer spending. Production of automobiles and primary metals dropped 30 percent or more during the recession. The early 2011 earthquake in Japan was no help, as it caused shortages of critical components in various sectors.

These crises emphasize the need of facility managers to have more efficient management practices, which are enabled through the marriage of automation and security. This approach makes for a safer and more productive work environment, yet also has significant cost-saving benefits .

China has the strongest growth in industrial estate development, with fast growth also witnessed in neighboring India and Vietnam. Singapore and Malaysia are also having a healthy number of industrial estate developments, said Patrick Lim, Director of Sales and Marketing for Ademco Far East. “The key difference in most of the current industrial estates is the usage, and thus the value, of the development. There is a shift of focus to higher value use for these industrial estates.”

“We are seeing a 30- to 40-percent increase in security spending in these new industrial estates,” Lim continued. “However, compared to the older industries, the new types of businesses occupying these spaces are in high-tech manufacturing, R&D, energy and high-value services; which are much higher in value.”

Gone are the dirty and messy impressions of these developments, Lim said. “The new industrial estates are built for high-value businesses. Thus the emphasis is on good security and technology to add value to their business.”

Entering the Perimeter
Starting from the very outer rim of an industrial plant, there are several considerations for site access. It depends on whether the site is closed or open. “Closed sites have perimeter fencing that protects the entire site and its estates. The site could also be open, in which case the site can be freely walked around and physical protection is not present until you get to the building,” said Ian Hodgson, Regional MD for North U.K., ADT Fire and Security. “However, both types share similarities in how a design is secured. The design has to be based on two things, pedestrian access and vehicular access, which are approached separately.”

For vehicular access, there are generally several groups. There are the staff members who work in the facility, visitors driving to the site, people in the supply chain bringing in raw materials and, finally, people dispatching the finished goods.

An increasing number of sites are beginning to adopt ALPR to automate vehicular access, Hodgson said. “They can discern which group the vehicle belongs to. The security system grants access rights according to that information and, using information display systems, guide the vehicle to areas within the site. This helps automate traffic control and directional control, reducing the need for human resources.”

For example, there could be an external gate which grants access according to information obtained by the ALPR system. Information boards guide drivers through the most direct route to their destination. There could also be other gates and barriers along the way, which are opened according to the access rights of the vehicle.

Video surveillance that utilizes intelligence is used to monitor workflow and the direction in which people are walking around the site.

“When anomalies occur, there might be a reason to investigate,” Hodgson said. This reduces the number of guards needed to patrol the site. [NextPage]

Granting Access
Heading into the building itself, access to the building is allowed or denied based on a person's credentials. The greatest demands for access control solutions lie in time and attendance management, entry and exit control, and parking facility monitoring, said Jiangong Ding, Industry Director for Hikvision Digital Technology.

Access solution requirements can include almost every variety of readers and credentials on the market, said Kevin McCaughey, VP of Security Solutions, Buildings Business, Schneider Electric. “Specific use cases spell out which readers or credentials are required in a given circumstance.”

The type of access control used within the facility depends on the aperture, Hodgson said. “It depends on whether it's a person or vehicle, for internal or external access, whether access needs to be both ways, person-by- person, or can have many people move through at once.” For example, pedestrian access to the site may be limited by swipe cards and turnstiles, which allows the system to know if a person is on- or off-site. Closer to the building itself, there might be a simple door lock mechanism or another form of turnstile to restrict access to one person at a time. It all depends on the usage of the building.

In addition, more users are migrating towards biometric readers as they become more affordable and reliable. “Tokens can be shared among staff members, while biometric data is much more difficult to pass around,” Hodgson said. “Some clients require biometrics to create a foolproof security system.” While video verification coupled with access control tokens help in this regard, it is a more expensive solution.

The two most common biometric readers in industrial settings are fingerprint and retinal. “Facial recognition is currently still on the more expensive side of biometrics, as it involves a larger area of view using video and other technologies and a database for lookups and comparisons,” Hodgson continued.

“From an affordability perspective, fingerprint readers are preferred. However, technology is constantly changing and improving, and access control solutions that contain data and images of users can be related to by video systems. There are some entrylevel systems of that nature, but that technology is still quite embryonic.”

Furthermore, there is an increased demand for centrally managed access control systems. "In particular, customers who need to control several sites rather than just the one building require a multisite solution that can be distributed geographically and at the same time can be centrally monitored and administered,” said Markus Niederberger, Head of Marketing Support for Fire Safety and Security, Siemens Building Technologies.

Some customers require a fully centralized system management. “Others prefer a mix of centralized and distributed management,” Niederberger said. “Typically, these customers also require system redundancy, a next-to-zeroapplication downtime, the ability to interface to legacy components as well as the integration with their IT and HR systems to optimize the business workflows.” [NextPage]

Keeping an Eye on Processes
The use of video cameras on the production line enables real-time monitoring of the entire production process, Ding said. “It is also possible now to monitor staff members for performance, as well as compliance to regulations and company policy. When something goes wrong, the manager can remotely instruct or alert staff members to ensure problems are resolved quickly.”

Furthermore, video surveillance allows a single person to monitor several locations without having to be physically present, whereas in the past, one supervisor was needed to watch each location, Ding said. This drastically reduces the manpower needed for specialized tasks.

Machine Vision
Machine vision cameras can also be utilized to monitor the production line for quality issues. There are two differences between security cameras and machine vision cameras, said Hardy Mehl, Director of IP Business for Basler. “For machine vision, there is a very controlled environment, which means there is stable lighting and the camera looks at very defined objects. The camera or video system does not have to work in challenging light conditions. This is a big difference from the security world, where you always have the sun coming up or shades or reflections, so security cameras are more optimized to changing, dynamic environments.” The other is compression, as all network cameras use compression algorithm such as M-JPEG or H.264. “Typically in the industrial automation world, raw data is transmitted,” Mehl said. “This is a big difference that has implications on which interface to use between the camera and the PC. In the industrial world, you need much higher bandwidth since the data is not compressed. The computer is looking at the image, and you need the absolute best quality in terms of signal-to-noise ratio to calculate and get every little detail.”

Security cameras are different, as every detail is not essential or practical. “You need high-resolution, but typically you need compressed images that are just good enough, and you need lower bandwidth because you store for a long time,” Mehl said. “In the industrial environment, you don't transmit live streams, but rather you shoot images. You make snapshots and you transmit the snapshots in very high frequencies.” The two types of cameras are not interchangeable in most cases, but due to the technological development and market development, there are some applications that overlap. “The performance of network cameras, in some cases, is good enough for industrial purposes,” Mehl said. “For example, they are cheaper or give an advantage. However, in most cases, there are really two different demands on the customer side.”

Bringing Disparate Systems Together
One clear management level trend regarding access control, and security in general, involves manufacturers taking a holistic approach to access control technology, processes and policies to protect their most essential operations. “The need for a global approach is driven by the high level of acquisition activity among manufacturers over the last 10 years and the rise in risk and threat levels these companies face,” McCaughey said. “From a security perspective, acquiring companies also means acquiring their security infrastructure, policies and their risk profile. As the chief security officer, anything more than one security infrastructure and set of security operating policies and processes builds inherent risk into your business. There is more to manage and more potential holes in your security perimeter.”

Adding Video to Access Control
Integrating access control, security management systems and video surveillance creates significant efficiency gains in industrial and manufacturing environments, said Aaron Kuzmeskus, Director of Security Channel Development, Buildings Business, Schneider Electric.

For example, access cards used in combination with visual verification of the cardholder enable quicker throughput of workers without requiring someone to check ID badges, Niederberger said. “This is applicable at the security perimeter of a plant and within the plant itself.”

Video surveillance enables security operations to have eyes on an event, even when they are not physically present. This manifests itself in two ways, Kuzmeskus said. “One is the ability to assess quicker an alarm event or situation, and a safer manner of assessment in areas where dangerous substances or machinery be may be in use.”

Secondarily, video verification at access points can lessen the financial burden of stationing guards at sensitive entry or egress portals or to physically verify that credentials are being used properly, Kuzmeskus continued. While biometrics provides good identification, it can be problematic in areas that require personal protective equipment, such as gloves and face shields.

Integration between access control and video enhances productivity, as it can corroborate staff access records with video footage. A common example of poor productivity is staffers taking frequent smoke breaks while claiming to be carrying out other tasks, Lim said. “Another example I came across is for a sterilization room, where a customer had utilized our system to control. According to company policy, the time needed for staff to be sterilized prior to entering a clean room environment. However, some staff members deliberately shortened their sterilization period. As the staff are all wearing suits, without both records for exit access and video information, it would be difficult to determine which staff members violated company policy.” [NextPage]

Adding Video to Perimeter Protection
Video aids perimeter protection systems in several ways. “Overt video surveillance cameras present an aura of security by deterring potential intruders intent on gaining unauthorized entry to a facility,as they will be aware their actions are being observed and potentially recorded,” Kuzmeskus said.

In addition, thermal cameras can be used to supplement perimeter fences, requiring less cameras yet reducing the number of false positives. With a thermal camera you are able to reach longer distances, reducing the need to place standard cameras on the fence itself, said Ron Petrie, Director of Sales for Vumii. "Thermal imaging provides supplemental support for the security system, covering locations that do not have adequate lighting."

Using the philosophy of “deter, detect, delay, respond,” overt video surveillance cameras present an aura of security, whereas a site without dense surveillance coverage would be an easier target. “This can be leveraged further as a detection method with the addition of simple analytics. A video trip-wire can establish a virtual perimeter beyond a physical fence of property line, creating a greater setback distance, and increasing the available time to respond to a pending event,” Kuzmeskus said. “Video is another key enabler of virtual guard tours, allowing for fewer roving guards, quicker tour times and reduced guard fatigue.”

Cameras with video analytics deployed for perimeter protection solutions can help deter and provide early detection of some potential security breaches, agreed Gary Tan, APAC Head of Systems Solution Group, Bosch Security Systems. “This would reduce or do away the needs for physical patrolling around the perimeter. Depending on the site condition, one common application includes virtual perimeter lines or areas crossing covering a wide geographical area for early detection.”

For some large sites, it is too expensive and inefficient to deploy a great deal of manpower to protect the premises. Thus a good perimeter protection system, combining fence intrusion detection and intelligent video systems, is useful to supplement manpower. More importantly, it is proven that humans are not good at maintaining concentration for prolonged periods of time, Lim said. “We have had a bad experience with a public transport operator who simply refused to employ better systems to protect their transportation depots,” Lim said. “Eventually, disaster struck. Intruders breached their perimeter and vandalized their transport, resulting in public outcry and much embarrassment to the company.”

With VCA built into the cameras, fewer patrols are needed. “The verification of the alarm or event could be assessed and remotely evaluated first without the need to dispatch security personnel,” Tan said. “This increases productivity per staff member and lowers reliance on manpower.”

Perimeter protection and video analytic systems are also especially helpful for remote locations where there is no real need for manpower, Lim said. “One of the services that we provide is to remotely manage access and verify activities with video for customers with remote locations. However in most cases, it is usually a combination of manpower, systems and remote services. By reducing the high dependence on labor, this manpower can be diverted to engage more meaningful tasks. Contrary to the many unfounded fears, this will not lead to fewer jobs, but more meaningful careers.” [NextPage]

Customers Watching Too Much TV
Customers are often introduced to advanced systems through Hollywood productions. This raises their expectations of what a security system can provide.

Some clients ask for fully automated systems, wishing to completely eliminate human factors. “This is not practical with the current level of technology,” Ding said. “Any system will need a management platform that requires humans to maintain and operate. While a security system can greatly reduce a facility's reliance on manpower, humans cannot be entirely replaced.”

Some customers do not understand that manpower is still needed to manage alarms and to evaluate the response; access control and video can only tell you something happened, said Mo Hess, Director, Business Development, Global Security, Buildings Business, Schneider Electric. Another common request is for the ability to control and track who enters the site while not impacting the throughput of people, said.

“However, this would conflict with the initial goal of preventing multiple entries using one card,” Hess said.

“We always try to educate the customers so they can understand the solutions and technologies proposed,” Lim said. “If the customers simply refuse to adopt a more realistic expectation, then we will have to walk away from the business.”

The effects of television shows like “CSI” give users the impression that access control and video can track someone's movements inside a facility with time stamping of the movement, Hess said. “With video, the impression is that you can blow up an image and it will not be pixelated. Also, the ability of ‘facial recognition' to identify individuals is just not there yet.”

Furthermore, because so many add-on products claim to be “plug and play,” customers do not always understand that software changes could still be required in their security system, Hess continued.

Getting the Best Results
The best results are achieved when the consultant or specifier works hand-in-hand with the integrator during both the design process and the deployment to ensure a seamless transformation from the prior system to the new system — one that functions as needed and performs as expected, Kuzmeskus said. Each contributes their expertise: the consultant often has better knowledge of the customer's business objectives, while the integrator generally knows more about the capabilities of the specified components.

Most cases involve some degree of customization to an existing solution. For example, camera positioning often needs to be optimized for the best point of view, Kuzmeskus said. “In addition, dramatic improvements in video quality can lead to camera upgrade requirements. In other cases, a facility may have a perimeter that is adjacent to inaccessible or dangerous terrain, such as a refinery bordering a swamp area containing alligators and poisonous snakes. PTZ or thermal imaging cameras can augment the existing video systems to reduce the number times a guard enters that environment to assess an alarm, or in many cases, remove that dangerous area from a physical guard tour and transition it to a video guard tour.”

The integration between automation and security is always a dilemma, Lim said. “Unless there are real benefits in cost savings or functionality improvements, the integration tends to be cosmetic only.” The next part of our coverage explores efficiency gains enabled by the integration of automation and security.

ImageWare Systems and GCR Partner for Biometric Identity Systems in Airports

ImageWare Systems and GCR Partner for Biometric Identity Systems in Airports

Editor / Provider: ImageWare Systems | Updated: 11/9/2011 | Article type: Infrastructure

ImageWare Systems, a leading developer of identity management solutions providing biometric, secure credential and law enforcement technologies, has teamed with GCR & Associates, to provide secure biometric identity solutions to the U.S. Transportation Industry.

Many airports are contemplating major technological upgrades to the security and credentialing capabilities of their facilities and the GCR/ImageWare team has been created specifically to address this requirement. The companies are currently collaborating on several identified aviation projects.

“We have selected ImageWare for this most strategic venture because of its extensive history and capability in developing and implementing biometric identity management products and technologies,” says Phillip Brodt, VP of GCR. “The combination of the unique and specialized core patented technologies provided by IWS when coupled with GCR's total system development capabilities make our team the leader in this market segment.”

"ImageWare is delighted to be working with GCR, a company with a high level of expertise and experience within the aviation sector,” says Chuck AuBuchon, VP of Business Development for ImageWare. “GCR has been developing and integrating solutions for its airport clients for several decades. We are presently finalizing the contract for our first joint project and look forward to announcing the details as soon as they are completed.”

Infinova Cameras Watch Over Metro Line in Chongqing, China

Infinova Cameras Watch Over Metro Line in Chongqing, China

Editor / Provider: Infinova | Updated: 10/27/2011 | Article type: Infrastructure

Infinova announced that, with the opening of the first phase of a new metro line in Chongqing (southwest China), 750 Infinova fixed cameras and 40 Infinova dome cameras will be covering the 37 km (23 mile) Chongqing Metro Line 1 which includes a grand total of 23 stations. The first section was completed in July (2011) and the second phase completes next year.

“Considering that metro security is considered a main requisite of the Chinese transportation system, the metro authority chose Infinova because of our worldwide experience in providing such solutions, including the 1000-plus camera system that covers the Shanghai metro system in China,” explains Mark S. Wilson, Infinova VP of Marketing. “We also have similar systems in countries from Turkey to the United States.”

In Chongqing, cameras are located at the platforms, station centers and inside the train cars. Both the entrances and exits of metro stations have fixed cameras, each capable of viewing a person from the front as they enter a ticket-check station. In each of the metro halls, an integrated high-speed dome camera surveys the entire facility. Secluded corners also have additional fixed cameras so that these areas are not out of sight to the surveillance system.

Cameras are also on the platforms to give rail system administrators an overview of passenger flow. As a result, the system can monitor passengers entering and leaving the station centers and the cars to prevent and detect crimes, including potential terrorism and kidnapping.

Memoori: Growth in Physical Security Can Only Come Through Innovation and New Technology

Memoori: Growth in Physical Security Can Only Come Through Innovation and New Technology

Editor / Provider: Submitted by Memoori Business Intelligence | Updated: 10/27/2011 | Article type: Hot Topics

Memoori's third annual report The Physical Security Business in 2011 shows that growth in this market can only come about during the next 3 years from a stream of more innovative products and systems that deliver on meeting the customers need to drive more ROI out of its investment.

Physical security needs to move, as far as is possible, from a cost centre to a profit centre status, if it's to overcome the anticipated aftershock from the 2008 financial meltdown which now looks inevitable.

This will dampen future demand but we are optimistic that as it can now deliver more attractive opportunities for clients to improve security and profit from it, demand will edge forward at a CAGR of 3.7 percent over the next 5 year period.

The report identifies 5 emerging technologies that are already creating new business opportunities and also discusses advances in their development that will further impact on the business in the future. The former include:

 Wireless Technology.

 IP Networking Technology.

 Video Surveillance as a Service (VSaaS) and Managed Video.

 Video Management and Analytics Software.

 Security Management Software, PSIM and PIAM.

They all have one thing in common and that is they improve productivity and help edge security systems move towards profit centre status and in some cases reduce the cost of installation.

Wireless technology is now getting traction with the highest penetration of wireless communication being in commercial and transportation verticals whilst banking & finance are still concerned that these security systems can be breached. Education and Health buildings look to be the next growth markets. The main drivers for the emergence of the wireless culture, staying mobile, reducing investment cost and improving productivity has got estate managers leveraging wireless throughout their organizations.

IP Network products whether for access control, intruder alarms but particularly for video surveillance grew rapidly in 2011 and they are believed to be on the verge of a long and strong run.

Falling IP prices together with much easier to install products and improved performance have all conspired to increase the Return On Investment (ROI) and total cost of ownership of this fast growing technology.

MSaaS & VSaaS is becoming an attractive solution to the physical security industry for it delivers a lower point cost, because providers can host multiple customers on a shared infrastructure. The Cloud economies of scale and flexibility also offer both the user and supplier a better deal. The prevalence of broadband along with 3G and 4G connections is making video accessibility easier than ever.

Video Analytics is the segment of the market that appears to be the laggard. In 2010 there was a distinct lack of new products coming to market. This year looks more promising with expectations of more developments. It remains to be seen if the patience of the investors will continue long enough for them to succeed and / or if a new generation of companies enter the fray.

In the last 18 months there has been a rapid rise in demand for both Physical Security Information Management, (PSIM), and Physical Identity and Access Management, (PIAM), systems.

Both are examples of emerging software solutions that are designed to remove inefficiency and manual process within security operations. Physical Identity and Access Management (PIAM) enable common policy, workflow, approval, compliance automation and life cycle management of the identity / badge holder across disparate physical security systems.

PIAM solutions offer operational cost reductions that can be delivered through this platform providing a bridge between the disparate systems without stripping out and starting again. PIAM is currently getting a lot of exposure. We are now seeing the emergence of PIAM to join together with PSIM to drive strategic and operational value for physical security departments in large operations. All of these technologies embrace a wide divergence of skills and expertise and clearly it will require large research and development budgets to take them forward. It is unlikely that any one company in the security industry will master them all. The traditional market leader's shares have stagnated and the average share is less than 10 percent. Financing these developments will not in the short term improve their competitive positioning. However they have the cash to buy this expertise through acquiring companies; but seem reluctant to take the initiative at this time.

Down Under? No, Up Above!

Down Under? No, Up Above!

Editor / Provider: Hayden Hsu | Updated: 10/27/2011 | Article type: Hot Topics

While mature markets like the U.S. and Europe are bracing for a possible second dip due to long-term debt imbalances, Australia's export and economic figures are looking particularly ripe among growth markets worldwide. Security is in for a treat, as the country continues to upgrade its network infrastructure and beef up its protective mechanisms and measures.

Australia is the world's 13th largest economy, with a GDP of US$1.3 trillion. GDP grew by 2.7 percent over 2010; it is forecast to grow more than 4 percent in 2011. According to US Commercial Service, Australia's per-capita GDP of $60,000 is among the highest in the world.

Since 9/11, the Australian federal government has committed more than $4 billion to counter terrorism. Current priorities for upgrading security include border protection, airport security, port security,critical infrastructure protection, mining facilities, street safety (city surveillance), health care and educational institutes, as well as new commercial and residential establishments.

The Dollar and NBN
To thrive in the Australian security market, two things should be kept in mind: the Australian dollar and the national broadband network (NBN).

Australia has a large services sector (80 percent of GDP), but is also a significant exporter of natural resources, energy and food. Australia's abundant and diverse natural resources attract high levels of foreign investment and include extensive reserves of coal, iron ore, copper, gold, natural gas, uranium and renewable energy resources. A series of major investments, such as the $25-billion Wheatstone project and the $43-billion Gorgon project, both led by Chevron, have significantly expanded the resources sector, according to US Commercial Service.

Asian demand for minerals, metals and energy resources has been an engine for growth nationally. With many mining sites in the state of Queensland (the country's largest coal-exporting state) suffering temporary production delays due to the January floods, liquefied natural gas (LNG) projects are moving forward, such as the contract signed between Australia and China to supply China with LNG for the next 20 years.

The result is a higher-than-ever Australian dollar, pushing many local end users of high-end technology to go for only the best of breed at much more affordable price points. Physical, commercial security is no exception.

Another buzzword is the NBN. The NBN is a wholesale-only, open-access data network initiative. A trial rollout of the fiber-to-the-premises (FTTP) network began in Tasmania in July 2010. The FTTP rollout is planned to reach approximately 93 percent of the population by June 2021. Construction of a fixed wireless network is planned to begin in 2011, delivering its first services in 2012 and to be completed by 2015; two satellites will also be launched by 2015, with an interim agreement with Optus and IPStar to provide satellite services to some customers from July 2011. The network will gradually replace the copper network, owned by Telstra and currently used for most telephony and data services. As part of an agreement with the NBN company, Telstra will move its customers to the NBN and lease access to its exchange space and extensive network ducting to assist in the rollout.

This nationwide broadband initiative is very well-received by security solution providers, as most transmission and streaming headaches with IP-based systems will be alleviated. It could also help yield more business opportunities and open up possibilities for different business models

Market Potential
According to the Australian Security Industry Association, expenditure on security hardware and software (video surveillance, access control and intrusion alarms) in 2007 amounted to $690 million. For this year, consensus was that recovery has been rampant, but the overall projected market size is still shy of the 2007 peak, only at roughly $450 to 500 million.

Distributor Pacific Communications estimated that the Australian video surveillance market could be worth $150 to $170 million this year. “We're seeing a lot of demand from street surveillance, transportation, mining, health care and education,” said Rob Rosa, National Sales Manager. “We, therefore, need proper product coverage with a good cross-section range as the largest distributor in Australia and New Zealand.”

Bosch Security Systems' projections for video surveillance were higher at $200 to $230 million. “Leads are mostly from mining, defense, commercial and street surveillance,” said Sean Borg, National Video Systems Manager.

For Sony Corporation, more than 90 percent of new tenders opt for IP-based systems. “People's understanding is improving, from pure cost considerations to picture quality and accessibility,” said Steve Charles, Sales and Marketing Manager for Security Solutions, Australia and New Zealand. “For my region, the video surveillance market is estimated to be worth $220 million, with IP sales expected to outweigh analog by 2015. Confidence in IP has increased noticeably.”

In terms of growth , Axis Communications is seeing 40 to 70 percent, depending on market segments. “While the overall market size here in Australia is not the biggest in the region, it does generate the most revenue for us,” said Oh-Tee Lee, Regional Director of South APAC. “Five years ago, some installers and integrators wouldn't listen and were scared to change (to IP). It's not that case any more. We now focus our education efforts on the building blocks of IP-based video (beyond cameras), such as storage and capable channel partners.”

For Lan 1, key market segments include government buildings and departments, residential buildings and retail outlets. “Education is good as well, but a bit slower; you get one or two projects from universities per year, and then a few smaller but ongoing projects from K-12,” said Basil Delimitros, Project Manager of IP Video and Access Control.

In physical access control and intrusion detection, a similar transition to IP can be seen as well, thanks to the NBN. “More hybrid converters and wireless transmitters are being demanded,” said Brett Lancaster, Sales and Technical Support for Security Distributors Australia. “While average prices are coming down, support and warranties are getting more comprehensive; now, you can see products with 10-year warranties and iPhone support very easily.” [NextPage]

Solution Requirements
While IP is gaining a lot of attention, analog is not “dying” anytime soon, Rosa said. “In terms of sales, analog and IP are about 70 versus 30; we are still seeing good growth on analog products. For bigger projects that require more than 100 cameras, IP gets specified, but it still depends on project type and available infrastructure.”

For existing establishments that require replacements or upgrades, local consultants and end users prefer devices or systems with hybrid capabilities that allow existing analog infrastructure to transmit signals over IP networks. “It is a strong selling bonus,” Charles said. “We tripled our sales in the first quarter over the same period last year, and we continue to work with more IT-level system integrators to service the entire spectrum of the market.”

To Borg, Australia is indeed in dire need of better IT and IP infrastructure. “While the economics around the NBN don't make much sense, we can definitely use newer, more reliable networks.” Analog technology is still robust, though. “A lot of system integrators, consultants and real-estate developers still ask for analog products, so we are still seeing singledigit growth; overall, sales figures split between analog and IP at 50/50.”

Started as an IT specialist 18 years ago, Lan 1 provides advice and support on network infrastructure. “Australia is a tech-savvy country, and growth in IP has accelerated for the last two to three years. With dollar appreciation and a number of budget offerings, users are enjoying 20- to 30-percent discounts (if not more), getting the biggest bang for their dollar,” Delimitros said. And more training is available today, further lowering t h e market's entry barrier.

For EOS Australia, the smartphone market is a good indicator. “We were a late adopter of smart cellphones, but look where we are today,” said Jeff Perrey, National Sales Manager. “The same goes for IP-based security systems; we are now seeing more organizations running multiple networks in parallel to support bandwidth requirements. The market is about solutions, not single products; Australians will use it if it is a robust, easy and open solution. It is a growth market beyond what people realize.”

Channel Challenges
With greater IP capabilities come both opportunities and challenges. While easier access and mobility are granted, the initial installation, integration and configuration can be very complicated, at least for the traditionally analog channel community in security. “Education is critical,” Rosa said. “It's our job to help the marketplace understand how to better leverage added benefits from IP-based systems. Product features and system limitations should also be made clearer.”

Keeping up with market growth and momentum is also a concern for Lan 1. For example, a number of Tier-1 suppliers are reevaluating and looking for more IT/IP-savvy distribution, installation and integration partners. “Aside from infrastructure shortcomings, we also need to think about our location. We live in isolation here, and not all manufacturers have local representation and support. So, we take device and system reliability very seriously, and we need more partners to help deliver that consistently,” Delimitros said.

Altech Computers, an IT distributor carrying brands such as Vivotek and GeoVision, has had similar observations. “The market has turned 180 in one to two years,” said Adam Storo, Surveillance Manager. “We need to keep up with different demands and requirements from various verticals, such as government, transportation, education, residential and SMBs. Having an IT background is, therefore, a massive advantage. With technology rapidly changing, it does take delivering functional hardware, software, solutions and services to a whole new level.” And “converting” integrators and installers and making them grow with you are no small feat.

Another IT distributor, ACA Pacific, deems end users having fully functional IP networks as the biggest challenge. “It's a slow process, as is training,” said Henry Patishman, Sales Manager. “On top of that, everyone wants control within an organization.” As a result, channel partners have to take it upon themselves to demonstrate to their end users that having open APIs and interfaces does not mean giving up departmental turf.

The IT cusp and bubble a decade ago could serve as a good reminder and lesson. “Support, beyond warranties, is critical. When faced with market pressure and ‘leveling' of real value and prices, we need to think about real-life implementations and implications,” Perrey said. “Our biggest challenge is having futureproofed solutions and partners.” [NextPage]

Up Above!
Depending on whom one talks to, the Australian security market has experienced growth between 5 to 70 percent over the last year or so. Political and financial brouhaha aside, the fruition of the NBN will level the playing field for many, catapulting Australia into a new digital age. From one camera or entry point to thousands of cameras, doors or detectors, the market will need to be serviced by professionals of different calibers. “Just like the Internet provided new access to trade, the NBN will enable service providers to cover all corners of the country with the same level of quality and efficiency,” said Kobi Ben-Shabat, MD of Open Platform Systems. “The direction and future of physical security have also been redefined. Being able to provide open but unified platforms and effectively manage explosive growth will be one of the defining factors of any business' success.”

Are you ready to move up or down?

Gemalto Select Keil Tools for ARM Processor-based Smartcard Development

Gemalto Select Keil Tools for ARM Processor-based Smartcard Development

Editor / Provider: ARM | Updated: 10/13/2011 | Article type: Component

Keil MDK-ARM development environment has been selected by Gemalto as the toolchain for all its ARM processor-based smartcard development.

"Software development for smartcards requires advanced tools from partners, such as ARM, that provide an environment above and beyond that of standard tool chains," said Frederic Vasnier, SVP Telecom, product delivery & support, Gemalto. "Keil MDK is the right product to enable Gemalto to successfully write, verify, and deploy demanding applications." "We are very pleased to be working so closely with Gemalto," said John Cornish, Executive VP System Design Division, ARM. "Keil tools have a long history of supporting sensitive applications, such as smartcards. This latest agreement with Gemalto endorses our focus and commitment to this area of the market."

The Keil MDK-ARM has been specifically tailored to meet the stringent demands of software development on ARM SecurCore devices, such as the SC300 processor. MDK features the ARM Compilation tools, the μVision IDE/debugger and advanced simulation models of ARM SecureCore processors, which enables Gemalto to more easily develop and verify secure applications. Keil products from ARM include C/C++ compilers, debuggers, integrated environments, RTOS, simulation models, and evaluation boards for ARM, Cortex-M, Cortex-R4, 8051, C166, and 251 processor families.

When: Effective immediately

Where: Global agreement for use in Gemalto's 13 design centres in EMEA, Asia, Latin America and North America.

Who: Gemalto (Euronext NL0000400653 GTO) is the world leader in digital security with 2010 annual revenues of €1.9 billion and over 10,000 employees operating out of 87 offices and 13 Research & Development centers in 45 countries.

Gemalto is at the heart of our evolving digital society. Billions of people worldwide increasingly want the freedom to communicate, travel, shop, bank, entertain, and work—anytime, anywhere, in ways that are convenient, enjoyable and secure. Gemalto delivers on the growing demands for personal mobile services, identity protection, payment security, authenticated online services, cloud computing access, modern transportation, e-healthcare and e-government services. Gemalto does this by providing secure software, a wide range of secure personal devices, and managed services to wireless operators, banks, enterprises and government agencies.

First Page< Prev< | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 >Next >Last Page