In Security August 2014

52
THE MAGAZINE WITH THE INSIDE STORY ON SECURITY ISSUE 16 AUGUST 2014 08 INDUSTRY NEWS 32 VIDEO SURVEILLANCE Latest developments in the industry 20 WORLD CUP WINNERS Visualization solutions during the FIFA World Cup An interview with Dieter Dallmeier 40 TECHNOLOGY & TEAMWORK A mix of people and technology improves business security FLIR THERMAL TRUMPS OTHER TECHNOLOGIES ONE CAMERA SHOW

description

The magazine with the inside story on security

Transcript of In Security August 2014

Page 1: In Security August 2014

The magazine wiTh The inside sTory on securiTy

issue 16 August 2014

08 INDUSTRY NEWS 32 VIDEo SURVEIllaNcE

latest developments in the industry

20 WoRlD cUp WINNERS

Visualization solutions during the FIFa World cup

an interview with Dieter Dallmeier

40 TEchNologY & TEamWoRk

a mix of people and technology improves business security

FlIR ThERmal TRUmpS oThER TEchNologIES

oNE camERa ShoW

Page 2: In Security August 2014

FC_Series S EN 210x297.indd 1 14/04/14 16:31

Page 3: In Security August 2014

Editor Chris Hewett

Advertising +44 (0)1622 201207 [email protected]

Accounts Jay Kempisty +44 (0)1622 201207 [email protected]

Publisher Wayne Banks +44 (0)1622 201207 [email protected]

Designer Mark Fisher [email protected]

Published by MEB Media Limited 13 Princes Street Maidstone Kent ME14 1UR United Kingdom Tel: +44 (0)1622 201207, Fax: +44 (0)1622 210207 [email protected] www.mebmedia.co.uk

Articles and art may not be reproduced or reprinted without the express written permission of the publisher.

Exclusion of Liability Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions.

Copyright © MEB Media Ltd – 2014, all rights reserved.

The magazine wiTh The inside sTory on securiTy

08 INDUSTRY NEWS 32 VIDEo SURVEIllaNcE

latest developments in the industry

20 WoRlD cUp WINNERS

Visualization solutions during the FIFa World cup

an interview with Dieter Dallmeier

40 TEchNologY & TEamWoRk

a mix of people and technology improves business security

FlIR ThERmal TRUmpS oThER TEchNologIES

oNE camERa ShoW

IN SECURITy I August 2014 I 1

Welcome to the October issue of In Security and hopefully you are all

geared up for Security Essen, the 40th anniversary of the exhibition and as strong as ever. This issue’s Product & Industry News section (starting on page 8) showcases the latest news from the industry with a heavy emphasis on Security Essen.

Our cover story this month looks at FLIR thermal imaging and how you can secure an area of more than 1,000 square meters with one single thermal imaging camera.

Next Barco’s networked visualization solutions to provide a real-time view on incidents – and foster speedy emergency reactions – during the FIFA World Cup 2014 (see page 20).

Elsewhere, ASPIDER has developed a true end-to-end security solution for M2M communications that employs state-of-the-

art cryptography technology. (see page 24).Market leaders Automatic Systems

explain how best to upgrade your existing pedestrian entrance control (PEC) system (see page 28)?

We asked Dieter Dallmeier, founder and CEO of Dallmeier, a few detailed questions, and we got some very interesting answers (see page 32).

As a strategic supplier Siemens has an in-depth understanding of the operational challenges pertinent to enterprises with a global footprint (see page 36).

James Kelly, Chief Executive of the British Security Industry Association, explains why a mix of people and technology is still the most effective approach to business security (see page 40).

Finally Honeywell, looks at why security strategies must adapt to the retail banking revolution (see page 44)? Chris Hewett, Editor

Contents02 Cover Story – One camera showFLIR secures an area of more than 1,000 square meters with one single thermal imaging camera

06 Product & Industry NewsThe latest news and views from the industry

20 World cup winnersBarco’s networked visualization solutions provide a real-time view on incidents during the FIFA World Cup 2014

24 Secure M2M on the SIMASPIDER has developed a true end-to-end security solution for M2M communications

28 Get in lineHow to upgrade your existing pedestrian entrance control (PEC) system?

32 Video surveillance redefined We asked Dieter Dallmeier, CEO of Dallmeier, a few detailed questions

36 Security & the corporate strategySiemens examines securing sites all around the world

02

24

32

20

Commentary

40 Technology and teamworkBSIA, explains why a mix of people and technology is still the most effective approach to business security

44 Banking on securityHoneywell, looks at why security strategies must adapt to the retail banking revolution?

06

36

44

Page 4: In Security August 2014

2 I August 2014 I IN SECURITy

EvITECH uSES FLIR THERMAL IMAgIng CAMERAS TO PROvIDE COST-EFFECTIvE SITE PROTECTIOn WHILE guARAnTEEIng AnOnyMITy

One camera show

Thermal imaging cameras are an ideal way to protect premises against intruders at night. Not only is thermal imaging very effective in detecting all kinds of anomalies in all weather conditions, it is also a cost-effective solution. In a recent project where an important swimming pool in Orsay, France, needed to be protected against intruders, security installation specialist EVITECH proves that you can secure an area of more than 1,000 square meters with one single thermal imaging camera.

CO

VER

STO

Ry

Page 5: In Security August 2014

IN SECURITy I August 2014 I 3

The public swimming pool in the municipality of Orsay, France, receives several hundred visitors every day. Schools, sport

clubs and recreational swimmers all find their way to the Olympic size (50 metre) swimming pool for all kinds of swimming, diving or water-polo activities. As crowded as it might be during the day, at night during closing hours, the pool is not staffed and a ladder is all that is needed to climb the fence and access the pool.

In order to monitor the pool deck at night for irresponsible behaviour and to prevent possible deaths by drowning, the municipality of Orsay decided to invest in an efficient security solution. At the same time, it was important to limit heavy construction work and guarantee anonymity for all swimming pool guests.

EVITECH (Electronic Vision Technologies) who are based in Antony, France, installed an intruder detection system with thermal imaging technology from FLIR Systems, in cooperation with security technology installer – the TIFALI Group.

EVITECH video surveillance specialistFounded in 2005, EVITECH is a European leader in video analytics for security applications. EVITECH’s solutions help to monitor and protect sensitive sites, public spaces and transport systems, and oil & gas installations. The company can boast some very prestigious clients, including government premises, big defence security system providers, sensitive energy sites and big construction companies.

EVITECH’s most notable security solutions are Jaguar, a video analytics software package for intrusion detection, and Lynx, a software tool that helps to manage movements of crowds of people through intelligent video analytics.

Single-camera installationFor the monitoring and detection of the pool deck at Orsay around the 25x50m swimming pool, EVITECH opted for the FLIR FC-690 camera, installed on the corner of an adjacent pool building, coupled with Jaguar video analytics software. As a very cost-effective intruder detection solution, the FLIR FC-690 camera can capture all movements in its field of view, based on the temperature information the human body gives off.

The FLIR FC-690 is an affordable, network ready fixed mount >

The camera has been installed on the roof of an adjacent building without the use of a mast.

TThe FLIR FC-690 camera can capture all people movements in its field of view, based on the temperature information the human body gives off.

Page 6: In Security August 2014

4 I August 2014 I IN SECURITy

camera with 640 x 480 pixel resolution. The camera uses a 7.5 mm lens, which offers a field of view of 90°. Thanks to this lens, only one camera is needed to ensure the surveillance of the whole site. The camera has been installed on the roof of the adjacent building without the use of a mast. In this way, the entire pool including the surrounding walkways and deckchair area can be monitored.

The Jaguar video analytics software is a perfect match for the FLIR thermal imaging cameras. The software continuously detects all kinds of movements around and in the water, efficiently filtering out the movements of the water.

Only activated during closing hours, the detection and monitoring system generates alarms when intruders are detected and automatically reports them to the city police.

Thermal trumps other technologiesBefore selecting thermal imaging with Jaguar analytics, the municipality investigated other technologies. A common solution for detecting intruders is the use of infrared barriers. These detectors however require a lot of cable and therefore a lot of costly installation works that require the ground to be opened up. Another frequently used solution is visual video technology (CCTV). However, the area around the Orsay swimming pool is not lit at night, which makes detection difficult. Had lighting been installed, the light that plays on the moving or rippling water would generate a lot of false alarms. That’s why thermal imaging proved to be the most sensible solution.

Thermal imaging cameras do not need any lights to operate at night and with only one camera covering the entire swimming pool,

the installation works would be minimal.

Anonymity guaranteedAlthough the detection and monitoring system is switched off during opening hours, the swimming pool customers might still be under the impression that they are being watched. Specifically in France, this would mean invasion of privacy, which could lead to legal action.

With thermal imaging cameras, that is not a problem. Unlike visual based CCTV cameras, a thermal imaging camera does not actually identify the person in question when he or she is detected. This way, the municipality is able to protect the swimming pool site against intruders at night or while it is closed, and at the same time respect the anonymity of the bathers while the pool area is open.n For more visit www.flir.com

“Thermal imaging cameras do not need any lights to operate at night and with only one camera covering the entire

swimming pool, the installation works would be minimal”

The FLIR FC-690 can monitor the entire pool including the surrounding walkways and deck chair area

Page 7: In Security August 2014

IP Solutions

HONEYWELL IP VIDEO – A SOLUTION FOR EVERY NEED. Honeywell has the IP capability to expand, enhance, migrate and upgrade your video system.l Expand current systems, providing cost effective solutions from entry level to multinational enterprise systems

l Enhance current systems by adding new functionalities or integrating other technologies. Using multi-megapixel cameras, for the most demanding requirements

l Migrate from your current analogue system to IP, with solutions that allow you to combine IP and analogue hardware

l Upgrade current systems to add new features and benefits, using products that can be easily integrated, both into new and existing systems

To find out more visit www.honeywellipsolutions.com/uk

Page 8: In Security August 2014

6 I August 2014 I IN SECURITy

PRO

DU

CT A

ND

IND

UST

Ry

NEW

S

Panasonic has been chosen to provide 30 security cameras for Tomorrowland, the world’s largest electronic dance music festival

The Panasonic surveillance cameras are being used by security solutions specialists DCNS at the festival held over consecutive weekends in the Belgian town of Boom.

DCNS is entrusted by event organisers ID&T to look after safety and security, monitoring the flow of people and avoiding any problems escalating at the festival.

“The success of our mission hinges on the equipment we deploy at the festival site. DNCS uses Panasonic surveillance cameras due to the high quality of the materials and the advanced technical capabilities that characterise them. We know that with Panasonic we will be able to accomplish our task successfully at Tomorrowland,” says Gust Dierckx, manager of DNCS.

Debby Wilmsen, Communications Officer at ID&T Belgium said, “The Panasonic surveillance cameras enable our crowd watchers at the ECC [Event Control Centre] to monitor the festival site for any potential risks and deal with them immediately. A good network with reliable equipment is therefore very important when running a festival.”

At each event, DNCS has installed a structured network consisting of a fibre cable backbone and a wireless network on the festival site. This forms the basis for the customised Wi-Fi network via which the Panasonic surveillance cameras are controlled from the Event Control Centre. Panasonic phones have also been installed for key internal and external communication at the event.

Next year there will be three editions of the festival including Belgium, Brazil and Atlanta USA, all will be using Panasonic Surveillance equipment. n For more visit panasonic.net

Panasonic has Tomorrowland under control

Page 9: In Security August 2014

IN SECURITy I August 2014 I 7

Alpro on the menu in CardiffTransom door closers from Alpro Architectural Hardware have been installed at Le Bistrot Pierre on Caroline Street in Cardiff. The venue, which is in the heart of the city and near the Millennium Stadium, is the eleventh to open in a family of individually-themed restaurants serving award-winning provincial French food.

The Alpro closers are used on doors manufactured by Essex-based IDF Aluminium Ltd who excel in distinctive facades for the retail and leisure industry and are also active in education and corporate buildings.

Alpro’s overhead transom closers are a means of hydraulically controlling the opening and closing of aluminium doors. Features include dual closing speed to allow flexibility in closing, three levels of spring strength and 90-degree hold open facility. Builders and glaziers benefit from the ability to adjust the latching and closing force according to the weight and height of individual doors as well as type of usage. Fine-tuning to accommodate the exact needs of patrons is all-important in restaurant usage of this type.

Transom closers are contained within the transom header bar of a door. They are therefore well suited to use in premises where aesthetics are paramount and visual appearance must not be compromised. Le Bistrot Pierre is also using door handles from Alpro’s Impressionist range which are manufactured from 304-grade stainless steel and are specified widely for their functionality and visual appeal.

The menu at Le Bistrot Pierre reflects travel

throughout France by an executive chef and his team in search of the authentic healthy produce that distinguishes the menu here. There is a choice of more than 30 French wines, many being sourced directly from the producers. Each of the restaurants is styled individually to complement its surroundings and the frontage here has been designed to blend with an area of Cardiff that was previously a hub of the brewing trade.

Keith Parry, Sales Director at Alpro, said: “Our transom closers are designed for durability and have been tested independently at 250,000 double-action cycles. We’re pleased to have contributed to the visual appeal of this prestigious restaurant while also optimising access control for management and ease of entry for clients.”

IDF Aluminium Ltd worked in conjunction on the project with specialist joinery manufacturers Charles Evans Shopfitters, a nationwide concern with headquarters in Liverpool and a 120-year history of serving the construction industry.

Head chef at Le Bistrot Pierre in Cardiff, Ben Morse, has worked with celebrity chef Matt Tebbutt and with Jamie Oliver at his flagship restaurant, Fifteen, in London.

Co-owner Robert Beacham said: “The care with which the frontage in Cardiff has been designed to complement the architecture of a signature part of the city shows how all our bistrots retain an individual style but with a uniform insistence on the highest standards of cuisine running through the sites.”

n For more information please visit www.alpro.co.uk

Page 10: In Security August 2014

Kent based company Green Gate Access Systems, has announced that it has been chosen as the exclusive distributor for SMOES vertically lifting gates in the Eastern part of the UK. Managing Director, Neil Sampson, returned just last week from Italy, where he visited SMOES Director, Loris Gentili and SMOES Sales Director, Nicole Corine Pettermand, to rubberstamp the exciting collaboration.

The unique Avant gate product range from SMOES comprise vertically lifting gates that can be installed in locations not suitable for a standard gate, such as small spaces, sloping roadways, areas with no roll back space for a slider and car-parks where access is tight. The commercial gates are available up to 2 metres high and 10 metres wide, with the domestic range, up to 1.8 metres high and 6 metres wide. Built to an extremely high standard and supplied with an EN 13241-1 certification, the gates are well finished and most importantly, safe. With all versions available in a wide range of finishes, from a plain security gate to an arch topped ornamental or even wood effect, and a comprehensive range of colours provided as standard, Neil Sampson is confident they are the future of the industry.

“The SMOES range is fantastic and we are delighted to be introducing this to the UK market.

The opportunities are almost endless and this product has an exciting path ahead.” says Neil. “Basically there is nothing like this currently available. The fact that they lift, means they can be installed in locations where a normal gate just won’t function. For areas where a security gate is required but the ground is sloping, space is tight or there is no room off to the sides, so you cannot swing or slide a normal gate, this is the perfect solution. The other important factor with this range is that the gates arrive pre-assembled, so installation is always within one day! This is a product that once seen, will start to roll out as rapidly in the UK as it has done in Italy and Germany already. It is a unique solution to a common problem and you need to see it to believe it. It really is that good.”

“We welcome Green Gate Access Systems to our exclusive list of European installers and suppliers.” says Nicole Corine Pettermand. “We are adamant that those representing our product and service demonstrate the ability to both install our equipment efficiently and undertake the SMOES codes of practice with regards to safety and security. Neil and his company more than satisfy this criterion and we are delighted to have them on board.”n For further information please visit www.greengateaccess.co.uk

Green Gate Access Systems distribute World’s largest Vertical Lifting Gate

8 I August 2014 I IN SECURITy

PRO

DU

CT A

ND

IND

UST

Ry

NEW

S

Page 11: In Security August 2014

Visit Paxton, European Access Control Designer and Manufacturer, at Security Essen 2014

www.paxton.co.uk

Find out more:

Learn how Paxton integrates with CCTV, biometrics, intruder and fire alarm systems, SIP and much more

Discuss opportunities with Paxton’s door entry system, IP and wireless access control

Find out more about Paxton’s industry leading training

September 23rd – 26th 2014, Hall 2.0 Stand 517

Integration

International team of industry experts

Free training and education

Paxton

Guarantee Garantie Garantía Garanti Takuu תוירחא 保证

εγγύησ

η G

war

ancj

a W

arran

ty Garanzia

Visit Our Stand for a Chance to Win €1000 Worth of Paxton Products

Essen Advert UK text.indd 1 14/08/2014 16:25:28

Page 12: In Security August 2014

pro

du

ct a

nd

ind

ust

ry n

eWs

10 I August 2014 I IN SECURITy

ASSA ABLOy Security Doors has designed, manufactured and installed a range of high performance security doors for multiple specification projects across London.

From the installation of innovative fire doorsets in the Shard, to supplying the London Underground’s Bond Street Tube Station with its specialist steel doorsets, the company has proved its ability to specify high profile projects.

Working with some of the most respected contractors in the industry ASSA ABLOy Security Doors’ has utilised its value added service and consultancy skills for the range of specification projects.

The company has supported the design intent of buildings such as Buckingham Gate, which was part of the regeneration of Victoria, Canary Wharf and Quadrant 3, one of London’s most ambitious West End redevelopments.

Brian Sofley, Managing Director at ASSA ABLOy Security Doors, said: “We are proud to have secured a vast number of projects that are a part of the progressive and exciting developments in the capital.

“Many of the buildings we have supplied are set to become iconic features of London’s skyline and we hope to continue to provide sustainable, robust and effective door solutions across the country.” n For further information, visit www.assaabloy.co.uk/securitsolutions

London is calling for Assa Abloysecurity doors

International Professional Security Association (IPSA) and the Qatar International Centre for Safety and Security (QICSS) Sign Historical AgreementOn 25th June 2014 the International Professional Security Association (IPSA) signed a historic agreement in Doha, Qatar with the Qatar International Centre for Safety and Security (QICSS). The agreement provides for graduates from QICSS security related courses to be automatically enrolled as individual members with IPSA for 12 months with options to extend their membership thereafter.

Commenting at the signing ceremony in Doha, Mike White, Chairman of IPSA said “This is a historic moment for IPSA. We already have many members within the region and this will allow us to be at the forefront of professional representation as the Qatari private security industry grows and develops. These are exciting times for Qatar and we are very proud to be associated with our professional colleagues at the QICSS and we look forward to working with them in the future to develop new members and help and support both the Centre and our members wherever we can”.

Speaking for QICSS, Mr Khalid Omran, Chief Executive Officer said “This is a key moment for the private security industry in Qatar and we’re looking forward to working with our IPSA partners in the years to come”.

PRO

DU

CT A

ND

IND

UST

Ry

NEW

S

Mr Mike White and Mr Khalid Omran exchanging signed copies of the agreement

Page 13: In Security August 2014

IN SECURITy I August 2014 I 11

Cole Security Services adopts Skillweb Guard Management Solution

Cole Security Services, a leading provider of security solutions throughout Bolton, Greater Manchester and the North West region, has adopted an advanced guard management solution from mobile computing specialist Skillweb. SmartTask Security will be used across a team of 80 guards in order to streamline communications and reporting processes, enabling the company to reduce costs and enhance the service provided to customers.

An initial six-week trial of the SmartTask Security tool involving 13 guards was able to demonstrate a wide range of benefits in terms of transparency of guard activity, electronic management reporting, real-time incident reporting and alerts and lone worker protection. As a result, Cole Security Services will be able to replace existing manual-and paper-based procedures to make significant time and financial savings, while improving operational performance and helping to achieve legal compliance.

SmartTask Security allows Cole Security Services to log attendance, actions and incidents at customer sites, providing complete visibility of operatives and extending its reporting capabilities. Guards simply swipe their mobile phone over strategically-located NFC tags to confirm their position, while any actions

taken and incidents found can be inputted into the mobile application the moment they occur. This not only means that important information can be quickly and efficiently shared with customers, but unnecessary interaction can be removed between on-site operatives, area supervisors and office-based administrators.

Francis Cole, Managing Director of Cole Security Services commented: “SmartTask Security is supporting our aim to take the business to even higher levels of service and professionalism. We are always looking at ways of increasing efficiency while enhancing our commitment to customers, so we expect this mobile application to become an important part of our operation and increasingly underpin our management and reporting processes moving forward.”

Paul Ridden, CEO of Skillweb said: “Cole Security Services has recognised the value SmartTask Security can provide in terms improving visibility and control of mobile resources. This advanced guard management solution achieves measurable cost, time, service and compliance benefits that are helping an increasing number of security companies to optimise the performance of their operations.”

Page 14: In Security August 2014

12 I August 2014 I IN SECURITy

30 years of Dallmeier – an excellent reason for the video specialists from Regensburg to celebrate with an “Octoberfest” at the Security Essen trade show: On every day of the show, visitors may look forward to being treated to typical German sausages such as Weisswurst and Regensburger Knacker, as well as fresh pretzels and good Bavarian Weltenburger beer!

The highlight of the Dallmeier trade show presence is the Panomera® showtruck, in which the latest models of the patented multifocal sensor technology will be presented live. Especially for commerce, industry and mid-sized companies, these models provide an ideal solution for comprehensive surveillance of expansive areas. Contrary to single-sensor cameras, the multifocal sensor technology supplies a guaranteed constant resolution of at least 125 pix/m. This makes it possible to monitor large areas and distances from one single location, achieving this in real time with consistent resolution, higher dynamics and full depth of focus.

“At the trade show we are focussing on using the multifocal sensor technology to show practical, economical solutions for applications for which no solutions at all could have been found in the past with conventional engineering. That’s why an estimated 30 to 40% of projects were never completed,” says Dieter Dallmeier.

What’s new this year is an additional pavilion more than 90 m2 in size in which Dallmeier will present various video IP solutions with selected partners.

Panomera® RoadshowIf you can’t come to Security in Essen, Germany, you shall have the opportunity from the beginning of September to the middle of October to see the Panomera® Truck during the Dallmeier Roadshow through Germany, Denmark, Belgium, France and Switzerland. For a schedule and registration form please visit www.panomera.com/en/ roadshow-2014.html

Dallmeier celebrate the 30th anniversary of the company’s founding with the Panomera® Octoberfest in the open exhibition area FG 1 of this year’s Security trade show

PRO

DU

CT A

ND

IND

UST

Ry

NEW

S

Dallmeier celebrates 30th anniversary at Security Essen

Page 15: In Security August 2014

Smarter visualizationNetworked visualization leading to

smarter decision making

A reliable networked visualization solution is indispensable to

monitor, analyze, and share an ever increasing number of video

and data sources all over the world. That is why Barco designed

its networked visualization solution, the simplest and most fl exible

way to securely distribute any information to any location. The

result: faster and smarter decision-making.

Learn more about networked visualization at www.barco.com/netviz

BUSINESS DATA

TRAFFICCAMERA

SURVEILLANCE CAMERA

REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE NETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORK

REMOTE REMOTE REMOTE REMOTE INTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTION

14090.BARCO.resize.ad.in security.netviz.indd 1 24/04/14 15:43

Page 16: In Security August 2014

14 I August 2014 I IN SECURITy

The latest Device Pack lists deep support for 3,647 devices in total for XProtect® video management software

pro

du

ct a

nd

ind

ust

ry n

eWs Milestone Systems

Broadens Device Support

Milestone Systems, the open platform company in IP video management software (VMS), has just released the newest Device Pack 7.4 for the XProtect portfolio of VMS products. This update adds another 20 percent new or updated device drivers to XProtect, since the monumental device pack 7.2 release in February when Milestone celebrated record support of 3,000 devices from more than 100 camera manufacturers.

The XProtect Device Packs include optimized drivers that enable all the relevant capabilities of a camera or other hardware device to be managed fully by the XProtect software. Milestone works closely with the device manufacturers in the Camera Partner Program (CaPP) to achieve the optimal interaction between their devices and the XProtect VMS. This ensures the highest quality for a video surveillance solution - very important for total system operability, efficiency and stability.

Milestone is actively promoting driver standards like ONVIF and PSIA, and are currently working to support the edge storage possibilities in ONVIF Profile G. Edge storage enables cameras to store recorded video and audio on storage inside the camera. This new capability is expected to be supported in XProtect Device Pack 7.5 scheduled for release in late August 2014.

“Our ability to add support for more than 600 new devices in just four months is a testimonial of the power of open platform technology,” says Christian Bohn (shown above), Milestone Systems VP Corporate Marketing & Alliances. “Our fast expansion of device support highlights our total dedication to give our partners

not only the best VMS, but also the broadest and most comprehensive device support in the market - now and in the future. Milestone will continue to drive open platform technology going forward. We remain dedicated to our partner ecosystem as an independent industry force multipier.”

The list of major manufacturers with new or updated drivers in Device Pack 7.4 is: • IQInvision• Panasonic • Arecont• Stretch• ACTi• Pelco

The device support in XProtect reaches beyond digital video devices because the software also has comprehensive support for encoders enabling analog cameras to be connected to the VMS: Milestone is in this way spearheading the transition from analog to digital video in the market for video-enabled business systems.

Based on open platform technology, Milestone XProtect VMS is compatible today with more than 200 encoders from more than 50 different manufacturers complementing the 3,647 digital cameras from more than 100 camera manufacturers, giving users a wide variety of solutions to choose from. n Please visit www.milestonesys.com

Page 17: In Security August 2014

Custom Consoles introduces SteelBase-Lite heavy-duty control room desk

IN SECURITy I August 2014 I 15

Shown here a three-bay configuration of the new Custom Consoles SteelBase-Lite desk

Leighton Buzzard, UK, July 24, 2014: Custom Consoles announces a new addition to its range of control room furniture. SteelBase-Lite is a heavy-duty desk developed to meet the demand for ultra-robust furniture in environments such as the oil and gas industry.

“Developed from our established SteelBase series, Steelbase-Lite is a compact and cost-efficient desk designed around a 1.2 metre steel frame,” says Custom Consoles’ Managing Director Neil Reed. “It can be delivered in flat-pack form for easy assembly by the customer or by on-site installers. Each unit incorporates a PC storage base with two hinged removable access doors at front and rear. All doors have ventilation ports running almost the full height.”

Each SteelBase-Lite desk unit is equipped with cable management ducts plus easy cable access from the computer housing via a brush strip running the full width of the worktop. Adjacent to this is a video display support frame with two VESA monitor mounts which attach to height-adjustable horizontal aluminium-frame beams. Robust steel arms and profiled legs

integrated with the main desk unit give SteelBase-Lite very high strength and rigidity.

Doors, worktop and side panels of made of high quality MDF. The desktop has a robust surface laminate. All steel surfaces are powder coated in textured black. IT faceplate mountings are fitted inside each computer storage bay. Power distribution and data panels are available as options.

SteelBase-Lite meets all current European standards for desk ergonomics (ISO11064 part 4 and ISO9241 part 5). The worktop is 740 mm high and provides British Standard leg clearance (EN527 part 1). The desk’s front-to-back size is 1,000 mm and height including monitor support frame is 1,150 mm.

SteelBase-Lite was launched at the IFSEC 2014 exhibition in London, June 17-19 where it formed the centrepiece of the Custom Consoles stand. “Interest in the new design was very high including a potential order for 200 units from a single customer,” comments Sales Manager Gary Fuller. n For further information please visit www.customconsoles.co.uk

Page 18: In Security August 2014

Answers for infrastructure and cities.

www.siemens.com/bt/corporate-security

With rising public pressure, corporations are expected to act responsibly and stand accountable when incidents occur.Combine this with the increased competitive pressure andeconomic uncertainty; global organizations need to findnew ways of driving business efficiencies and managingcommercial and reputational risks.

Tailored, integrated solutions and services from Siemenshave helped global organizations around the world improvebusiness continuity and resilience, while reducing systemcomplexity, technology risks and total cost of ownership.With a long-term view on enterprise-wide safety and securitystrategies, we help reduce the risk, impact and cost of fireand security-related business interruptions; so that com-panies can deliver increased customer satisfaction and share-holder value – consistently, profitably and responsibly.

Sustainable business value through Safety and SecurityIntegrated Corporate Security Solutions for global companies

Hall 3Stand 309

Lookingforward toyour visit

Anzeige_Enterprise_Security_1.indd 1 15.07.14 11:37

Page 19: In Security August 2014

IN SECURITy I August 2014 I 17

Paxton to Exhibit at Security EssenVisitors to Security Essen, 23rd – 26th September 2014, can expect an interactive experience with Paxton, the market leader of electronic IP access control and door entry equipment.

Paxton have previously exhibited at Essen with integration partners, but this year, in line with its international expansion, it will showcase its innovative and intelligent product range from its own stand in Hall 2.0 Stand 517.

The Paxton stand should be the first stop for those wanting to learn more about the company and understand the factors behind its rapid growth across Europe. Delegates can see for themselves how straightforward the products are which have been designed to be easy to use, install and maintain.

Paxton’s international team of industry experts will be on hand to give insight to new customers who are interested in Paxton’s full range of access control solutions. Visitors can find out more about the company’s free training and installer focussed workshops, which have trained over 200 installers from 140 companies in Germany since January 2014.

The stand will showcase the flexibility of Paxton products, displaying integration possibilities, such as integration with CCTV, biometric fingerprint reading and intruder and fire alarm systems.

Gareth O’Hara, Paxton’s Sales and Marketing Director, says: “Paxton has become a market leader through its efforts to listen to and exceed the expectations of its customer base, and our stand at Essen has been designed with this in mind.

“Security Essen provides the biggest shop window for the security sector in Europe, if not the world, and so having our own stand is an important opportunity to demonstrate Paxton’s growth in the global market.

“We very much look forward to meeting our customers face-to-face and having the opportunity to provide a greater insight into our product and service development strategy.”

Paxton will be in Hall 2.0 at stand 517 during Security Essen. Visitors to the stand can enter a raffle to be in with the chance to win €1,000 worth of Paxton products. Terms and conditions apply. n For more information please visit www.paxton.co.uk

Page 20: In Security August 2014

To make parking for permit holders much easier, Nedap announces the release of the SENSIT Parking License app. This mobile application is a new innovation related to Nedap’s SENSIT system for monitoring real-time usage of individual parking spaces with ground sensors. The SENSIT Parking License app enables fast and easy checking in and out at a parking bay with just one click. Administrators can manage and distribute licenses online efficiently. Nedap has prepared the app for easy integration with third party mobile parking and enforcement applications.

Nedap is developer and manufacturer of SENSIT. This technology consists of wireless parking sensors which detect in real-time whether or not a single parking bay is occupied and how long it has been occupied. SENSIT has proven to be an accurate, reliable and robust parking sensor system for on and off street parking situations. Nedap integrates its parking sensor platform with third party systems for parking guidance, traffic management and parking enforcement.

How the app worksTo enable identification of vehicles, Nedap now adds the Parking License app to the SENSIT system. This dedicated mobile app performs in a similar way as the previously released physical onboard device EPL (Electronic Parking License). This patented solution can be used to identify the vehicle and link the vehicle to a parking bay. In the SENSIT system individual parking bays or entire parking zones can be designated for specific audiences. And violations can easily be detected.

This solution monitors the legitimate use of parking bays digitally. The app is easily configured to get a unique identifying number. As soon as a permit holder parks, one click is sufficient to activate the app and have it connect to the SENSIT server. Using GPS coordinates and advanced matching algorithms, the location of the SENSIT Parking License is identified.

Benefits both motorists and administratorsBesides the user-friendly interface for (de)activation of the parking session, permit holders can also use the SENSIT Parking License app for additional parking services such as real-time information about the parking availability as well as a clever car finding assistant to keep track of where the car is parked. This application also improves efficient enforcement of the on and off street parking

spaces. Through the SENSIT Administration Software administrators can simply manage their parking licenses.

The big advantage of using an app as a parking license is the fact that logistics and maintenance are easier. Since everybody nowadays has a smartphone, apps are easily distributed. This makes the related costs for a digital license low for all parties involved. The SENSIT Administration Software is capable of dealing with a mix of licensing devices and apps, which makes it a solution that can service permit holders with or without a smartphone.

Third party app integrationThe first release of the SENSIT Parking License app is available for a selected group of existing Nedap partners and clients. Nedap expects to integrate this electronic parking license functionality into third party smartphone apps. The automatic license matching functionality is available through an open software interface of the SENSIT system. This enables third parties to easily create their own custom solutions. The app is currently released for Android and a version for other relevant mobile platforms will follow soon.n For further information please visit www.nedapidentification.com

Nedap announces the release of the SENSIT Parking License app

18 I August 2014 I IN SECURITy

pro

du

ct a

nd

ind

ust

ry n

eWs

Page 21: In Security August 2014

Enabling Freedom for the Internet of Things.

+1 617 949 8900

+44 1895 454 699

[email protected]

www.wyless.com

Your wireless data solution is more than just data connectivity. We understand that.

So we not only built the world’s most advanced global wireless data management

platform and private managed network, we also built our business upon the most

important connections of all – our relationships with our partners, carriers and customers.

That’s why Wyless is the trusted provider to our partners and the trusted solution for

Fortune 500 companies and startups alike. We’re the easiest company to work with.

We listen to our customers and take pride in every connection. Wyless offers truly

uncompromising LTE, 3G, and 2G data solutions, delivering worldwide wireless

connectivity over the most secure and resilient private managed network infrastructure

delivered in partnership with 19 Tier 1 MNOs in over 120 countries We provide unrivaled

management tools and empower you with end-to-end managed services, technical

expertise and dedicated support. So connect with the experts and together we’ll take

your applications to the next level. You have found your true IOE ( Internet of Everything )

and broadband data partner.

Page 22: In Security August 2014

In mission-critical situations, it’s a must for security personnel to have the most complete information available and be able to show and share that with others. And that’s exactly what Barco’s networked visualization solutions do: help operators in control rooms, crisis coordination centers and emergency operation centers retrieve and distribute data from different sources and visualize it flexibly and brightly. Remember the story about the Swedish Fire department in a previous issue of ‘In Security’? To further illustrate the benefits of Barco’s security solutions, we will share with you the experiences of several control rooms in Brazil, equipped with Barco solutions and responsible for managing the FIFA World Cup, as well as a command center in Colombia.

20 I August 2014 I IN SECURITy

CO

NTR

OL

RO

OM

HOW BRAzIL’S SãO PAuLO InTERnATIOnAL AIRPORT AnD THE MARACAnã AnD MInEIRãO FOOTBALL STADIuMS RELIED On BARCO’S nETWORkED vISuALIzATIOn SOLuTIOnS TO PROvIDE A REAL-TIME vIEW On InCIDEnTS – AnD FOSTER SPEEDy

EMERgEnCy REACTIOnS – DuRIng THE FIFA WORLD CuP 2014

World cup winnersPOWErED

ByBArCO

STAyIng On TOP OF SECuRITy DuRIng THE FIFA WORLD CuP 2014

Page 23: In Security August 2014

IN SECURITy I August 2014 I 21

World-scale events, Barco solutionsAs a worldwide visualization leader, Barco has been involved in quite a few major global sports events, over the past few years. Huge Barco LED display systems were set up in three soccer stadiums in South Africa, for the FIFA World Cup 2010. Barco LiveDots’s LEDs were integrated in the 2012 Olympic Stadium in London. During the FIFA World Cup 2014, however, Barco’s contribution revolved around control room rather than entertainment solutions. Guarulhos International Airport and the Maracanã and Mineirão soccer stadiums all chose networked visualization solutions from Barco, on account of Barco’s market leadership and the quality and reliability of its solutions, to achieve the ultimate visualization platform for security management.

Networked and openWith about 30 million people passing through its gates each year, the

São Paulo Guarulhos International Airport (GRU) is the busiest airport in Latin America. As it expected many more visitors on the occasion of the FIFA World Cup 2014 and the Olympic Games in 2016, Guarulhos embarked upon a series of major renovation and modernization works a few years ago. Airport operator Consórcio Invepar-ACSA, comprising Brazilian infrastructure investor Invepar and Airports Company South Africa (ACSA), took Barco on board to deploy networked visualization solutions in no fewer than nine control rooms. “One of the key requirements was to have a networked platform that would allow operators, managers and directors to share real-time information from all different sources, over IP, in order to take decisions fast. The solution had to be open as well, allowing it to interact easily with third-party CCTV and any other information available on the network through the collaboration software. To

demonstrate that our solution was able to do that, we set up a pilot project with the CCTV supplier, integrating his solution with our collaboration software (CMS). The GRU operators and IT people were immediately won over,” says Ney Corsino, Senior Vice-President International Sales for Barco.

Nine video wallsNine Barco OverView MVD LCD video walls, in different configurations, have been set up in the meantime, in as much control rooms: the Airport Management rooms (CGA/COA /COE), the Flight Scheduling, the Aircraft Parking Management, the Emergency Operations, the Crisis, the IT and the Maintenance rooms. “The customer is very satisfied with the quality of the images, the solution’s user-friendliness and the absolute ease of sharing information in real time, on any video wall and user workstation” says Audir Martins, sales manager for Barco Brazil. >

Page 24: In Security August 2014

22 I August 2014 I IN SECURITy

Bright, long life span and ease of useThe OverView MVD-5521 set up at GRU is a 55” LCD panel with a super narrow bezel, marked by high brightness, contrast, a wide viewing angle and superior black levels. Furthermore, because LED backlights reduce burn-in and colorations in the LCD filters and polarizers, the MVD displays have a prolonged panel life. Together with the NGP controllers that drive the wall and the control room management (CMS) suite, they give everyone concerned with the airport security a clear, bright overview of what’s happening, so they can take action in case of incidents or security breaches.

At the surveillance centers of the legendary Maracanã stadium near Rio de Janeiro and Mineirão in Belo Horizonte, Barco’s graphic controllers, CMS suite and video walls provided similar collaboration flexibility to enable better decision-making and faster responses during the World Cup matches.

Supervising security in MedellínLeaving Brazil and heading up

to the north, we found another recent Barco installation at the command center of the Company for Urban Safety (ESU), at the heart of Medellín, Colombia. When refurbishing its control room, ESU wanted a visualization solution that would ensure superb image quality and ease-of-use and be easy to integrate with third-party platforms. Remote management and maintenance were important too. “Barco’s solutions met all the needs. Moreover, we were already familiar with Barco video walls at Medellín’s traffic control center and the control center of the public utilities company,” says David Vieira Mejia, Logistic Services Director at ESU. “The visualization solutions do a fantastic job there and the local Barco team provides excellent support services. So we knew Barco would be the right choice for us too.”

raising efficiency by 50%Today, the ESU control room features an 8x2 LED-lit OL-710 video wall, while a smaller, similar wall was set up at the security and traffic control center. The crisis room features a 2x2 NSL-4621 LCD wall. Barco’s TransForm N management

system takes care of networking the video walls, so that every video and data source can be shared across the rooms.

“60 to 70 people now use the walls 24/7 to monitor images coming from all kinds of sources: city maps, CCTV camera feeds, statistics, our Automatic Vehicle Location system as well other third-party security control systems like Genetec’s VMS Ovnicast platform,” Vieira Mejia continues. “It is great how the input from the many different safety management platforms that we use, can all be integrated and visualized on the same wall. By sharing the information, everyone works together in real time. Besides, it is very handy to manage and maintain the video wall configuration remotely too.”

When asked about the return on the investment, the ESU team confirms that they are now really on top of what’s happening in Medellín, so that they can take prompt action in case of an incident: “I’d say we’ve raised our efficiency by 50%, thanks to a solution that’s very easy to maintain and 100% reliable. We couldn’t be more satisfied.” n For more visit www.barco.com

Page 25: In Security August 2014

www.automatic-systems.com

Access controlled… Future secured.

[email protected]

Meet us at INTERSEC 2015Dubai UAE • Stand S3-F13

Convention and Exhibition Centre 18-20 January 2015

50 yEaRS oF pERfoRmaNCE and RElIabIlITy In THE AUToMATIoN oF SECURE ENTRANCE CoNTRoL

AS_PubMag_2014_VERSION2_v03.indd 1 28/08/14 16:25

Page 26: In Security August 2014

By MICHEL zWIjnEnBERg, vICE PRESIDEnT ASPIDERM2M

Secure M2M on the SIMSE

CU

RIT

y TH

REA

TS

24 I August 2014 I IN SECURITy

Page 27: In Security August 2014

IN SECURITy I August 2014 I 25

ASPIDER has developed a true end-to-end security solution for M2M communications that employs state-of-

the-art cryptography technology. Cryptography is the foundation of data security and it is employed in e-commerce activities such as online shopping, stock trading, and banking. The current version supports symmetric-key cryptography; public-key asymmetric cryptography will be enabled at a later date. As far as we know, ASPIDER is the first company to employ this robust technology for M2M security.

The security keys that ASPIDER generates, using an ultra-secure process, are stored in transparent files that are embedded in the SIMs. One subset of the security keys is open and accessible; another is only accessible using a PIN code. The M2M modem retrieves keys from the SIM, sends encrypted data to the server, which decrypts the data using the same key. The same encryption/description process is also used to send data to the modem.

Ultimately the solution provides four security levels when using symmetric cryptography. (1) The

Advanced Encryption Standard (AES) is employed for encryption. (2) The Message Authentication Code (MAC) enables data integrity to be secured. (3) Additional authentication can be provided by verifying the identity of the communicating entities. And (4) Adding Session Data (SD) ensures that messages are secured and cannot be reused by an attacker at a later date. All four are required in order to ensure end-to-end security.

In asymmetric public key cryptography (PKI) one key is used to encrypt the information and a second key decrypts the information. A user can encrypt a short-lived session key using the communicating party’s public key and simply send out the encrypted key. PKC ensures that only the holder of the corresponding private key can decrypt and obtain the session key.

Encrypting data at the application level is an up-coming development. This enables the protection of sensitive data and the control of access to be provided in a fine-grained way. The application is the obvious place to encrypt and decrypt data because the application knows exactly which data is sensitive and can apply protection selectively.

Earlier this year ASPIDER M2M became part of the Wyless Group.

Wyless is the global leader in M2M managed services and as such the company employs a comprehensive portfolio of security mechanisms, which include private IP addresses, IPsec tunnels, the Point-to-Point Tunneling Protocol plus client-server and IPsec site- to- site VPNs.

Currently the company has agreements with 19 leading MNOs and a single Wyless SIM provides global connectivity. Therefore customers will now be able to add even more security by employing ASPIDER’s end-to-end cryptography solution. However, I should like to emphasize that our solution delivers ultra-robust security in its own right and it is decoupled from the parent company’s managed services offer.

At one time M2M solutions were thought to be secure because they were obscure, but M2M has moved on. The Heartbleed security vulnerability issue, for example, allows any sensitive data that would normally be protected by the SSL/TLS encryption, even private keys, to be stolen. Heartbleed did not impact any Wyless technical resources, but it did indicate that any device, host, or resource could, eventually, be exposed to a zero-day vulnerability. Security is a moving target – one that’s always in our sights n

Page 28: In Security August 2014

26 I August 2014 I IN SECURITy

InTERvIEW WITH STEvE BOyD, DIRECTOR OF nETWORk EngInEERIng, WyLESS

Making M2M

safe and secure

IS: There used to be a time when M2M solutions were thought to be secure because they were obscure. Hackers didn’t bother with them. However M2M has moved into enterprise and other key environments, so what is Wyless doing to make them really safe and secure? SB: We’ve moved on and now nothing is too obscure for the hackers, but besides putting everything behind a firewall we can implement IP whitelisting. What this does is to allow data from the wireless device to only reach customer-allowed destinations and it blocks any IP addresses that are not specified on the list. In addition we can employ default-gateway IPsec tunnels as well as general routing encapsulation on the traditional IPsec tunnels in order to direct all device-initiated traffic towards the company’s network. This enables companies to use their own network filtering and protocols, which effectively brings the device behind the protection they already afford their core network. This protection is in place no matter what somebody does to the device in the field. It either routes all traffic to and from the

company’s network, or it doesn’t route any traffic over any cellular network at all.

IS: When you build a secure wall around a business environment how do you enable remote access by authorized users?SB: Well, it’s kind of obvious that we do need to provide a way for authorized users and services to access the devices remotely over the Internet. We’ve done that by employing two data communications technologies. PPTP (Point-to-Point Tunneling Protocol) client-server and IPsec site-to-site VPNs (Virtual Private Networks). With PPTP individual users can initiate a VPN and establish traffic to the devices on the fly, and with IPsec one or more sites can be linked to the devices over a private, permanent connection. I’d like to add that it is not necessary to have public IP addresses and they should be avoided wherever possible.

IS: How and why does Wyless implement connectivity via the cloud? SB: Enterprises are employing virtual pools of computing

resources that operate very efficiently in private and public clouds and a key benefit is the flexibility it brings to their operation. M2M solutions are also moving to the cloud, either stand-alone or integrated, and of course this is something we anticipated and our response was to implement our own complementary cloud connectivity solution. This means that we can deliver secure network connectivity between our global MNO sites and both Amazon AWS and Microsoft’s Azure platform and several customers are already using this service.

IS: What security developments do you expect to see later this year and in 2015?SB: Going forward, as M2M and IOT take-up accelerates, I think the leading edge will be in comprehensive traffic analysis. We’re getting beyond putting up walls and into scanning traffic for unauthorized or malicious characteristics and blocking it as appropriate. The additional security benefits of that approach will be substantial for anyone investing in it, and I’m confident that Wyless will be at the forefront. n

INTE

RVI

EW

Page 29: In Security August 2014

Maximize performance in low lightWouldn’t it be helpful if you could rely on clear and relevant images regardless of the lighting conditions? With the DINION IP starlight 8000 MP camera, Bosch off ers a new quality standard in round-the-clock video surveillance. Regardless of lighting conditions, time-of-day or object movement, the camera delivers relevant IP video 24/7. With its impressive technical specifi cations, this is the ultimate 24/7 camera. Learn more at www.boschsecurity.com/hdsecurity

Maximize performance in low light

Our focus is to make darkness totally visible

to make darkness totally visible

1598_00_017_ADV_STL_210x297_v4.indd 1 9/1/14 11:25 AM

Page 30: In Security August 2014

28 I August 2014 I IN SecurIty

Thinking abouT insTalling an access conTrol securiTy sysTem or upgrading your securiTy TurnsTiles? ... read This firsT!

by Jean-pierre leleu, automatic systems group marketing director

Acc

eSS

co

Ntr

ol

Are you thinking to install an access control security system to ensure your workplace is safe and secure and the building

occupants protected? Is it time to replace or upgrade your existing pedestrian entrance control (Pec) system? Are your security turnstiles at end-of-life and are you starting to consider with what or how to best replace them? Are you wondering what features are new, important, or critical for compatibility with your available lobby space, your new card/biometric readers and access control systems?

end-user clients, along with their security consultants, architects, and security integrators are interested in finding the best solution – considering the latest features and technology available.

What are Pedestrian Entrance Control (PEC) systems? the term Pecs includes all security entrance lanes, turnstiles, barrier type optical lanes, sliding glass optical portals, high security portals, and security revolvers used as part of an integrated security strategy for an access controlled building or area within

a building. Most entrance control systems are specifically designed to increase security and also enhance the effectiveness of lobby staff, who would otherwise have to check the credentials of every pedestrian passing the secure point. the Pecs works by singling out any pedestrians attempting access without proper credentials. Normally a card reader or biometric authentication device is built into or integrated with the Pecs. usually the system will include technology (infrared or other optical sensors) to detect tailgating and prevent piggybacking, crossing through or other fraud attempts.

Many PEC systems are reaching end-of-life For Pec systems purchased 10-15 years ago, replacement parts are now becoming harder to find. Downtime is expensive and detrimental to operation and traffic flow – let alone the perceived corporate image associated with non-functional security equipment. Meanwhile, new state-of-the-art security entrance lanes have been developed, the benefits of which (financially and practically) support the upgrade or replacement of these old, dated systems.

Security first terrorism threats, workplace violence, industrial/intellectual espionage are some current trends that have influenced the interest and growth of entrance control in recent years. In addition, technology has changed to the point where integrating a good entrance control system with the building’s access control environment is simpler and more seamless. Generally, a professionally designed and well-implemented entrance control system pays for itself through the manpower savings in lobby and security staff. the entrance control equipment makes the staff more efficient, and decreases staffing demand, proving a clear roI in most cases.

The product selection decisions are important and longthe design, product selection and buying decisions for such projects take usually one year or more till the intended purchase is done. clients have concerns about how to make the right decisions because access control security products are usually a long-term capital investment and a strategic one. Another important consideration

Get in line

Page 31: In Security August 2014

IN SecurIty I August 2014 I 29

concerns the existing infrastructure work that was already done on site and its dimensional limitations when replacing/upgrading an existing entrance control system. Will the new proposed housing footprint fit correctly on the existing space? Should you accommodate more lanes than before in the same given area? How integrating your new security turnstiles with your overall security system? Further complicating such decisions is the variety of new physical features, available certifications, and software packages that are available.

Architectural finishes, product features and overall aesthetics will be of concern for architects and lobby designers. custom colors, surfacing and finishes are usually available options and architects like to have choices of custom and materials.

Security turnstiles with swing glass doors are especially trendy today. their slimmer and shorter housing – and therefore smaller footprint, can be easily accommodated in any lobby space whereas retractable doors will require larger space.

Technology features available in the newer PECs Some of the new changes in evolution in the Pecs are that they have very sophisticated tailgating and piggybacking detection systems – allowing clients to even tailor the sensitivity of their tailgating/piggybacking security detection system. enhanced tailgating/piggybacking detection technology improves accuracy, reduces both false positive and false negative incidents – thereby increasing security while reducing cost of false alarms. today’s Pec systems use long-life leD lights which years ago replaced incandescent bulbs which had been standard in older turnstiles.

one very important advancement is the advent of network ready, IP addressable security turnstiles and server based lane control panels.

these advancements open up a wide realm of communication, lane control, and maintenance possibilities not available in the legacy analog, dry contact systems of the past. the use of network ready and IP based systems like this also provide a level of “future-proofing” your Pec system.

Old vs. new: justifying/selling the selection Nowadays, having no access control system is not an option anymore. So, when roI must be addressed, it is best to look at the cost of the old system over time. How often does it need repair? Have we had to call for emergency repairs and what is the cost of the repairs? When the system is down, do we need to add additional security personnel to monitor the entrance? How long do we wait for parts?

SlimLane, the all-in-one new security turnstile generation from Automatic SystemsAutomatic Systems’ new Slimlane range of swing doors security turnstiles offer every one of these features and is the most compelling product offering for security turnstiles on the market, combining maximum throughput in a minimum footprint with high speed and best in class security in a modern and streamlined design. For over 50 years, and with over 200,000 security gates installed worldwide, the strategy of Automatic Systems is to design and manufacture high- >

Page 32: In Security August 2014

30 I August 2014 I IN SecurIty

reliability products that meet the market needs. Automatic Systems invests constantly in improving the performance of its products. Few companies with an extensive international coverage have such a product-oriented strategy.

Greater modularitySlimlane product range offers the best flexibility and versatility in terms of product configuration. Slimlane is available with high or low glass, standard or short cabinets, single or double doors, wide or narrow lanes, opening/closing in both directions.

Aesthetics in a very compact footprintIts slim, transparent and modern design blends seamlessly into any type of interior architecture such as office buildings, head offices, banks as well as public administrations. A wide range of options and accessories are available to customize the design, safety level and control of Slimlane.

Slimlane swing doors short cabinet (Sc) version – with reduced footprint, has been recently added in response to the increasing issue of premium space. the Sc version has a cabinet length of 1274 mm versus 1640 mm for the standard unit. the shorter cabinet version allows for easier implementation into most

elevator openings, as well as where architectural demands are stricter like in many existing front lobbies.

Its fast closing/opening movement ensures maximum throughput in a very compact footprint. there is no other optical turnstile as quick (opening/closing speed <1s.) and as silent (< 55dB) at the same time (combination of both).

Priority to security and safetySlimlane is the most secure and safest turnstile thanks to its locking features and its unique high-performance detection system running along the whole lane and across the glass obstacles. Based on a high processing capacity (ArM9) and a high-density matrix of superior infrared beams (DIrAS), Slimlane allows for dynamic, predictive tracking of users thus preventing unauthorised use such as tailgating or piggybacking. It also includes electromechanical locking to withstand forced entry attempts as well as audible and visual signals to indicate unauthorized usage. user protection functionalities include anti-panic operating mode (eGreSS) – meeting the highest fire safety standards, finger entrapment prevention design and extrinsic battery operated opening in case of power failure.

IP ConnectableSlimlane benefits from an open communication platform for IP connectivity. Its embedded software provides real time monitoring and the ability to configure and maintain each lane locally or remotely via a simple web browser. Its remote functionalities allow for lower operating costs and increased service time. Its electrical consumption of 65W at rest is 40% less than that of traditional retractable gates.

BIS compatibleSlimlane security turnstiles are BIS (Biometric Identification Systems) compatible, allowing for seamless identification and access.

By seamlessly integrating biometric authentication technology into the Slimlane gates, users do not need to stop or carry badg es therefore increasing throughput rate. BIS readers and lights are installed inside Slimlane and work via software or dry contacts. users are pre-enrolled with biometrics and validated as they approach the gates. Slimlane opens automatically when authorised individuals walk through. In cases of attempted fraud or tailgating an alarm is generated.n For further information please visit: www.automatic-systems.com

“Slimlane is the most secure and safest turnstile thanks to its locking features and its unique high-performance detection system running along the

whole lane and across the glass obstacles”

Page 33: In Security August 2014
Page 34: In Security August 2014

32 I August 2014 I IN SECURITy

IS: Mr. Dallmeier, to begin with, can you briefly explain what multifocal sensor technology is?DD: As the name says, multifocal sensor technology is a camera technology with several sensors (“multisensor”), each operating with different focal lengths (“multifocal”), in contrast to single-sensor cameras. This makes it possible to monitor large areas and distances from a single location, and to do so in real time with uniform image resolution, high dynamic and consistent focal depth.

IS: you talk about “redefining video surveillance”. What is so new about this approach?DD: Video surveillance cameras have been successfully used in security technology for more than 60 years. The technological progress made during this time was enormous. The technology has evolved from cameras using tubes to megapixel cameras. However, what did not develop further is the planning and perspective needed to solve problems.

Video cameras are undisputedly the best solution in security

technology – for a picture says more than a thousand words. Without cameras, security technology would be blind in the truest sense of the word. Who is not familiar with the blurred, poor-resolution images from convenience stores, service stations, banks or railway stations that are repeatedly shown in the media and essentially useless? It is only fair to wonder if surveillance cameras are in fact worthwhile. Especially if “nothing is seen anyway” or the camera happens to be “looking the other way” at the decisive moment.

WE ASkED DIETER DALLMEIER, FOunDER AnD CEO OF DALLMEIER, A FEW MORE DETAILED quESTIOnS, AnD WE gOT SOME InTERESTIng AnSWERS

The new S-Panomera® by Dallmeier was specially developed for commercial and industrial applications. Thus, the patented multifocal sensor technology has paved the way for a complete new solution approach in these markets.

“Video surveillance redefined” – a phrase coined by Dallmeier to describe their multifocal sensor technology. This new camera technology delivers a practicable and cost-efficient solution for many applications for which conventional engineering has failed to provide a solution. That is why in the past an estimated 30 to 40% of projects were never realised at all – a figure which represents a huge market for multifocal sensor technology.

Video surveillance redefinedIN

TER

VIEW

Page 35: In Security August 2014

IN SECURITy I August 2014 I 33

>

IS: But the resolution of megapixel cameras is always going to be higher, isn’t it?DD: That is correct, but resolution is not everything, nor does it solve the problem. In addition, many megapixels on a single chip have unpleasant side-effects as far as things like light sensitivity, lens quality, image rate and bandwidth are concerned.

Focusing on resolution and defining it as pix/m makes it easier to plan. In other words, the main thing is not the resolution alone, but how many pixels per metre are obtained. For observation you need 65 pixels/m, 125 pixels/m to recognise known persons and 250 pixels/m for the identification of unknown individuals – no matter how far away a particular person may be. And that is precisely where our challenge lies and what ensures project planning reliability.

Merely indicating pix/m is not so very appealing. In contrast, speaking in terms of megapixels and ever more megapixels sounds better and sells better, even though it offers no true guarantee for a solution to the customer’s problem.

After all, what really interests the customer is not the number of

megapixels, but rather whether suspects can be singled out and identified. This, of course, must be possible regardless of which area of the surveillance field that person is located in. Whereas megapixel cameras are surely still able to supply good results at close range, in the case of single-sensor cameras the number of pixels per metre decreases continuously as the distance from the camera position increases. At some point the images obtained are useless.

IS: And the multifocal sensor technology offers a practicable solution for this?DD: It does indeed. We do not permit ourselves to be drawn into a race for more and more megapixels. Instead, we provide a new approach to the problems. If the customer tells us, for example, that a person should still be recognisable at 180 m, 125 pix/m are necessary for this. The customer does not care how many megapixels the camera actually has, as long as at least 125 pix/m are obtained at 180 m – or 120 m or 90 m, as the case may be. And this approach to a solution is precisely what we are following with our multifocal sensor technology.

Contrary to single-sensor cameras, several lenses with different focal lengths are used. This patented technology makes it possible to monitor large areas and distances comprehensively, and to do so in real time with uniform image resolution and consistent focal depth.

This approach offers one more advantage: One single installation point is all you need. Not only does this mean that this solution is extremely cost-effective since huge savings can be achieved both in the number of required cameras and especially in the necessary infrastructure such as masts, cables, etc. It also means that solid solutions can be found with this technology for projects that could not previously be implemented at all.

The multifocal sensor technology here opens up a huge market for planners and builders. An estimated 30 to 40% of all projects have not been put into reality to date, since conventional technology did not offer any fitting solutions for comprehensive surveillance of large areas or distances, for instance due to the necessary number of cameras or the infrastructure. And this is precisely where the multifocal sensor technology comes in.

Page 36: In Security August 2014

34 I August 2014 I IN SECURITy

IS: Cost effectiveness and uniform resolution are two solid arguments. But does this technology also have any advantages for the operator, namely the person working the equipment?DD: Contrary to PTZ cameras, Panomera® makes permanent recordings of the overall picture, namely in real time and with up to 30 fps, even if only a displayed cut-out is zoomed in live. The operator can then go about his or her duties at ease, without having to worry about missing significant occurrences due to zooming in on the wrong place at the crucial moment. With the multifocal sensor technology, everything that happens can also be analysed after the fact from the recordings. Nothing is lost. What’s more, due to its high sensitivity to light and the wide

dynamic range, the camera also supplies high-quality imaging material under low-light conditions.

And especially in the area of image analysis, the multifocal sensor technology with its defined resolution in pix/m offers decisive advantages such as a larger range and fewer false alarms.

IS: What about integration into other systems? Is the multifocal sensor technology compatible?DD: yes. Panomera® complies with the Onvif norm and can be immediately integrated into common management systems. The multiuser capability allows any number of operators to access and analyse image material independently of each other.

IS: This technology sounds complex

and difficult. Is that true?DD: No! From the very beginning, we wanted the multifocal sensor technology to have the following features: Handling should be easier than in conventional cameras; results should always be superior to those of single-sensor cameras and the technology should be absolutely competitive in spite of the “Made in Germany” label. I think we have succeeded in this!

IS: Are you concerned about whether this innovative technology could be imitated?DD: No, since our technologies are patented and we are pursuing a new strategy: Multifocal sensor technology is marketed as OEM, ODM and under the brand name Panomera®. This offers the best possible protection. n

The latest video of Dallmeier shows the highlights of the innovative multifocal sensor technology as well as practical applications from commerce and industry such as logistics centres, building entrances or harbours and port facilities: “The Panomera® multifocal sensor technology for commerce and industry”. The video is now online on the Dallmeier youTube channel: http://youtu.be/s7LROthyP1I

Dallmeier has at its disposal more than 30 years of experience in transmission, recording as well as picture processing technology and is an outstanding pioneer of CCTV/IP solutions worldwide. This profound knowledge is used in the development of intelligent software and high quality recorder and camera technologies enabling Dallmeier to not only offer stand-alone systems, but complete network solutions up to large-scale projects with perfectly integrated components. Right from the beginning the company always focused on own innovative developments and highest quality and reliability. Dallmeier is the only manufacturer in Germany that develops and manufactures all components on its own. This includes the entire product range, from cameras to picture storage and transmission to intelligent video analysis and even individually adjusted management systems. Quality made by Dallmeier, made in Germany! Over the years, Dallmeier has repeatedly given fresh impetus to the market with new developments and extraordinary innovations. The world’s first DVR for example, which introduced digital recording to the entire CCTV industry, came from Dallmeier. The multifocal sensor system Panomera® will have a similarly groundbreaking effect: This unique and novel camera technology will revolutionise the market and open up completely new possibilities to the video security industry. This and the extensive experience in the CCTV and IP field have led to a top position in the international market for digital video surveillance systems.n For further information please visit www.panomera.com

vIDEO On yOuTuBE

ABOuT DALLMEIER

Page 37: In Security August 2014

Club Car is now street legal in every country in the EU.

Club Car’s electric utility vehicles offer an attractive alternative to traditional petrol-powered vehicles. For a start there’s no petrol costs – and zero emissions.

Club Car’s vehicles have the power to perform numerous campus tasks, from mail delivery to security and maintenance.

Want to know more? Contact your Club Car representative today.

www.clubcar.com

[email protected]

(+44) 777 180 5463

Club Car takes to the streets

street legal

Page 38: In Security August 2014

36 I August 2014 I IN SECURITy

AS EnTERPRISES ExPAnD InTO DEvELOPIng MARkETS AnD EMERgIng COunTRIES OR ACquIRE ExISTIng BuSInESSES OPERATIng A vARIETy

OF ExISTIng ‘LEgACy’ SySTEMS, THEy FACE nEW CHALLEngES In kEEPIng THEIR WORkPLACES SECuRE In unFAMILIAR TERRITORIES

OPE

RAT

ION

AL S

ECU

RIT

y Security as an integral part of the corporate strategy

Having disparate sites in different countries will necessitate compliance with local, national and international

security legislation. Often vast distances between organizational headquarters and new locations unveil new logistical issues, particularly when coupled with the increased mobility of employees and the clear expectation of harmonized and uniformed access as they move between sites.

The need for overall transparencyOperating the resulting patchwork of fragmented security systems throughout different locations can make corporations more vulnerable, as well as resulting in unplanned costs. In many cases, wherever a security risk is identified within a unit or a site, the immediate need to provide protection will mean the installation of a ‘quick-fix’ solution to resolve the vulnerability – without due consideration of overall

corporate security strategies or policies.

Fragmented, ‘silo-type’ systems also result in a lack of transparency between the various sites. Corporate security specialists may not be able to access required data and no real overview of the global security landscape exists. In many organizations, it will simply be impossible for system administrators to know which employees have access to what facility or, even worse, whether

Page 39: In Security August 2014

IN SECURITy I August 2014 I 37

departing employees’ rights have been removed from all databases throughout the complete enterprise landscape. Transparency of employee access rights across all sites is a fundamental necessity, not only for the purpose of security and internal audits, but also to satisfy the demands of regional governance and often legislation.

Securing sites all around the worldTo ensure global business continuity, corporations need to find a state-of-the-art approach to managing global security issues. Enterprise security can no longer be seen as a stand-alone discipline, but rather an integral part of an overall corporate strategy engaging in a more proactive approach. It is essential that corporations establish an enterprise-wide security strategy at the earliest opportunity, applicable across all locations, ensuring a responsible and security-conscious culture.

A number of integrated, enterprise-level security solutions are available today to support global organizations. These flexible technologies are designed for local, national and globally dispersed organizations supporting enterprise-wide mitigation of risk, exposure and

the costs associated with security-related business interruptions. By integrating access control, video surveillance and intrusion detection solutions, these platforms ensure efficient risk management, provide centralized system management resulting in cost transparency and efficient use of resources. Once in place they offer global support with consistent and common standards, optimizing an organization’s security landscape. Most importantly, they are future-proof solutions exhibiting reduced and quantifiable total cost of ownership (TCO).

Implementation of enterprise security solutions typically starts with a comprehensive analysis of business risks and vulnerabilities. Inventory is taken of the overall security landscape identifying, assessing and characterizing possible concerns. Mapping of critical business processes is documented and specific threats assessed. The proposed solutions then prioritize and implement risk mitigation measures, with metrics for monitoring the results and continually enhancing the measures accordingly. Such a program enables the entire organization to have a concentrated focus on its core business responsibly, consistently and profitably.

Enterprise security solutions support organizations in complying with regulatory requirements and industry standards. Interoperability between various security systems creates efficiencies by streamlining the reporting and management of individual technologies resulting in the reduction of internal costs. Automation capabilities help off-load day to day burdens put on system operators by automating processes and providing a more efficient utilization of resources.

Proof of concept: Creatinga uniform security cultureAs an experienced partner in enterprise-level security solutions, Siemens was recently tasked with developing a centralized access solution for a global software company. Like many enterprise landscapes, the customer’s sites had a variety of legacy security systems in place with different experts managing single products and installations, all of which were increasing operational costs. Starting with the customer’s headquarters as the initial point of implementation, global processes were defined for simple deployment to other locations spanning the globe. This enterprise-wide >

Page 40: In Security August 2014

38 I August 2014 I IN SECURITy

solution resulted in a complete optimization of resources through centralized system management and a uniform security culture.

One globally valid corporate card was created integrating physical access control, cashless payment, desktop log-in, as well as flexible time and attendance management functionality. The customer now enjoys the benefit of a strategic focus with a single point of contact, global pricing and service support with the implementation of clear corporate security standards. With Siemens as its service partner for facilities around the globe, overheads for local system administrators together with maintenance costs are reduced, while enabling swift and uniformed reaction times to any arising issue.

A reliable partner with a worldwide presenceSiemens is ideally positioned to conceive, design, build, maintain, monitor, and even operate integrated security solutions and services

for global corporations. The company specializes in supporting organizations in the creation of an overall security approach which is planned and individually customized for global enterprises. Siemens has the expertise to offer seamless integration and a unified management platform with a variety of automated processes facilitating a coordinated response across all sites. Siemens also offers a range of service offerings to balance risks, internal competence and budget constraints, providing enterprises with the flexibility to tailor services specifically to meet site-specific needs.

As a strategic supplier Siemens has an in-depth understanding of the operational challenges pertinent to enterprises with a global footprint. The company supplies comprehensive, modular security solutions suitable for single sites, local branches or dispersed networked facilities around the world, across different continents and time zones. Well equipped for

global implementation because of scalability and networkability, these solutions are effective in controlling access to defined areas. They can be seamlessly integrated into existing network infrastructures and extended to include features such as time processing, ID creation, visitor management and much more due to their open architecture.

In today’s agile business environment, CSOs of globally present corporations need to ensure that solutions are in place to protect personnel, intellectual assets and infrastructure without impeding day to day business activities. In doing so, it is possible to identify and mitigate potential incidents which might threaten the resilience and continued operation of their organizations. With a truly global presence, Siemens can be relied upon as a competent partner in enterprise security solutions working closely with its clients from the outset.n Megan Miller, Market Manager Corporate Security, Siemens Enterprise Security.

“As a strategic supplier Siemens has an in-depth understanding of the operational challenges

pertinent to enterprises with a global footprint”

Page 41: In Security August 2014

www.securityshows.comFor more information please contact:Ilya Sobolev (Head of Sales–Security Events)T +44 (0)20 7596 5170 E [email protected]

SIPS South Russia 20146-я Международная выставка «Охрана, безопасностьи противопожарная защита»2–4 cентября 2014 • Краснодар, Россия

SIPS Siberia 201423-я Сибирская международная выставка«Охрана и пожарная безопасность»24–26 cентября 2014 • Новосибирск, Россия

CIPS Caspian 20147-я Каспийская международная выставка«Охрана, безопасность и средства спасения»22–25 октября 2014 • Баку, Азербайджан

SFITEX 2014 23-я Международная выставка и форум«Охрана и безопасность – SFITEX»11–14 ноября 2014 • Санкт-Петербург, Россия

IS.CS 20145-я Международная специализированная выставка«Информация: техника и технология защиты»11–14 ноября 2014 • Санкт-Петербург, Россия

AIPS Almaty 20155-я Казахстанская международная выставка«Охрана, безопасность, средства спасенияи противопожарная защита»11–13 марта 2015 • Алматы, Казахстан

MIPS Moscow 201521-я Московская международная выставка«Охрана, безопасность и противопожарная защита»13–16 апреля 2015 • Москва, Россия

CAIPS 20158-я Центрально-азиатская международная выставка«Охрана, безопасность и противопожарная защита»21–23 Октябрь 2015 • Ташкент, Узбекистан

SIPS South Russia 20146th South Russian International

Protection and Security Exhibition2–4 September 2014 • Krasnodar, Russia

SIPS Siberia 201423rd Siberian International

Fire Fighting, Emergency and Rescue Exhibition24–26 September 2014 • Novosibirsk, Russia

CIPS Caspian 20147th Caspian International

Protection, Security and Rescue Exhibition22–25 October 2014 • Baku, Azerbaijan

SFITEX 201423rd Saint Peter sburg International

Security and Fire Exhibition11–14 November 2014 • St. Petersburg, Russia

IS.CS 20145th International Specialised Exhibition –

Information Security. Counter Surveillance11–14 November 2014 • St. Petersburg, Russia

AIPS Almaty 20155thAlmaty International

Protection, Security, Rescue and Fire Safety Exhibition

11–13 March 2015 • Almaty, Kazakhstan

MIPS Moscow 201521st Moscow International

Protection and Security Exhibition13–16 April 2015 • Moscow, Russia

CAIPS 20158th Central Asian International

Protection, Security and Fire Safety Exhibition21–23 October 2015 • Tashkent, Uzbekistan

security_calendar_2014_South Russia A4_Layout 1 14/05/2014 12:06 Page 1

Page 42: In Security August 2014

THE IMPORTAnCE OF A HOLISTIC APPROACH TO BuSInESS SECuRITy

Technology and teamwork

40 I August 2014 I IN SECURITy

BSI

A

With security technology continually developing, is the role of the traditional security officer in

decline? James Kelly, Chief Executive of the British Security Industry Association, explains why a mix of people and technology is still the most effective approach to business security.

As innovation gathers pace, technology continues to take over from traditional people-based roles in a wide range of business

sectors. Whether it’s retailers moving from high street to online, or farm machinery taking over from agricultural workers, the rise of automation affects most elements of our everyday lives. Security, however, is one area where a mix of technology with the presence of security officers still delivers the best results.

One area where technology truly comes into its own is that of CCTV. While security officers can keep a watchful eye on the ground, CCTV cameras allow for

24-hour protection and can be placed effectively around a business premises in order to monitor the entire facility. The effectiveness of video surveillance technology is continuously improving, and it has already established itself as a vital security tool for the police, private companies and many public sector organisations. An effective CCTV system contributes to the detection and prevention of crime, as well as protecting towns, cities and transport networks from the threat of terrorism.

Page 43: In Security August 2014

IN SECURITy I August 2014 I 41

Intelligent CCTVA key area where CCTV is rapidly developing is that of video content analysis (VCA). This impressive technology is already contributing to the security of a range of high-level facilities such as city centres, transport facilities, and utilities.

VCA is essentially the automatic analysis of CCTV images in camera or centrally, utilising advanced algorithms to create useful information about the content. Generally, these systems need a static background and consequently tend to operate with fixed cameras or Pan Tilt Zoom (PTZ) cameras at set positions, as they are looking to identify changes or movement at a particular scene. The scope of video analytics is considerable and can be used in the detection of intruders, abandoned packages, wrongly parked vehicles or people counting, all of which can be utilised in a wide range of business sectors.

One particular area that VCA can

be especially effective is around a premises’ perimeter. Securing a perimeter can be seen as one of the most crucial steps in any security plan, allowing for early detection of threats and ensuring there is the necessary time and space available to formulate a security response, potentially preventing a threat all together.

Perimeter-specific applications of VCA, such as the tripwire function, can be especially useful in this kind of protection. VCA can be utilised in order to create virtual tripwires along existing fences or areas of a perimeter where other forms of physical security would be impossible or impractical. If a person is simply walking near a site, they are not necessarily considered a threat and a great amount of attention does not need to be paid to them.

However, if that person then crosses the tripwire into a secure area, an alert can be raised. The

VCA draws attention to the cause of the alarm, often by highlighting it in a red box, and an operator can quickly assess the nature of the alarm. VCA is more resistant to false alarms caused by vegetation or animals and lower false alarm rates improve security.

There’s certainly no doubt that security technology is rapidly developing, with the increased role of biometrics and ‘intelligent’ CCTV making a positive impact on business security. While technology, such as video content analysis in CCTV and biometrics in access control, can gather essential intelligence to identify a threat, it still requires a physical presence to act upon them. Uniformed officers not only act upon these threats, but their mere presence can also provide an impactful deterrent, and provide peace of mind to the general public. As such, the steadfast support of a physical security presence remains irreplaceable. >

Page 44: In Security August 2014

42 I August 2014 I IN SECURITy

A physical presenceRegularly patrolling the building and perimeter areas, security officers are trained to provide an essential first response to emergency situations. By monitoring CCTV footage, they are able to make decisions based on the information provided by technology such as VCA, and can formulate an appropriate action plan to deal with any threats that have been identified by CCTV. Indeed, without a uniformed security presence to act upon emerging threats, there would be little value in the intelligence provided by security technology.

When deployed on the ground, officers also deal with issues that other staff alone would not be able to handle as effectively, from manning access points, escorting trespassers off site and dealing

with disagreements, to traffic and parking management for functions and events.

Utilising an holistic approach to security – blending a uniformed security presence with advanced security technology – enables businesses to gain the best value for money for their security spend. Efficiency, too, is improved, with technology taking over from more regular patrols and freeing up officers to spend more time on at-risk areas.

All aspects of a security officer’s role requires sensitivity and teamwork, as well as excellent communication with management and administrative staff. For this reason, choosing a reputable supplier with solid industry experience is essential for the success of a security strategy. A professional security company can

offer far more than just uniformed officers, providing consultancy and security design as well. By sharing best practice across its portfolio, the supplier can provide help and advice on the application of security technology as well as a physical security presence. This can include making use of technological developments such as fingerprints readers and eye scanners as well as traditional CCTV and perimeter alarms.

BSIA members operating in the Security Guarding sector employ fully vetted and qualified personnel and adhere to strict quality standards. Details of these can be found on the BSIA’s website, www.bsia.co.uk/security-guarding. More information about the technology mentioned in this article can also be found on the BSIA’s website, at www.bsia.co.uk/cctv. n

“All aspects of a security officer’s role requires sensitivity and teamwork, as well as excellent communication

with management and administrative staff”

Page 45: In Security August 2014

www.security-essen.de THE NUMBER ONE

23–26 SEPTEMBER 2014

THE NUMBER ONE FOR 40 YEARSMeet exhibitors and safety experts from over 100 nations at the global marketplace. Discover new safety trends, exciting innovations and top-class forums. Seize your opportunity for know-how, networking and business!

Security & Fire PreventionThe World’s Leading Trade Fair for

RZ_Anzeige_A4_Besucheranzeige_2014_GB.indd 1 12.03.14 10:26

Page 46: In Security August 2014

44 I August 2014 I IN SECURITy

IP S

ECU

RIT

y

WHy SECuRITy STRATEgIES MuST ADAPT TO THE RETAIL BAnkIng REvOLuTIOn jAMES SOMERvILLE-SMITH, EMEA CHAnnEL MARkETIng LEADER, HOnEyWELL SECuRITy gROuP

A study of 4000 North Americans released this month by consultancy Accenture will have sent a chill down the

spines of retail banks everywhere. It revealed that a quarter to a third of young consumers between the ages of 18 and 34 would be comfortable entrusting their savings to companies like Apple, T-Mobile, Google or Walmart , versus a high street bank1. Worse, the same study revealed that four in ten consumers would be happy to deposit money in a company with no physical bank network2. It begs the question, how can retail banks leverage their bricks and mortar presence effectively to deliver a competitive advantage?

Retail banks need only look to their beleaguered retail counterparts for inspiration. Argos, a company that just posted excellent

full year results, launched its first of six ‘digital stores’ in Old Street, east London at the end of 2013 boasting voice-activated computer systems, iPads, free Wi-Fi and digital screens designed to entice customers in for a real experience. It is a path already trodden by Apple - considered by many as the gold standard of the in-store consumer experience - and a path that retail banks must surely follow too.

Indeed, some banks are stepping up to the plate. This month Natwest opened its new London branch in Bishopsgate, and boasts iPads for internet banking. Last year, it removed the traditional counter in order to break down the physical barrier between staff and customers. Barclays is now offering free wi-fi for its customers and, at the turn of the year, announced it was opening eight branches in Asda

stores across West yorkshire, East Kent, Cheshire and Hertfordshire offering late night and seven-days-a-week banking. In short, retail banking is embracing technology, experimenting with difference shapes and spaces and trying to flex its services to the demands of the modern world.

While this shift is certainly welcome, there is one additional challenge that retail banks must quickly wake up to; their changing security requirements. Although the vast majority of retail banks have traditionally invested heavily in security infrastructure in order to protect their employees and assets against harm and theft, the changing use of space in-store means surveillance and alarm systems must also evolve in tandem. Let’s consider a few examples to illustrate my point.

Banking on security

Page 47: In Security August 2014

IN SECURITy I August 2014 I 45

The tablet dilemmaAs noted above, in a nod to Apple, banks like Barclays and Natwest are adopting iPads and other tablet devices in order to improve the customer experience. Admirable though it is to offer customers access to the beautiful tablet interface while banking, it does make these premises a much more attractive target for thieves. For example, who ensures that the iPad put to one side by employee member of staff helping a customer, isn’t swiftly snatched by an opportunistic thief? Although evolving the branch environment in tandem with emerging technology is essential for retail banks, it also presents some significant dilemmas when it comes to protecting its newly acquired – and expensive – digital assets.

Dynamic spacesSimilarly, while brighter, modern, more dynamic banks are much more welcoming and enticing for an increasing number of prospective

customers, they also present challenges for the security team. In many organisations, the location of security cameras and alarm setting procedures haven’t changed for years, even decades. While traditionally cameras were pointed at the cashiers behind their glass screens, and at the ATM machines inside the bank, now the classic, time-honoured security procedures need to be updated. For example, as more and more staff are out on the floor welcoming customers, how do banks ensure that employees are protected from, say, an attack from a disaffected customer? How do banks moving into, say, supermarket spaces ensure that the security systems can accommodate their unique challenges?

Evolving your security mixAs store layout changes, one area that retail banks must start to focus on is video analytics. This is technology that can monitor the movements of customers and staff

in a store environment, and alert the security team to behaviour that is anomalous to the standard consumer or staff member. An example might be a person who is spending a significant amount of time ‘lurking’ around an area; this could indicate a potential theft risk or vandalism to be explored. A video analytics solution is capable of – for example – identifying when a large group of people is gathered around a specific area, alerting the store to potential risks.

There is also a compelling argument for stores to invest in higher-specification cameras in order to better pinpoint the perpetrators of theft. Nothing deters would-be thieves better than a track record of identifying, finding and prosecuting individuals who have stolen from the premises. In order to aid police in their investigations and – crucially – provide evidence that stands up in court, higher image quality is important. Further, in spaces that are busy with people >

Page 48: In Security August 2014

46 I August 2014 I IN SECURITy

moving around more dynamically than a traditional store, greater camera image pixels increase the probability of accurately spotting and easily identifying a thief.

In summary, the changing layout of stores and embracing technology are important parts of the high-street banks’ efforts to maintain profitability and turn bricks and mortar into an asset rather than a cost. This thoughtful and intelligent use of branches to entice, surprise and delight customers is to be encouraged. However, there are security challenges that mustn’t be ignored in the process. If banks revolutionise how their space is used, it follows that thieves will identify new and innovative ways of stealing. Security teams must invest in video analytics, superior surveillance technology and wireless alarm systems in order to safeguard their customers, employees and assets in the changing world of retail banking. n

“the changing layout of stores and embracing technology are important parts of the high-street

banks’ efforts to maintain profitability and turn bricks and mortar into an asset rather than a cost”

1. ‘The Everyday Bank: A New Vision for a Digital Age’; Accenture Study, 2014 http://www.accenture.com/microsites/everydaybank/Pages/everyday-bank-vision-for-digital-age.aspx

2. ‘Digital Disruption in Banking; Demons, Demands and Dividends’; Accenture Study, 2014 http://www.accenture.com/microsites/everydaybank/Pages/digital-banking-survey-2014.aspx?c=fs_dgbksurvey_10000027&n=otc_0514

Page 49: In Security August 2014

Dallmeier_S-Panomera_90x264_HAENDLER_EN.indd 1 30.06.2014 16:00:11

The KeySure case is a pilfer proof, tamper evident keyless lockbox. This is the only non-electronic security device that will control and audit the use of a key, password or any other contents. Once an item is secured inside the KeySure it must be physically broken to access what’s inside. This provides physical accountability of the use of the protected item. This simple yet effective device is perfect for:

• Property Managers • IT Professionals• Office Buildings • Security Departments• Personal Use

The most powerful benefit of the KeySure device is that it can be used to prevent those responsible for your keys, flash drives or other personal information from unauthorized access by providing physical accountability. However, they are still able to access the contents in an emergency. This is possible because the KeySure case must be broken to retrieve its contents. This one-time-use key access box ensures that it: • Protects Both Parties from Surreptitious Use• Provides Physical Accountability • Prevents False Accusations• Eliminates Liability The KeySure case is Safe, Simple and Secure. No other key control product on the market is as easy to use or inexpensive because the KeySure device is the only non-electronic control key system available. This makes it an efficient and effective means of key security.

www.keysure.net

Safe, Simple, Secure.

Page 50: In Security August 2014

DSX manufactures integrated solutions for the access control and security industries. Based in Dallas, DSX designs all software and hardware in house. The company motto is: ‘Integrated Solutions and real world applications are what we do best.’ DSX products are sold worldwide through a network of factory-trained dealers. Dealers are located in the US, Canada, Mexico, Latin and South America, Europe, Middle East, Australia and the Pacific Rim, and Nigeria amongst others. www.dsxinc.com

Barco Barco designs and develops visualization solutions for the security market. With its own facilities for Sales & Marketing, Customer Support, R&D and Manufacturing in Europe, North America and Asia Pacific, Barco is active in more than 90 countries with 4,000 employees worldwide. Barco posted sales of 1.158 billion euro in 2013.www.barco.com/references

Smarter visualizationNetworked visualization leading to

smarter decision making

A reliable networked visualization solution is indispensable to

monitor, analyze, and share an ever increasing number of video

and data sources all over the world. That is why Barco designed

its networked visualization solution, the simplest and most fl exible

way to securely distribute any information to any location. The

result: faster and smarter decision-making.

Learn more about networked visualization at www.barco.com/netviz

BUSINESS DATA

TRAFFICCAMERA

SURVEILLANCE CAMERA

REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE NETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORK

REMOTE REMOTE REMOTE REMOTE INTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTION

14090.BARCO.resize.ad.in security.netviz.indd 1 24/04/14 15:43

pro

du

ct L

isti

ng

s

Dallmeier One of the world leading providers of products for network-based video surveillance solutions, already has more than 30 years experience in the development and manufacture of high quality components and complete solutions for the CCTV/IP sector. www.dallmeier-electronic.com

Fermax Our clients are the main installer companies in the electrical and electronics sector and companies specialising in residential communications and security; professionals with whom we establish lasting bonds based on good purchasing conditions, one to one technical assistance service and an exceptional product, which we design in anticipation of their needs. www.fermaxuk.com

FLIR FLIR Systems, Inc. is the global leader in Infrared cameras, night vision and thermal imaging systems. Our products play pivotal roles in a wide range of industrial, commercial and government activities in more than 60 countries. www.flir.com

Harman HARMAN designs, manufactures, and markets a wide range of infotainment and audio solutions for the automotive, consumer, and professional markets. It is a recognized world leader for leading-edge connectivity, safety and audio technologies. More than 25 million automobiles on the road today are equipped with HARMAN audio and infotainment systems. HARMAN has a workforce of 14,800 people across the Americas, Europe, and Asia. www.harman.com

48 I August 2014 I IN SECURITy

With unique IR lighting concept

• 5-megapixel CMOS image sensor with

technology

• Automatic Day/Night switching supported by integrated

ambient light sensing

• Homogeneous IR illumination by high power LEDs

• Minimum illumination 0 lux

• Megapixel varifocal lens (Day/Night): F1.0 / 2.8 – 11 mm

• Frame rate up to 30 fps

• compliant

• Voltage supply via PoE (Class 0)hall 4, stand D80

IR-Cam_186x129_EN.indd 1 06.02.2012 11:05:55

AUTOMATIC SYSTEMS AUTOMATIC SYSTEMS, a world leader in the automation of secure entrance control, designs and manufactures pedestrian, vehicle and passenger access systems. www.row.automatic-systems.com

Bosch Security Systems Offer an extensive portfolio of innovative, high-quality, ergonomic products and systems for security, safety and communication. Our product range includes video surveillance systems with state-of-the-art IP-solutions, access control systems, intrusion detection systems, fire detection and evacuation systems, security management systems, paging and personal security systems and public address and conference solutions. www.boschsecuritysystems.com

WHERE INNOVATION MATTERSThe Next-Generation Scalable Infotainment Platform

THE PROBLEM:As modern cars become

more and more connected, car hacking is becoming a

serious threat.

THE SOLUTION:HARMAN’s new platform

offers unparalleled multi-layer security

through features such as hypervisor-based domain separation and its hybrid

architecture.

© 2014 HARMAN International Industries, Incorporated. All rights reserved. Features, specifications and appearance are subject to change without notice. All other company and product names used herein may be trademarks of their respective owners.

WWW.HARMAN.COM

DYNAMIC AND CUSTOMIZABLE WHILE ENHANCING SAFETY AND SECURITY. Meeting the steadily growing expectations of customers in a seamlessly connected world is one of the greatest tasks for the automotive industry. HARMAN’s Next-Generation Scalable Infotainment Platform offers a new, modular, multi-core architecture and a fully open-standard software basis to ultimately fulfill the demands of digital natives.

Page 51: In Security August 2014

Wyless Systems Our award-winning M2M platform, delivered in partnership with the world’s largest mobile network operators, provides secure, reliable wireless connectivity to mobile and fixed devices in nearly every country in the world. Our unique products and services help our customers deploy robust, scalable and secure M2M applications.www.wyless.com

Samsung Security Samsung Techwin is one of the fastest growing professional security brands in Europe. Providing a complete range of security solutions that are suitable for a wide range of applications, the company is dedicated to developing technology and products that its clients demand. www.samsungsecurity.com

It’s good to be well connected.Your M2M solution is more than just data connectivity. We understand that.

So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers.

That’s why Wyless is the trusted M2M partner of Fortune 500 companies and startups alike. We’re the easiest company to work with. We listen to our customers and take pride in every connection.

Wyless offers truly uncompromising M2M solutions, delivering worldwide wireless connectivity via the most secure and resilient network infrastructure. We provide unrivaled management tools and empower you with end-to-end managed services, technical expertise and dedicated support.

So connect with the experts and together we’ll take your applications to the next level. You have found your true M2M partner.

We can’t wait to discuss the possibilities.

The leading global M2M managed services provider

+1 617 949 8900 +44 1895 454 699 [email protected] www.wyless.com

To have your company included in this listing contact Wayne Banks on +44 (0) 1622 201207

Keysure KEYSURE’s patented Key Control container is a pilfer proof, tamper evident key safe. This is the only non-electronic security device that will control and audit the use of a key, password or any other content. Once an item is secured inside the Key Control, it must be physically broken to access the contents. www.keysure.net

Videotec Videotec manufactures in-house a wide range of CCTV products recognized for high performances, flexibility and style. Our mission to lead the field in the development of robust, reliable and high performances mechanical and electronic products for surveillance applications is the driving force behind our success.www.videotec.com

ULISSE COMPACT THERMALThe positioning unit off ers an integrated solution for total darkness, fog, rain or smoke.

CCTV PRODUCTSwww.videotec.com

Dual vision, Real time.

ULISSE COMPACT THERMALThe positioning unit off ers an integrated solution for total darkness, fog, rain or smoke.

CCTV PRODUCTSwww.videotec.com

Dual vision, Real time.

It’s good to be well connected.Your M2M solution is more than just data connectivity. We understand that.

So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers.

That’s why Wyless is the trusted M2M partner of Fortune 500 companies and startups alike. We’re the easiest company to work with. We listen to our customers and take pride in every connection.

Wyless offers truly uncompromising M2M solutions, delivering worldwide wireless connectivity via the most secure and resilient network infrastructure. We provide unrivaled management tools and empower you with end-to-end managed services, technical expertise and dedicated support.

So connect with the experts and together we’ll take your applications to the next level. You have found your true M2M partner.

We can’t wait to discuss the possibilities.

The leading global M2M managed services provider

+1 617 949 8900 +44 1895 454 699 [email protected] www.wyless.com

Keytracker Ltd Secure Storage & Management for all Keys & Equipment Mechanical & electronic tracking to suit all budgets & applications, low spec to high tech – the world’s largest range of tracking systems for keys & equipment.Keytracker Ltd, Keyper House, Unit 3, Station Road, Rowley Regis, West Midlands, B65 0JY [email protected] www.keytracker.com

Paxton Access Ltd is a leading manufacturer of electronic access control systems. From its inception Paxton has aimed for engineering excellence. This means designing and manufacturing intelligent and innovative products that are fit for their purpose. We have become a market leader through our constant efforts to exceed the expectations of installers and system users. www.paxton.co.uk

Legic The LEGIC brand is now known around the world and stands for quality in contactless ID technology and in smart card systems for personal identification applications operating at 13.56 MHz. www.legic.com

Any service I can imagine, any security level I desire.All on one chip. On the credential of my choice.Contactless smart card technology: www.legic.com

))))

My Access to my Business.

LEGIC_EUC_en_1_210x297_4c_advant4000Promo.indd 1 29.03.2011 10:55:29

Any service I can imagine, any security level I desire.All on one chip. On the credential of my choice.Contactless smart card technology: www.legic.com

))))

My Access to my Business.

LEGIC_EUC_en_1_210x297_4c_advant4000Promo.indd 1 29.03.2011 10:55:29

Honeywell Security Group delivers the newest innovations, technologies and products. Honeywell is driven to maintain its position as an innovator and leading manufacturer, and invests continuously in R&D. Each of the product ranges regularly delivers new features and technological advancements, while maintaining a familiar user interface and backwards compatibility for ease of installation. Honeywell is a world leading security business. www.security.honeywell.com

Page 52: In Security August 2014

DSX-Europe LTD | Unit 41 Mountheath Industrial ParkPrestwich MANCHESTER M259WB UK | 44(0)[email protected] | www.dsx-europe.com

DSX-USA | 10731 Rockwall RoadDallas, TX USA 75238-1219 214.553.6140  | [email protected]

• Backwards Compatible Architecture

• Alarm Text Message/ E-Mail Notification

• Hot Swap Redundant Communication Server

• High Level Elevator Control Interface

• Integrated Wireless Locksets

Quality. Reliability. Integrity. The Security Professionals’ First Choice.

www.dsxinc.com

DSX Access Systems, Inc.• No “Per Seat” Licensing In System Pricing

• LAN/WAN Compatible

• Smart Card and Biometric Integration

• Unlimited Access Levels Per Cardholder

• Integrated Photo ID Badging

• Backup SQL Server

CREATING THE FUTUREOF SECURITY . . . TODAY

The Security Professionals’ first choice for today’s security infrastructure, from one room to multi-location complexes around the world. Our reputation is based on a time-honored tradition of rock-solid quality, premium reliability and the integrity of DSX and our network of factory-trained, authorized dealers and support.

When you are staking your reputation on a solution - choose the most powerful and intelligent access control systems in the world, choose the total security relationship with DSX.